Results

By type

          2021-08-12 10:55:41,770 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-08-12 10:55:45,864 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-08-12 10:55:48.768  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-08-12 10:56:00.886 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-08-12 10:56:01.980  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-08-12 10:56:02.968  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-08-12 10:56:16.062  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 36.901 seconds (JVM running for 44.637)
2021-08-12 10:56:52.660  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-12 10:56:52.668 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-12 10:56:53.063 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-08-12 10:56:53.069 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-12 10:56:53.169  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-08-12 10:56:53.172  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-12 10:56:53.175  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 10:56:53.176  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 10:56:53.176  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 10:56:53.274  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-12 10:56:53.278  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-12 10:56:53.472  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-12 10:56:53.477  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 10:56:53.477  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 10:56:53.574  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-12 10:56:54.808  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-12 10:56:54.812  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-12 10:56:54.812 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-12 10:56:54.817 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-12 10:56:54.818  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1320
2021-08-12 10:56:54.818  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-12 10:56:54.822  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-12 10:56:54.823  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-12 10:56:54.863  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-12 10:56:54.864  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-12 10:56:54.865 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 10:56:54.866 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 10:56:54.867 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 10:56:54.880 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 10:56:54.880 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 10:56:54.880 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 10:56:54.959 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-12 10:56:55.166 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 4233020831250585597428192733065102626907395577
             IssuerDN: UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 12 10:51:59 UTC 2021
           Final Date: Tue Aug 12 10:51:58 UTC 2031
            SubjectDN: UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:f6:97:f4:a1:d8:dd:29:bd:f1:c6:09:ae:2f:ec:bd:d5:86:ee:fc]
            modulus: d665c0001229f0c627a09148b648a02bf758188f1af611ef63cb63ba7b6617930df0d8a8471476a16e05abcf7730d9fb5c044ad7af7366d9153d0890309401a280dfdaf7e1aefd8d8b205a91295cca1ef6799f27839791a615752b62a06b6b0ca5c3d76f2bdd43fe60386888a4187a3362fd4c6c53515c12c9338faacd25c72878b13fc2d126c93d5d138464361988a675618f9fcbf74059f671cd84ed8ad488e9315e0f7628616f552d6dd0da800abcec27ca06ebad173d21868be231f51d6355cd4feef569c86e1b93a12f5e2aeb2bff391c5e402b364ebc4579e62e2e5d6b0e3f2db9e146cdcd60617e74d07f9a69dfb4b8d6c102795446d0aa4d4888c1d04d6841156a08f71da39461e9babcf797dd44c0435f41591d74d813f704aed797c802a4dc909a5fec54fe12108696de52b6469381fa1f359a89709384d6be470bfd7e6418e3b7714f698dbaa876855e6921513bd6610cc952a284a0dda66ada5d7b1a09abba0eedde947e7919e3aa9ae3ce9fa3517b269f7b69675f24c72971ff
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7d5a3ae34d467813c0fa82d082429600924ab375
                       43892c822a4e34eb738a13ed901f635cf37cda14
                       84f5f37da57015e63d2d9057d69c606f2e172b8f
                       a530e55834dbfadc0b85a463c5c4b9b62085b1a2
                       4f3282e5d49ddfe86cd80fd25bb746564e0450c4
                       f28f4c4054383511baef757ee8d8ee66dd77d03f
                       1cd112e32b5a45400f048a72dd3af355b2aca882
                       fb22cb264275b7dcdf0602fc6c24f8b6ffcb483f
                       2784f5b673e2ac8e570e6180fe226e6ac1daf293
                       563d988c42971d478b4f666d62c424b23312cff3
                       bb05bdd4cdcb888bfbeab568f706539d09d9fcc2
                       00ca5c1c5fedb43cc11f3a6b6a03ad645b1e7be5
                       2ac1afae3c8e77320be450f4cdcdc6812b8a4f30
                       1bc1a04fa415befb7649ff5e572163515d975f4c
                       32d2ef45c807ea3641d05e99b3760e6de2016095
                       5cff7627d040e9f110bc0e462b7a7ef4df922b66
                       79c4212b91d99144bd90bf552de45ceb09e70a7d
                       7cffddb17fca03bff1fda2b5887ff8958093d5cc
                       05ff5734ad508e32249b6472d8028e37faa598fb
                       471735d4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [25:85:55:2c:b9:23:f4:a7:44:f9:d1:8b:00:41:87:c4:dd:06:9c:43]
            modulus: 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
    public exponent: 10001

] 
2021-08-12 13:56:47.700  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-12 13:56:47.703 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-12 13:56:47.705 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-08-12 13:56:47.762 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-12 13:56:47.763  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-08-12 13:56:47.764  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-12 13:56:47.765  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 13:56:47.766  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-12 13:56:47.767  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-12 13:56:47.776  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-12 13:56:47.777  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 13:56:47.778  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 13:56:47.780  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-12 13:56:47.958  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-12 13:56:47.959  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-12 13:56:47.960 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-12 13:56:47.965 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-12 13:56:47.966  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1320
2021-08-12 13:56:47.966  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-12 13:56:47.968  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-12 13:56:47.969  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-12 13:56:47.970  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-12 13:56:47.970  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-12 13:56:47.971 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 13:56:47.971 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 13:56:47.972 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 13:56:47.973 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 13:56:47.974 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 13:56:47.974 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 13:56:47.976 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-12 13:56:48.064 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 4233020831250585597428192733065102626907395577
             IssuerDN: UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 12 10:51:59 UTC 2021
           Final Date: Tue Aug 12 10:51:58 UTC 2031
            SubjectDN: UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:f6:97:f4:a1:d8:dd:29:bd:f1:c6:09:ae:2f:ec:bd:d5:86:ee:fc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7d5a3ae34d467813c0fa82d082429600924ab375
                       43892c822a4e34eb738a13ed901f635cf37cda14
                       84f5f37da57015e63d2d9057d69c606f2e172b8f
                       a530e55834dbfadc0b85a463c5c4b9b62085b1a2
                       4f3282e5d49ddfe86cd80fd25bb746564e0450c4
                       f28f4c4054383511baef757ee8d8ee66dd77d03f
                       1cd112e32b5a45400f048a72dd3af355b2aca882
                       fb22cb264275b7dcdf0602fc6c24f8b6ffcb483f
                       2784f5b673e2ac8e570e6180fe226e6ac1daf293
                       563d988c42971d478b4f666d62c424b23312cff3
                       bb05bdd4cdcb888bfbeab568f706539d09d9fcc2
                       00ca5c1c5fedb43cc11f3a6b6a03ad645b1e7be5
                       2ac1afae3c8e77320be450f4cdcdc6812b8a4f30
                       1bc1a04fa415befb7649ff5e572163515d975f4c
                       32d2ef45c807ea3641d05e99b3760e6de2016095
                       5cff7627d040e9f110bc0e462b7a7ef4df922b66
                       79c4212b91d99144bd90bf552de45ceb09e70a7d
                       7cffddb17fca03bff1fda2b5887ff8958093d5cc
                       05ff5734ad508e32249b6472d8028e37faa598fb
                       471735d4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [45:f1:ec:ea:2e:18:a0:75:a9:3e:f4:e2:91:4f:ed:18:4a:01:12:18]
            modulus: cd90f2f5514c3f098b55ab0c4a8023de0009abf65062989e1d3862aea08ec5c7d8f2842c6419335656a2b8437d7d6df3cccd3c970cf9f037be730f2b6f6211bef2cfd7b8f2aff137c55612e06e5faa75f786f0b1ccb102b837e15776ba22e46b982edd60baaf8fd978161af721a00a8817f66d3bb245ae310ce67ed1fe8fe2f1acf04ba02aac816b8d363cff2d3b82415c4969cf81e2b6f6a1d22c3ec18e7fc26b57e58489015a2475ed3fb1b4150710a38a44208f69fc5cb4405b89794f7768d51cb492443764c07c995c78601c63408eceadeba73f00bfe7f2ceac34f0ce0375c96a46bda92c585359eded604cd509c0c1e10d25d8b404ed56f9ae3a0b169d
    public exponent: 10001

