Results

By type

          2021-09-07 02:21:19,087 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-09-07 02:21:22,787 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-09-07 02:21:25.388  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-09-07 02:21:36.777 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-09-07 02:21:37.875  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-09-07 02:21:38.481  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-09-07 02:21:50.978  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 33.994 seconds (JVM running for 40.631)
2021-09-07 02:36:54.480  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-07 02:36:54.577 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-07 02:36:54.675 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-09-07 02:36:54.682 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-07 02:36:54.780  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-09-07 02:36:54.783  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-07 02:36:54.874  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-07 02:36:54.875  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 02:36:54.875  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-07 02:36:54.882  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-07 02:36:54.886  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-07 02:36:55.077  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-07 02:36:55.083  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 02:36:55.083  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 02:36:55.176  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-07 02:36:56.383  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-07 02:36:56.387  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-07 02:36:56.387 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-07 02:36:56.393 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-07 02:36:56.395  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1051
2021-09-07 02:36:56.395  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-07 02:36:56.472  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-07 02:36:56.473  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-07 02:36:56.480  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-07 02:36:56.481  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-07 02:36:56.481 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 02:36:56.482 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 02:36:56.482 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 02:36:56.495 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 02:36:56.496 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 02:36:56.570 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 02:36:56.578 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-07 02:36:56.684 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373080454980337413300303407909358500915481267252
             IssuerDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 07 01:51:59 UTC 2021
           Final Date: Sun Sep 07 01:51:58 UTC 2031
            SubjectDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [84:b2:29:f5:c9:4d:75:65:3b:87:0d:e5:cb:93:b6:b1:f9:19:38:f5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a877486f10bcf67b637cd73a15014236022943ee
                       a991d3c52753b73130fb1d15bddc043c21ef54b9
                       105e268829ed67c9e399efac3b83772db32ab1a8
                       2947b1de498034b6554bc6f42eb192201aaadc0b
                       5027e8c8dbeb728fed83432f764e9494262af1dc
                       22bff9e160f3d07ae4fa58cff44beb94cfac0240
                       09f6efc95b4c7ed0d81be1e1422a7bcda684a496
                       b3a18caceb4f347b1ea315cbc5ebcea17d430917
                       fad0292e063c4865ef4f27f0f8daa348eb75c36d
                       e0d1a4d1bac691472d3088971f32689327c577fd
                       d62e5ecea046bcde93b966c4a8b378871928b0bd
                       3a29e2daade444f11403c584f96504066019cac7
                       86c2afbd6d822a16fc8513b0228a6d21666eff2c
                       d6a7893a600a763f293b948598f32c74bc0aab71
                       a7243965d89aed7764053bd4becf44176f45fbd6
                       4958a3a0cc52791c2e3c99cc2e0cc739e78decde
                       f5ee98dbf59fb1972fc7dc321c6dc953a05d1166
                       681e45257c5a2aa744563df20466102ef3a77e41
                       b27e1ab7881638b3d085c71cd65f78d2fb828837
                       53d9ef34
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [af:23:06:19:73:c2:35:e6:dd:ab:ca:c9:b9:76:7f:ee:8f:37:ae:cb]
            modulus: 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
    public exponent: 10001