] 
2021-08-12 13:58:46.123  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-12 13:58:46.124 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-12 13:58:46.125 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-08-12 13:58:46.126 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-12 13:58:46.126  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-08-12 13:58:46.127  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-12 13:58:46.127  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 13:58:46.128  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-12 13:58:46.128  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-12 13:58:46.133  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-12 13:58:46.133  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 13:58:46.134  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 13:58:46.135  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-12 13:58:46.228  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-12 13:58:46.258  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-12 13:58:46.259 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-12 13:58:46.262 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-12 13:58:46.264  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1320
2021-08-12 13:58:46.264  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-12 13:58:46.266  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-12 13:58:46.266  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-12 13:58:46.267  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-12 13:58:46.267  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-12 13:58:46.268 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 13:58:46.268 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 13:58:46.269 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 13:58:46.269 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 13:58:46.270 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 13:58:46.270 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 13:58:46.271 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-12 13:58:46.275 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 4233020831250585597428192733065102626907395577
             IssuerDN: UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 12 10:51:59 UTC 2021
           Final Date: Tue Aug 12 10:51:58 UTC 2031
            SubjectDN: UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:f6:97:f4:a1:d8:dd:29:bd:f1:c6:09:ae:2f:ec:bd:d5:86:ee:fc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7d5a3ae34d467813c0fa82d082429600924ab375
                       43892c822a4e34eb738a13ed901f635cf37cda14
                       84f5f37da57015e63d2d9057d69c606f2e172b8f
                       a530e55834dbfadc0b85a463c5c4b9b62085b1a2
                       4f3282e5d49ddfe86cd80fd25bb746564e0450c4
                       f28f4c4054383511baef757ee8d8ee66dd77d03f
                       1cd112e32b5a45400f048a72dd3af355b2aca882
                       fb22cb264275b7dcdf0602fc6c24f8b6ffcb483f
                       2784f5b673e2ac8e570e6180fe226e6ac1daf293
                       563d988c42971d478b4f666d62c424b23312cff3
                       bb05bdd4cdcb888bfbeab568f706539d09d9fcc2
                       00ca5c1c5fedb43cc11f3a6b6a03ad645b1e7be5
                       2ac1afae3c8e77320be450f4cdcdc6812b8a4f30
                       1bc1a04fa415befb7649ff5e572163515d975f4c
                       32d2ef45c807ea3641d05e99b3760e6de2016095
                       5cff7627d040e9f110bc0e462b7a7ef4df922b66
                       79c4212b91d99144bd90bf552de45ceb09e70a7d
                       7cffddb17fca03bff1fda2b5887ff8958093d5cc
                       05ff5734ad508e32249b6472d8028e37faa598fb
                       471735d4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [55:2d:cb:c5:0e:79:bb:0b:d7:db:a8:c3:fd:96:8f:93:aa:e4:41:c5]
            modulus: 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
    public exponent: 10001

] 
2021-08-12 14:03:16.687  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-12 14:03:16.689 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-12 14:03:16.691 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-08-12 14:03:16.692 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-12 14:03:16.692  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-08-12 14:03:16.693  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-12 14:03:16.693  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 14:03:16.693  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-12 14:03:16.694  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-12 14:03:16.758  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-12 14:03:16.759  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 14:03:16.759  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 14:03:16.760  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-12 14:03:16.841  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-12 14:03:16.858  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-12 14:03:16.859 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-12 14:03:16.861 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-12 14:03:16.862  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1320
2021-08-12 14:03:16.863  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-12 14:03:16.865  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-12 14:03:16.866  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-12 14:03:16.867  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-12 14:03:16.867  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-12 14:03:16.868 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 14:03:16.869 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 14:03:16.869 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 14:03:16.870 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 14:03:16.871 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 14:03:16.871 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 14:03:16.872 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-12 14:03:16.875 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 4233020831250585597428192733065102626907395577
             IssuerDN: UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 12 10:51:59 UTC 2021
           Final Date: Tue Aug 12 10:51:58 UTC 2031
            SubjectDN: UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:f6:97:f4:a1:d8:dd:29:bd:f1:c6:09:ae:2f:ec:bd:d5:86:ee:fc]
            modulus: d665c0001229f0c627a09148b648a02bf758188f1af611ef63cb63ba7b6617930df0d8a8471476a16e05abcf7730d9fb5c044ad7af7366d9153d0890309401a280dfdaf7e1aefd8d8b205a91295cca1ef6799f27839791a615752b62a06b6b0ca5c3d76f2bdd43fe60386888a4187a3362fd4c6c53515c12c9338faacd25c72878b13fc2d126c93d5d138464361988a675618f9fcbf74059f671cd84ed8ad488e9315e0f7628616f552d6dd0da800abcec27ca06ebad173d21868be231f51d6355cd4feef569c86e1b93a12f5e2aeb2bff391c5e402b364ebc4579e62e2e5d6b0e3f2db9e146cdcd60617e74d07f9a69dfb4b8d6c102795446d0aa4d4888c1d04d6841156a08f71da39461e9babcf797dd44c0435f41591d74d813f704aed797c802a4dc909a5fec54fe12108696de52b6469381fa1f359a89709384d6be470bfd7e6418e3b7714f698dbaa876855e6921513bd6610cc952a284a0dda66ada5d7b1a09abba0eedde947e7919e3aa9ae3ce9fa3517b269f7b69675f24c72971ff
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7d5a3ae34d467813c0fa82d082429600924ab375
                       43892c822a4e34eb738a13ed901f635cf37cda14
                       84f5f37da57015e63d2d9057d69c606f2e172b8f
                       a530e55834dbfadc0b85a463c5c4b9b62085b1a2
                       4f3282e5d49ddfe86cd80fd25bb746564e0450c4
                       f28f4c4054383511baef757ee8d8ee66dd77d03f
                       1cd112e32b5a45400f048a72dd3af355b2aca882
                       fb22cb264275b7dcdf0602fc6c24f8b6ffcb483f
                       2784f5b673e2ac8e570e6180fe226e6ac1daf293
                       563d988c42971d478b4f666d62c424b23312cff3
                       bb05bdd4cdcb888bfbeab568f706539d09d9fcc2
                       00ca5c1c5fedb43cc11f3a6b6a03ad645b1e7be5
                       2ac1afae3c8e77320be450f4cdcdc6812b8a4f30
                       1bc1a04fa415befb7649ff5e572163515d975f4c
                       32d2ef45c807ea3641d05e99b3760e6de2016095
                       5cff7627d040e9f110bc0e462b7a7ef4df922b66
                       79c4212b91d99144bd90bf552de45ceb09e70a7d
                       7cffddb17fca03bff1fda2b5887ff8958093d5cc
                       05ff5734ad508e32249b6472d8028e37faa598fb
                       471735d4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [dd:f0:78:91:6a:45:56:bf:2e:60:f6:88:d7:4e:b6:e1:e0:37:38:d1]
            modulus: f450d4fccae4d2e7db38bf828f45204c681c408d5a26dc3e25ad285d0f10af87c12783a5267af8930dccc40319e69133117a32a63fc2267cc86cb05b6b14b43246235d08732b5a4fafdff4f57e8f52d857888497dcc892ee877f4ec23d6fcae202d647ef402cf619be4c573bf07220fe658a294d35da75d9c1c21cc21e0ce40042ac1ae1d0cc5d56c59af3197edf11784aa2f295ac9aacd30386064d79162042b87d92e53f3e7fb58714a670258bf487cd0d29d8fdced9111815bdb8fa2cb9d436218f1b74755544b580214b7d5b9cffcce214616e3a81ee87c8e237f1e288d70e1490b2d32e04dbf31eaa007fb1223aa825382e7e94a541bda47d5fdeea742b
    public exponent: 10001

] 
2021-08-12 14:04:23.451  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-12 14:04:23.452 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-12 14:04:23.453 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-08-12 14:04:23.453 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-12 14:04:23.454  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-08-12 14:04:23.454  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-12 14:04:23.455  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 14:04:23.455  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-12 14:04:23.455  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-12 14:04:23.460  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-12 14:04:23.460  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 14:04:23.461  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 14:04:23.462  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-12 14:04:23.531  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-12 14:04:23.532  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-12 14:04:23.532 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-12 14:04:23.559 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-12 14:04:23.560  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1320
2021-08-12 14:04:23.561  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-12 14:04:23.563  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-12 14:04:23.564  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-12 14:04:23.564  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-12 14:04:23.565  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-12 14:04:23.565 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 14:04:23.566 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 14:04:23.566 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 14:04:23.567 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 14:04:23.567 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 14:04:23.568 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 14:04:23.568 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-12 14:04:23.570 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 4233020831250585597428192733065102626907395577
             IssuerDN: UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 12 10:51:59 UTC 2021
           Final Date: Tue Aug 12 10:51:58 UTC 2031
            SubjectDN: UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:f6:97:f4:a1:d8:dd:29:bd:f1:c6:09:ae:2f:ec:bd:d5:86:ee:fc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7d5a3ae34d467813c0fa82d082429600924ab375
                       43892c822a4e34eb738a13ed901f635cf37cda14
                       84f5f37da57015e63d2d9057d69c606f2e172b8f
                       a530e55834dbfadc0b85a463c5c4b9b62085b1a2
                       4f3282e5d49ddfe86cd80fd25bb746564e0450c4
                       f28f4c4054383511baef757ee8d8ee66dd77d03f
                       1cd112e32b5a45400f048a72dd3af355b2aca882
                       fb22cb264275b7dcdf0602fc6c24f8b6ffcb483f
                       2784f5b673e2ac8e570e6180fe226e6ac1daf293
                       563d988c42971d478b4f666d62c424b23312cff3
                       bb05bdd4cdcb888bfbeab568f706539d09d9fcc2
                       00ca5c1c5fedb43cc11f3a6b6a03ad645b1e7be5
                       2ac1afae3c8e77320be450f4cdcdc6812b8a4f30
                       1bc1a04fa415befb7649ff5e572163515d975f4c
                       32d2ef45c807ea3641d05e99b3760e6de2016095
                       5cff7627d040e9f110bc0e462b7a7ef4df922b66
                       79c4212b91d99144bd90bf552de45ceb09e70a7d
                       7cffddb17fca03bff1fda2b5887ff8958093d5cc
                       05ff5734ad508e32249b6472d8028e37faa598fb
                       471735d4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3a:fb:c4:91:b3:e5:e5:17:ab:05:1d:8a:b8:3b:8f:b3:6e:4f:4b:5e]
            modulus: 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
    public exponent: 10001

] 
2021-08-12 14:08:01.870  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-12 14:08:01.872 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-12 14:08:01.874 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-08-12 14:08:01.874 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-12 14:08:01.875  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-08-12 14:08:01.876  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-12 14:08:01.876  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 14:08:01.877  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-12 14:08:01.877  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-12 14:08:01.885  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-12 14:08:01.885  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 14:08:01.886  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 14:08:01.887  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-12 14:08:02.029  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-12 14:08:02.030  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-12 14:08:02.030 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-12 14:08:02.032 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-12 14:08:02.033  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1320
2021-08-12 14:08:02.058  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-12 14:08:02.060  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-12 14:08:02.060  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-12 14:08:02.061  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-12 14:08:02.061  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-12 14:08:02.062 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 14:08:02.062 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 14:08:02.063 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 14:08:02.063 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 14:08:02.064 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 14:08:02.064 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 14:08:02.065 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-12 14:08:02.069 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 4233020831250585597428192733065102626907395577
             IssuerDN: UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 12 10:51:59 UTC 2021
           Final Date: Tue Aug 12 10:51:58 UTC 2031
            SubjectDN: UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:f6:97:f4:a1:d8:dd:29:bd:f1:c6:09:ae:2f:ec:bd:d5:86:ee:fc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7d5a3ae34d467813c0fa82d082429600924ab375
                       43892c822a4e34eb738a13ed901f635cf37cda14
                       84f5f37da57015e63d2d9057d69c606f2e172b8f
                       a530e55834dbfadc0b85a463c5c4b9b62085b1a2
                       4f3282e5d49ddfe86cd80fd25bb746564e0450c4
                       f28f4c4054383511baef757ee8d8ee66dd77d03f
                       1cd112e32b5a45400f048a72dd3af355b2aca882
                       fb22cb264275b7dcdf0602fc6c24f8b6ffcb483f
                       2784f5b673e2ac8e570e6180fe226e6ac1daf293
                       563d988c42971d478b4f666d62c424b23312cff3
                       bb05bdd4cdcb888bfbeab568f706539d09d9fcc2
                       00ca5c1c5fedb43cc11f3a6b6a03ad645b1e7be5
                       2ac1afae3c8e77320be450f4cdcdc6812b8a4f30
                       1bc1a04fa415befb7649ff5e572163515d975f4c
                       32d2ef45c807ea3641d05e99b3760e6de2016095
                       5cff7627d040e9f110bc0e462b7a7ef4df922b66
                       79c4212b91d99144bd90bf552de45ceb09e70a7d
                       7cffddb17fca03bff1fda2b5887ff8958093d5cc
                       05ff5734ad508e32249b6472d8028e37faa598fb
                       471735d4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a2:61:26:50:56:fe:74:bf:63:13:4e:94:57:4c:d3:43:9e:65:25:3e]
            modulus: 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
    public exponent: 10001

] 
2021-08-12 14:08:36.050  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-12 14:08:36.051 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-12 14:08:36.053 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-08-12 14:08:36.054 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-12 14:08:36.054  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-08-12 14:08:36.055  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-12 14:08:36.056  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 14:08:36.056  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-12 14:08:36.057  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-12 14:08:36.061  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-12 14:08:36.061  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 14:08:36.062  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 14:08:36.062  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-12 14:08:36.137  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-12 14:08:36.138  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-12 14:08:36.139 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-12 14:08:36.143 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-12 14:08:36.158  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1320
2021-08-12 14:08:36.159  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-12 14:08:36.161  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-12 14:08:36.161  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-12 14:08:36.162  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-12 14:08:36.162  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-12 14:08:36.163 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 14:08:36.163 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 14:08:36.164 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 14:08:36.165 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 14:08:36.165 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 14:08:36.166 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 14:08:36.167 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-12 14:08:36.171 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 4233020831250585597428192733065102626907395577
             IssuerDN: UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 12 10:51:59 UTC 2021
           Final Date: Tue Aug 12 10:51:58 UTC 2031
            SubjectDN: UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:f6:97:f4:a1:d8:dd:29:bd:f1:c6:09:ae:2f:ec:bd:d5:86:ee:fc]
            modulus: d665c0001229f0c627a09148b648a02bf758188f1af611ef63cb63ba7b6617930df0d8a8471476a16e05abcf7730d9fb5c044ad7af7366d9153d0890309401a280dfdaf7e1aefd8d8b205a91295cca1ef6799f27839791a615752b62a06b6b0ca5c3d76f2bdd43fe60386888a4187a3362fd4c6c53515c12c9338faacd25c72878b13fc2d126c93d5d138464361988a675618f9fcbf74059f671cd84ed8ad488e9315e0f7628616f552d6dd0da800abcec27ca06ebad173d21868be231f51d6355cd4feef569c86e1b93a12f5e2aeb2bff391c5e402b364ebc4579e62e2e5d6b0e3f2db9e146cdcd60617e74d07f9a69dfb4b8d6c102795446d0aa4d4888c1d04d6841156a08f71da39461e9babcf797dd44c0435f41591d74d813f704aed797c802a4dc909a5fec54fe12108696de52b6469381fa1f359a89709384d6be470bfd7e6418e3b7714f698dbaa876855e6921513bd6610cc952a284a0dda66ada5d7b1a09abba0eedde947e7919e3aa9ae3ce9fa3517b269f7b69675f24c72971ff
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7d5a3ae34d467813c0fa82d082429600924ab375
                       43892c822a4e34eb738a13ed901f635cf37cda14
                       84f5f37da57015e63d2d9057d69c606f2e172b8f
                       a530e55834dbfadc0b85a463c5c4b9b62085b1a2
                       4f3282e5d49ddfe86cd80fd25bb746564e0450c4
                       f28f4c4054383511baef757ee8d8ee66dd77d03f
                       1cd112e32b5a45400f048a72dd3af355b2aca882
                       fb22cb264275b7dcdf0602fc6c24f8b6ffcb483f
                       2784f5b673e2ac8e570e6180fe226e6ac1daf293
                       563d988c42971d478b4f666d62c424b23312cff3
                       bb05bdd4cdcb888bfbeab568f706539d09d9fcc2
                       00ca5c1c5fedb43cc11f3a6b6a03ad645b1e7be5
                       2ac1afae3c8e77320be450f4cdcdc6812b8a4f30
                       1bc1a04fa415befb7649ff5e572163515d975f4c
                       32d2ef45c807ea3641d05e99b3760e6de2016095
                       5cff7627d040e9f110bc0e462b7a7ef4df922b66
                       79c4212b91d99144bd90bf552de45ceb09e70a7d
                       7cffddb17fca03bff1fda2b5887ff8958093d5cc
                       05ff5734ad508e32249b6472d8028e37faa598fb
                       471735d4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [27:39:73:81:41:3a:c8:59:18:40:ad:f1:2b:5d:41:90:ad:dc:42:7c]
            modulus: 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
    public exponent: 10001

] 
2021-08-12 14:09:08.130  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-12 14:09:08.131 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-12 14:09:08.132 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-08-12 14:09:08.133 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-12 14:09:08.133  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-08-12 14:09:08.133  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-12 14:09:08.134  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 14:09:08.134  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-12 14:09:08.134  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-12 14:09:08.139  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-12 14:09:08.140  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 14:09:08.140  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 14:09:08.141  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-12 14:09:08.206  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-12 14:09:08.207  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-12 14:09:08.208 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-12 14:09:08.211 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-12 14:09:08.212  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1320
2021-08-12 14:09:08.258  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-12 14:09:08.260  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-12 14:09:08.261  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-12 14:09:08.262  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-12 14:09:08.262  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-12 14:09:08.263 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 14:09:08.263 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 14:09:08.264 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 14:09:08.264 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 14:09:08.265 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 14:09:08.265 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 14:09:08.266 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-12 14:09:08.270 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 4233020831250585597428192733065102626907395577
             IssuerDN: UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 12 10:51:59 UTC 2021
           Final Date: Tue Aug 12 10:51:58 UTC 2031
            SubjectDN: UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:f6:97:f4:a1:d8:dd:29:bd:f1:c6:09:ae:2f:ec:bd:d5:86:ee:fc]
            modulus: d665c0001229f0c627a09148b648a02bf758188f1af611ef63cb63ba7b6617930df0d8a8471476a16e05abcf7730d9fb5c044ad7af7366d9153d0890309401a280dfdaf7e1aefd8d8b205a91295cca1ef6799f27839791a615752b62a06b6b0ca5c3d76f2bdd43fe60386888a4187a3362fd4c6c53515c12c9338faacd25c72878b13fc2d126c93d5d138464361988a675618f9fcbf74059f671cd84ed8ad488e9315e0f7628616f552d6dd0da800abcec27ca06ebad173d21868be231f51d6355cd4feef569c86e1b93a12f5e2aeb2bff391c5e402b364ebc4579e62e2e5d6b0e3f2db9e146cdcd60617e74d07f9a69dfb4b8d6c102795446d0aa4d4888c1d04d6841156a08f71da39461e9babcf797dd44c0435f41591d74d813f704aed797c802a4dc909a5fec54fe12108696de52b6469381fa1f359a89709384d6be470bfd7e6418e3b7714f698dbaa876855e6921513bd6610cc952a284a0dda66ada5d7b1a09abba0eedde947e7919e3aa9ae3ce9fa3517b269f7b69675f24c72971ff
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7d5a3ae34d467813c0fa82d082429600924ab375
                       43892c822a4e34eb738a13ed901f635cf37cda14
                       84f5f37da57015e63d2d9057d69c606f2e172b8f
                       a530e55834dbfadc0b85a463c5c4b9b62085b1a2
                       4f3282e5d49ddfe86cd80fd25bb746564e0450c4
                       f28f4c4054383511baef757ee8d8ee66dd77d03f
                       1cd112e32b5a45400f048a72dd3af355b2aca882
                       fb22cb264275b7dcdf0602fc6c24f8b6ffcb483f
                       2784f5b673e2ac8e570e6180fe226e6ac1daf293
                       563d988c42971d478b4f666d62c424b23312cff3
                       bb05bdd4cdcb888bfbeab568f706539d09d9fcc2
                       00ca5c1c5fedb43cc11f3a6b6a03ad645b1e7be5
                       2ac1afae3c8e77320be450f4cdcdc6812b8a4f30
                       1bc1a04fa415befb7649ff5e572163515d975f4c
                       32d2ef45c807ea3641d05e99b3760e6de2016095
                       5cff7627d040e9f110bc0e462b7a7ef4df922b66
                       79c4212b91d99144bd90bf552de45ceb09e70a7d
                       7cffddb17fca03bff1fda2b5887ff8958093d5cc
                       05ff5734ad508e32249b6472d8028e37faa598fb
                       471735d4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [82:47:37:f6:23:87:f9:5b:e1:f0:2a:6f:ce:15:15:56:a9:bd:23:42]
            modulus: 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
    public exponent: 10001

] 
2021-08-12 14:10:39.551  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-12 14:10:39.552 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-12 14:10:39.553 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-08-12 14:10:39.553 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-12 14:10:39.554  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-08-12 14:10:39.554  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-12 14:10:39.555  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 14:10:39.555  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-12 14:10:39.555  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-12 14:10:39.560  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-12 14:10:39.561  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 14:10:39.561  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 14:10:39.562  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-12 14:10:39.630  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-12 14:10:39.630  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-12 14:10:39.658 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-12 14:10:39.660 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-12 14:10:39.661  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1320
2021-08-12 14:10:39.662  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-12 14:10:39.663  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-12 14:10:39.663  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-12 14:10:39.664  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-12 14:10:39.664  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-12 14:10:39.665 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 14:10:39.665 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 14:10:39.665 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 14:10:39.667 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 14:10:39.667 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 14:10:39.668 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 14:10:39.669 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-12 14:10:39.673 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 4233020831250585597428192733065102626907395577
             IssuerDN: UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 12 10:51:59 UTC 2021
           Final Date: Tue Aug 12 10:51:58 UTC 2031
            SubjectDN: UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:f6:97:f4:a1:d8:dd:29:bd:f1:c6:09:ae:2f:ec:bd:d5:86:ee:fc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7d5a3ae34d467813c0fa82d082429600924ab375
                       43892c822a4e34eb738a13ed901f635cf37cda14
                       84f5f37da57015e63d2d9057d69c606f2e172b8f
                       a530e55834dbfadc0b85a463c5c4b9b62085b1a2
                       4f3282e5d49ddfe86cd80fd25bb746564e0450c4
                       f28f4c4054383511baef757ee8d8ee66dd77d03f
                       1cd112e32b5a45400f048a72dd3af355b2aca882
                       fb22cb264275b7dcdf0602fc6c24f8b6ffcb483f
                       2784f5b673e2ac8e570e6180fe226e6ac1daf293
                       563d988c42971d478b4f666d62c424b23312cff3
                       bb05bdd4cdcb888bfbeab568f706539d09d9fcc2
                       00ca5c1c5fedb43cc11f3a6b6a03ad645b1e7be5
                       2ac1afae3c8e77320be450f4cdcdc6812b8a4f30
                       1bc1a04fa415befb7649ff5e572163515d975f4c
                       32d2ef45c807ea3641d05e99b3760e6de2016095
                       5cff7627d040e9f110bc0e462b7a7ef4df922b66
                       79c4212b91d99144bd90bf552de45ceb09e70a7d
                       7cffddb17fca03bff1fda2b5887ff8958093d5cc
                       05ff5734ad508e32249b6472d8028e37faa598fb
                       471735d4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [25:0b:d8:b3:62:03:77:c1:4b:49:af:d5:f5:54:fe:1d:38:c4:75:b5]
            modulus: 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
    public exponent: 10001

] 
2021-08-12 14:10:52.562  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-12 14:10:52.563 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-12 14:10:52.564 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-08-12 14:10:52.564 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-12 14:10:52.564  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-08-12 14:10:52.565  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-12 14:10:52.565  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 14:10:52.566  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-12 14:10:52.566  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-12 14:10:52.571  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-12 14:10:52.572  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 14:10:52.572  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 14:10:52.573  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-12 14:10:52.633  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-12 14:10:52.634  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-12 14:10:52.634 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-12 14:10:52.635 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-12 14:10:52.636  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1320
2021-08-12 14:10:52.636  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-12 14:10:52.637  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-12 14:10:52.637  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-12 14:10:52.638  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-12 14:10:52.638  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-12 14:10:52.638 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 14:10:52.639 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 14:10:52.639 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 14:10:52.640 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 14:10:52.640 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 14:10:52.640 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 14:10:52.658 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-12 14:10:52.663 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 4233020831250585597428192733065102626907395577
             IssuerDN: UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 12 10:51:59 UTC 2021
           Final Date: Tue Aug 12 10:51:58 UTC 2031
            SubjectDN: UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:f6:97:f4:a1:d8:dd:29:bd:f1:c6:09:ae:2f:ec:bd:d5:86:ee:fc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7d5a3ae34d467813c0fa82d082429600924ab375
                       43892c822a4e34eb738a13ed901f635cf37cda14
                       84f5f37da57015e63d2d9057d69c606f2e172b8f
                       a530e55834dbfadc0b85a463c5c4b9b62085b1a2
                       4f3282e5d49ddfe86cd80fd25bb746564e0450c4
                       f28f4c4054383511baef757ee8d8ee66dd77d03f
                       1cd112e32b5a45400f048a72dd3af355b2aca882
                       fb22cb264275b7dcdf0602fc6c24f8b6ffcb483f
                       2784f5b673e2ac8e570e6180fe226e6ac1daf293
                       563d988c42971d478b4f666d62c424b23312cff3
                       bb05bdd4cdcb888bfbeab568f706539d09d9fcc2
                       00ca5c1c5fedb43cc11f3a6b6a03ad645b1e7be5
                       2ac1afae3c8e77320be450f4cdcdc6812b8a4f30
                       1bc1a04fa415befb7649ff5e572163515d975f4c
                       32d2ef45c807ea3641d05e99b3760e6de2016095
                       5cff7627d040e9f110bc0e462b7a7ef4df922b66
                       79c4212b91d99144bd90bf552de45ceb09e70a7d
                       7cffddb17fca03bff1fda2b5887ff8958093d5cc
                       05ff5734ad508e32249b6472d8028e37faa598fb
                       471735d4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ee:24:ee:af:dc:cf:4a:9b:b0:13:81:56:3c:e1:a2:54:b3:c9:83:07]
            modulus: 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
    public exponent: 10001

] 
2021-08-12 14:11:37.093  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-12 14:11:37.093 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-12 14:11:37.094 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-08-12 14:11:37.094 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-12 14:11:37.095  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-08-12 14:11:37.095  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-12 14:11:37.095  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 14:11:37.096  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-12 14:11:37.096  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-12 14:11:37.100  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-12 14:11:37.100  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 14:11:37.100  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 14:11:37.101  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-12 14:11:37.173  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-12 14:11:37.174  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-12 14:11:37.174 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-12 14:11:37.176 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-12 14:11:37.177  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1320
2021-08-12 14:11:37.177  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-12 14:11:37.179  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-12 14:11:37.180  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-12 14:11:37.180  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-12 14:11:37.180  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-12 14:11:37.180 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 14:11:37.180 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 14:11:37.181 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 14:11:37.181 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 14:11:37.181 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 14:11:37.181 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 14:11:37.182 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-12 14:11:37.184 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 4233020831250585597428192733065102626907395577
             IssuerDN: UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 12 10:51:59 UTC 2021
           Final Date: Tue Aug 12 10:51:58 UTC 2031
            SubjectDN: UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:f6:97:f4:a1:d8:dd:29:bd:f1:c6:09:ae:2f:ec:bd:d5:86:ee:fc]
            modulus: d665c0001229f0c627a09148b648a02bf758188f1af611ef63cb63ba7b6617930df0d8a8471476a16e05abcf7730d9fb5c044ad7af7366d9153d0890309401a280dfdaf7e1aefd8d8b205a91295cca1ef6799f27839791a615752b62a06b6b0ca5c3d76f2bdd43fe60386888a4187a3362fd4c6c53515c12c9338faacd25c72878b13fc2d126c93d5d138464361988a675618f9fcbf74059f671cd84ed8ad488e9315e0f7628616f552d6dd0da800abcec27ca06ebad173d21868be231f51d6355cd4feef569c86e1b93a12f5e2aeb2bff391c5e402b364ebc4579e62e2e5d6b0e3f2db9e146cdcd60617e74d07f9a69dfb4b8d6c102795446d0aa4d4888c1d04d6841156a08f71da39461e9babcf797dd44c0435f41591d74d813f704aed797c802a4dc909a5fec54fe12108696de52b6469381fa1f359a89709384d6be470bfd7e6418e3b7714f698dbaa876855e6921513bd6610cc952a284a0dda66ada5d7b1a09abba0eedde947e7919e3aa9ae3ce9fa3517b269f7b69675f24c72971ff
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7d5a3ae34d467813c0fa82d082429600924ab375
                       43892c822a4e34eb738a13ed901f635cf37cda14
                       84f5f37da57015e63d2d9057d69c606f2e172b8f
                       a530e55834dbfadc0b85a463c5c4b9b62085b1a2
                       4f3282e5d49ddfe86cd80fd25bb746564e0450c4
                       f28f4c4054383511baef757ee8d8ee66dd77d03f
                       1cd112e32b5a45400f048a72dd3af355b2aca882
                       fb22cb264275b7dcdf0602fc6c24f8b6ffcb483f
                       2784f5b673e2ac8e570e6180fe226e6ac1daf293
                       563d988c42971d478b4f666d62c424b23312cff3
                       bb05bdd4cdcb888bfbeab568f706539d09d9fcc2
                       00ca5c1c5fedb43cc11f3a6b6a03ad645b1e7be5
                       2ac1afae3c8e77320be450f4cdcdc6812b8a4f30
                       1bc1a04fa415befb7649ff5e572163515d975f4c
                       32d2ef45c807ea3641d05e99b3760e6de2016095
                       5cff7627d040e9f110bc0e462b7a7ef4df922b66
                       79c4212b91d99144bd90bf552de45ceb09e70a7d
                       7cffddb17fca03bff1fda2b5887ff8958093d5cc
                       05ff5734ad508e32249b6472d8028e37faa598fb
                       471735d4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e5:4f:30:11:63:37:1d:67:ca:6a:d8:36:ff:17:20:af:ac:df:67:c1]
            modulus: a4c5718a65073a63b46f745b943c206841469a5efea7917f1498e9bfb367c22838757bc3e9b206bff56ec07b0510506814201087ca115fa0ca3ee789c7b3f6f415a8cf64b44cc5c1714d25a34aaccb81d96564542c429d47e016cf6284b22800299a7dd6a34b6ccefd3570757c34f0d86c4a2a63ec3be5d029f65c5ccfadd91646cf7c233265098f1d749b864c63c03bf8aadf9fe9461460f085402a56a31dbecdda91213396f33e50e8b1e1257a96c8f35d7e4abb4b126013cbde35109258073eb485b4a352d23c8c0dc547b5c864b0fece6dfa1df6f90df536e880b5e3dde2be8e301f27f7287aed50e9b272a391a1715f68422bf46ca448cc0611066f2d81
    public exponent: 10001

] 
2021-08-12 14:12:39.853  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-12 14:12:39.854 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-12 14:12:39.855 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-08-12 14:12:39.856 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-12 14:12:39.856  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-08-12 14:12:39.856  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-12 14:12:39.857  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 14:12:39.857  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-12 14:12:39.857  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-12 14:12:39.862  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-12 14:12:39.863  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 14:12:39.863  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 14:12:39.864  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-12 14:12:39.950  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-12 14:12:39.951  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-12 14:12:39.951 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-12 14:12:39.952 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-12 14:12:39.952  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1320
2021-08-12 14:12:39.953  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-12 14:12:39.954  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-12 14:12:39.954  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-12 14:12:39.955  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-12 14:12:39.955  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-12 14:12:39.955 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 14:12:39.956 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 14:12:39.956 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 14:12:39.956 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 14:12:39.957 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 14:12:39.957 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 14:12:39.958 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-12 14:12:39.962 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 4233020831250585597428192733065102626907395577
             IssuerDN: UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 12 10:51:59 UTC 2021
           Final Date: Tue Aug 12 10:51:58 UTC 2031
            SubjectDN: UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:f6:97:f4:a1:d8:dd:29:bd:f1:c6:09:ae:2f:ec:bd:d5:86:ee:fc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7d5a3ae34d467813c0fa82d082429600924ab375
                       43892c822a4e34eb738a13ed901f635cf37cda14
                       84f5f37da57015e63d2d9057d69c606f2e172b8f
                       a530e55834dbfadc0b85a463c5c4b9b62085b1a2
                       4f3282e5d49ddfe86cd80fd25bb746564e0450c4
                       f28f4c4054383511baef757ee8d8ee66dd77d03f
                       1cd112e32b5a45400f048a72dd3af355b2aca882
                       fb22cb264275b7dcdf0602fc6c24f8b6ffcb483f
                       2784f5b673e2ac8e570e6180fe226e6ac1daf293
                       563d988c42971d478b4f666d62c424b23312cff3
                       bb05bdd4cdcb888bfbeab568f706539d09d9fcc2
                       00ca5c1c5fedb43cc11f3a6b6a03ad645b1e7be5
                       2ac1afae3c8e77320be450f4cdcdc6812b8a4f30
                       1bc1a04fa415befb7649ff5e572163515d975f4c
                       32d2ef45c807ea3641d05e99b3760e6de2016095
                       5cff7627d040e9f110bc0e462b7a7ef4df922b66
                       79c4212b91d99144bd90bf552de45ceb09e70a7d
                       7cffddb17fca03bff1fda2b5887ff8958093d5cc
                       05ff5734ad508e32249b6472d8028e37faa598fb
                       471735d4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9e:56:b1:77:7b:df:c3:31:7f:20:72:e6:7e:80:42:d0:88:6b:86:b1]
            modulus: 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
    public exponent: 10001

] 
2021-08-12 14:14:04.973  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-12 14:14:04.975 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-12 14:14:04.976 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-08-12 14:14:04.977 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-12 14:14:04.978  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-08-12 14:14:04.978  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-12 14:14:04.979  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 14:14:04.979  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-12 14:14:04.980  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-12 14:14:04.983  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-12 14:14:04.984  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 14:14:04.984  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 14:14:04.985  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-12 14:14:05.052  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-12 14:14:05.053  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-12 14:14:05.053 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-12 14:14:05.055 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-12 14:14:05.055  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1320
2021-08-12 14:14:05.056  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-12 14:14:05.057  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-12 14:14:05.058  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-12 14:14:05.058  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-12 14:14:05.059  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-12 14:14:05.059 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 14:14:05.059 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 14:14:05.060 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 14:14:05.060 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 14:14:05.060 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 14:14:05.061 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 14:14:05.062 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-12 14:14:05.065 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 4233020831250585597428192733065102626907395577
             IssuerDN: UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 12 10:51:59 UTC 2021
           Final Date: Tue Aug 12 10:51:58 UTC 2031
            SubjectDN: UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:f6:97:f4:a1:d8:dd:29:bd:f1:c6:09:ae:2f:ec:bd:d5:86:ee:fc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7d5a3ae34d467813c0fa82d082429600924ab375
                       43892c822a4e34eb738a13ed901f635cf37cda14
                       84f5f37da57015e63d2d9057d69c606f2e172b8f
                       a530e55834dbfadc0b85a463c5c4b9b62085b1a2
                       4f3282e5d49ddfe86cd80fd25bb746564e0450c4
                       f28f4c4054383511baef757ee8d8ee66dd77d03f
                       1cd112e32b5a45400f048a72dd3af355b2aca882
                       fb22cb264275b7dcdf0602fc6c24f8b6ffcb483f
                       2784f5b673e2ac8e570e6180fe226e6ac1daf293
                       563d988c42971d478b4f666d62c424b23312cff3
                       bb05bdd4cdcb888bfbeab568f706539d09d9fcc2
                       00ca5c1c5fedb43cc11f3a6b6a03ad645b1e7be5
                       2ac1afae3c8e77320be450f4cdcdc6812b8a4f30
                       1bc1a04fa415befb7649ff5e572163515d975f4c
                       32d2ef45c807ea3641d05e99b3760e6de2016095
                       5cff7627d040e9f110bc0e462b7a7ef4df922b66
                       79c4212b91d99144bd90bf552de45ceb09e70a7d
                       7cffddb17fca03bff1fda2b5887ff8958093d5cc
                       05ff5734ad508e32249b6472d8028e37faa598fb
                       471735d4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [48:9f:7c:9b:30:d6:6b:3d:0e:ea:6f:1b:07:5f:f6:d2:89:c0:00:e3]
            modulus: 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
    public exponent: 10001

] 
2021-08-12 14:14:32.025  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-12 14:14:32.026 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-12 14:14:32.027 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-08-12 14:14:32.028 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-12 14:14:32.028  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-08-12 14:14:32.029  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-12 14:14:32.029  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 14:14:32.029  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-12 14:14:32.030  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-12 14:14:32.034  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-12 14:14:32.035  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 14:14:32.035  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 14:14:32.036  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-12 14:14:32.121  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-12 14:14:32.122  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-12 14:14:32.122 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-12 14:14:32.123 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-12 14:14:32.124  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1320
2021-08-12 14:14:32.124  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-12 14:14:32.125  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-12 14:14:32.126  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-12 14:14:32.126  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-12 14:14:32.126  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-12 14:14:32.127 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 14:14:32.127 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 14:14:32.127 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 14:14:32.128 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 14:14:32.128 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 14:14:32.128 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 14:14:32.129 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-12 14:14:32.132 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 4233020831250585597428192733065102626907395577
             IssuerDN: UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 12 10:51:59 UTC 2021
           Final Date: Tue Aug 12 10:51:58 UTC 2031
            SubjectDN: UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:f6:97:f4:a1:d8:dd:29:bd:f1:c6:09:ae:2f:ec:bd:d5:86:ee:fc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7d5a3ae34d467813c0fa82d082429600924ab375
                       43892c822a4e34eb738a13ed901f635cf37cda14
                       84f5f37da57015e63d2d9057d69c606f2e172b8f
                       a530e55834dbfadc0b85a463c5c4b9b62085b1a2
                       4f3282e5d49ddfe86cd80fd25bb746564e0450c4
                       f28f4c4054383511baef757ee8d8ee66dd77d03f
                       1cd112e32b5a45400f048a72dd3af355b2aca882
                       fb22cb264275b7dcdf0602fc6c24f8b6ffcb483f
                       2784f5b673e2ac8e570e6180fe226e6ac1daf293
                       563d988c42971d478b4f666d62c424b23312cff3
                       bb05bdd4cdcb888bfbeab568f706539d09d9fcc2
                       00ca5c1c5fedb43cc11f3a6b6a03ad645b1e7be5
                       2ac1afae3c8e77320be450f4cdcdc6812b8a4f30
                       1bc1a04fa415befb7649ff5e572163515d975f4c
                       32d2ef45c807ea3641d05e99b3760e6de2016095
                       5cff7627d040e9f110bc0e462b7a7ef4df922b66
                       79c4212b91d99144bd90bf552de45ceb09e70a7d
                       7cffddb17fca03bff1fda2b5887ff8958093d5cc
                       05ff5734ad508e32249b6472d8028e37faa598fb
                       471735d4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a5:a1:78:99:48:5a:9e:51:20:77:44:9f:3b:11:cf:fb:8e:c9:c8:b2]
            modulus: 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
    public exponent: 10001

] 
2021-08-12 14:17:58.757  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-12 14:17:58.758 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-12 14:17:58.759 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-08-12 14:17:58.760 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-12 14:17:58.760  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-08-12 14:17:58.760  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-12 14:17:58.761  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 14:17:58.761  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-12 14:17:58.761  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-12 14:17:58.766  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-12 14:17:58.767  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 14:17:58.767  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 14:17:58.768  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-12 14:17:58.853  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-12 14:17:58.858  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-12 14:17:58.859 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-12 14:17:58.860 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-12 14:17:58.861  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1320
2021-08-12 14:17:58.862  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-12 14:17:58.864  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-12 14:17:58.864  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-12 14:17:58.864  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-12 14:17:58.865  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-12 14:17:58.865 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 14:17:58.865 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 14:17:58.865 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 14:17:58.866 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 14:17:58.866 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 14:17:58.866 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 14:17:58.867 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-12 14:17:58.870 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 4233020831250585597428192733065102626907395577
             IssuerDN: UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 12 10:51:59 UTC 2021
           Final Date: Tue Aug 12 10:51:58 UTC 2031
            SubjectDN: UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:f6:97:f4:a1:d8:dd:29:bd:f1:c6:09:ae:2f:ec:bd:d5:86:ee:fc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7d5a3ae34d467813c0fa82d082429600924ab375
                       43892c822a4e34eb738a13ed901f635cf37cda14
                       84f5f37da57015e63d2d9057d69c606f2e172b8f
                       a530e55834dbfadc0b85a463c5c4b9b62085b1a2
                       4f3282e5d49ddfe86cd80fd25bb746564e0450c4
                       f28f4c4054383511baef757ee8d8ee66dd77d03f
                       1cd112e32b5a45400f048a72dd3af355b2aca882
                       fb22cb264275b7dcdf0602fc6c24f8b6ffcb483f
                       2784f5b673e2ac8e570e6180fe226e6ac1daf293
                       563d988c42971d478b4f666d62c424b23312cff3
                       bb05bdd4cdcb888bfbeab568f706539d09d9fcc2
                       00ca5c1c5fedb43cc11f3a6b6a03ad645b1e7be5
                       2ac1afae3c8e77320be450f4cdcdc6812b8a4f30
                       1bc1a04fa415befb7649ff5e572163515d975f4c
                       32d2ef45c807ea3641d05e99b3760e6de2016095
                       5cff7627d040e9f110bc0e462b7a7ef4df922b66
                       79c4212b91d99144bd90bf552de45ceb09e70a7d
                       7cffddb17fca03bff1fda2b5887ff8958093d5cc
                       05ff5734ad508e32249b6472d8028e37faa598fb
                       471735d4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [54:ac:75:f2:54:f3:60:c2:0e:66:4d:b8:5b:cb:12:e8:98:4b:73:8a]
            modulus: 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
    public exponent: 10001

] 
2021-08-12 14:21:12.359  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-12 14:21:12.360 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-12 14:21:12.362 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-08-12 14:21:12.363 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-12 14:21:12.363  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-08-12 14:21:12.364  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-12 14:21:12.364  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 14:21:12.364  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-12 14:21:12.365  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-12 14:21:12.370  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-12 14:21:12.370  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 14:21:12.370  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 14:21:12.371  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-12 14:21:12.462  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-12 14:21:12.463  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-12 14:21:12.463 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-12 14:21:12.464 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-12 14:21:12.464  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1320
2021-08-12 14:21:12.464  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-12 14:21:12.465  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-12 14:21:12.466  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-12 14:21:12.466  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-12 14:21:12.466  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-12 14:21:12.466 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 14:21:12.466 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 14:21:12.467 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 14:21:12.467 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 14:21:12.467 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 14:21:12.467 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 14:21:12.468 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-12 14:21:12.471 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 4233020831250585597428192733065102626907395577
             IssuerDN: UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 12 10:51:59 UTC 2021
           Final Date: Tue Aug 12 10:51:58 UTC 2031
            SubjectDN: UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:f6:97:f4:a1:d8:dd:29:bd:f1:c6:09:ae:2f:ec:bd:d5:86:ee:fc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7d5a3ae34d467813c0fa82d082429600924ab375
                       43892c822a4e34eb738a13ed901f635cf37cda14
                       84f5f37da57015e63d2d9057d69c606f2e172b8f
                       a530e55834dbfadc0b85a463c5c4b9b62085b1a2
                       4f3282e5d49ddfe86cd80fd25bb746564e0450c4
                       f28f4c4054383511baef757ee8d8ee66dd77d03f
                       1cd112e32b5a45400f048a72dd3af355b2aca882
                       fb22cb264275b7dcdf0602fc6c24f8b6ffcb483f
                       2784f5b673e2ac8e570e6180fe226e6ac1daf293
                       563d988c42971d478b4f666d62c424b23312cff3
                       bb05bdd4cdcb888bfbeab568f706539d09d9fcc2
                       00ca5c1c5fedb43cc11f3a6b6a03ad645b1e7be5
                       2ac1afae3c8e77320be450f4cdcdc6812b8a4f30
                       1bc1a04fa415befb7649ff5e572163515d975f4c
                       32d2ef45c807ea3641d05e99b3760e6de2016095
                       5cff7627d040e9f110bc0e462b7a7ef4df922b66
                       79c4212b91d99144bd90bf552de45ceb09e70a7d
                       7cffddb17fca03bff1fda2b5887ff8958093d5cc
                       05ff5734ad508e32249b6472d8028e37faa598fb
                       471735d4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [df:ea:b8:f4:5d:a9:96:79:9f:59:75:21:4f:df:74:6f:a4:93:e9:a7]
            modulus: 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
    public exponent: 10001

] 
2021-08-12 14:22:50.772  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-12 14:22:50.773 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-12 14:22:50.775 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-08-12 14:22:50.775 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-12 14:22:50.776  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-08-12 14:22:50.776  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-12 14:22:50.777  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 14:22:50.777  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-12 14:22:50.778  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-12 14:22:50.782  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-12 14:22:50.783  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 14:22:50.783  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 14:22:50.784  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-12 14:22:50.858  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-12 14:22:50.858  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-12 14:22:50.858 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-12 14:22:50.862 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-12 14:22:50.862  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1320
2021-08-12 14:22:50.863  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-12 14:22:50.863  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-12 14:22:50.864  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-12 14:22:50.864  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-12 14:22:50.864  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-12 14:22:50.864 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 14:22:50.864 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 14:22:50.864 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 14:22:50.865 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 14:22:50.865 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 14:22:50.865 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 14:22:50.865 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-12 14:22:50.868 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 4233020831250585597428192733065102626907395577
             IssuerDN: UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 12 10:51:59 UTC 2021
           Final Date: Tue Aug 12 10:51:58 UTC 2031
            SubjectDN: UID=c-0iuc756m0hhw9igbh,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:f6:97:f4:a1:d8:dd:29:bd:f1:c6:09:ae:2f:ec:bd:d5:86:ee:fc]
            modulus: d665c0001229f0c627a09148b648a02bf758188f1af611ef63cb63ba7b6617930df0d8a8471476a16e05abcf7730d9fb5c044ad7af7366d9153d0890309401a280dfdaf7e1aefd8d8b205a91295cca1ef6799f27839791a615752b62a06b6b0ca5c3d76f2bdd43fe60386888a4187a3362fd4c6c53515c12c9338faacd25c72878b13fc2d126c93d5d138464361988a675618f9fcbf74059f671cd84ed8ad488e9315e0f7628616f552d6dd0da800abcec27ca06ebad173d21868be231f51d6355cd4feef569c86e1b93a12f5e2aeb2bff391c5e402b364ebc4579e62e2e5d6b0e3f2db9e146cdcd60617e74d07f9a69dfb4b8d6c102795446d0aa4d4888c1d04d6841156a08f71da39461e9babcf797dd44c0435f41591d74d813f704aed797c802a4dc909a5fec54fe12108696de52b6469381fa1f359a89709384d6be470bfd7e6418e3b7714f698dbaa876855e6921513bd6610cc952a284a0dda66ada5d7b1a09abba0eedde947e7919e3aa9ae3ce9fa3517b269f7b69675f24c72971ff
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7d5a3ae34d467813c0fa82d082429600924ab375
                       43892c822a4e34eb738a13ed901f635cf37cda14
                       84f5f37da57015e63d2d9057d69c606f2e172b8f
                       a530e55834dbfadc0b85a463c5c4b9b62085b1a2
                       4f3282e5d49ddfe86cd80fd25bb746564e0450c4
                       f28f4c4054383511baef757ee8d8ee66dd77d03f
                       1cd112e32b5a45400f048a72dd3af355b2aca882
                       fb22cb264275b7dcdf0602fc6c24f8b6ffcb483f
                       2784f5b673e2ac8e570e6180fe226e6ac1daf293
                       563d988c42971d478b4f666d62c424b23312cff3
                       bb05bdd4cdcb888bfbeab568f706539d09d9fcc2
                       00ca5c1c5fedb43cc11f3a6b6a03ad645b1e7be5
                       2ac1afae3c8e77320be450f4cdcdc6812b8a4f30
                       1bc1a04fa415befb7649ff5e572163515d975f4c
                       32d2ef45c807ea3641d05e99b3760e6de2016095
                       5cff7627d040e9f110bc0e462b7a7ef4df922b66
                       79c4212b91d99144bd90bf552de45ceb09e70a7d
                       7cffddb17fca03bff1fda2b5887ff8958093d5cc
                       05ff5734ad508e32249b6472d8028e37faa598fb
                       471735d4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [72:9a:84:9c:4c:5c:fa:64:35:a2:ad:98:3e:67:f6:74:59:cb:0f:28]
            modulus: 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
    public exponent: 10001

]