] 
2021-09-07 05:05:12.359  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-07 05:05:12.361 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-07 05:05:12.363 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-07 05:05:12.364 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-07 05:05:12.364  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-07 05:05:12.365  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-07 05:05:12.366  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-07 05:05:12.366  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-07 05:05:12.367  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-07 05:05:12.373  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-07 05:05:12.374  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:05:12.374  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:05:12.377  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-07 05:05:12.483  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-07 05:05:12.484  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-07 05:05:12.484 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-07 05:05:12.486 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-07 05:05:12.487  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1051
2021-09-07 05:05:12.487  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-07 05:05:12.489  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-07 05:05:12.490  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-07 05:05:12.490  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-07 05:05:12.490  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-07 05:05:12.491 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:05:12.491 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:05:12.491 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:05:12.492 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:05:12.493 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:05:12.493 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:05:12.494 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-07 05:05:12.574 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373080454980337413300303407909358500915481267252
             IssuerDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 07 01:51:59 UTC 2021
           Final Date: Sun Sep 07 01:51:58 UTC 2031
            SubjectDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [84:b2:29:f5:c9:4d:75:65:3b:87:0d:e5:cb:93:b6:b1:f9:19:38:f5]
            modulus: c9f39d6d1474478b1180c7a3d41a99f483ffb8ff5b76e93ae01fd6b863f589e5882428f76970d6f2d85b7affc94efbdb705082b5cdb0fcccb6455c03cb565b02380b4b12c831f2ecf4a96d7f5e3e79562a78f1e31357d35dfd0dfc7de11e2aaf05838d6fc57fef574c4f7162c296c3030e9ac7e9e0b9ce08aa397bcc3af08a869609199c2075d321f168fe215381a8c00ac94acaaefa7a5172edf726ff4c3141cba0ef3d37077b853e64af7412366095881999906222bfb789b8d4ec5979a393dec89ce0b286f0f0e708261025b7793a916a99f66cf383c71d7ad3761666216e059daaff5e6f6242e6da8e9c41b21fefeb0eabcefecc1d0960f10bcea1e3cbb84dbf42d014b96b12a0438f03e2d573b767f90db0f34591399bc1dbbc57daeec4d7f2e3fdd4a40baf8b41bada03989b106e372fd89bd30ba8be35417ebcdce8e71dde4e80d340f2660c2db3f4baa7a6dc96a6afc5ffab4a5b38e48a43eae48687fb8106e94b4910356d6d7a34340b1e71e423ad276fe9d8c8b2dd81a400b2b441
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a877486f10bcf67b637cd73a15014236022943ee
                       a991d3c52753b73130fb1d15bddc043c21ef54b9
                       105e268829ed67c9e399efac3b83772db32ab1a8
                       2947b1de498034b6554bc6f42eb192201aaadc0b
                       5027e8c8dbeb728fed83432f764e9494262af1dc
                       22bff9e160f3d07ae4fa58cff44beb94cfac0240
                       09f6efc95b4c7ed0d81be1e1422a7bcda684a496
                       b3a18caceb4f347b1ea315cbc5ebcea17d430917
                       fad0292e063c4865ef4f27f0f8daa348eb75c36d
                       e0d1a4d1bac691472d3088971f32689327c577fd
                       d62e5ecea046bcde93b966c4a8b378871928b0bd
                       3a29e2daade444f11403c584f96504066019cac7
                       86c2afbd6d822a16fc8513b0228a6d21666eff2c
                       d6a7893a600a763f293b948598f32c74bc0aab71
                       a7243965d89aed7764053bd4becf44176f45fbd6
                       4958a3a0cc52791c2e3c99cc2e0cc739e78decde
                       f5ee98dbf59fb1972fc7dc321c6dc953a05d1166
                       681e45257c5a2aa744563df20466102ef3a77e41
                       b27e1ab7881638b3d085c71cd65f78d2fb828837
                       53d9ef34
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d2:18:68:97:7e:6b:3d:33:b7:9f:ae:66:36:c4:43:6d:2b:2c:67:f8]
            modulus: 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
    public exponent: 10001

] 
2021-09-07 05:07:53.647  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-07 05:07:53.649 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-07 05:07:53.650 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-09-07 05:07:53.651 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-07 05:07:53.652  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-09-07 05:07:53.653  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-07 05:07:53.653  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-07 05:07:53.653  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-07 05:07:53.654  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-07 05:07:53.662  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-07 05:07:53.662  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:07:53.663  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:07:53.664  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-07 05:07:53.745  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-07 05:07:53.745  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-07 05:07:53.746 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-07 05:07:53.772 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-07 05:07:53.773  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1051
2021-09-07 05:07:53.773  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-07 05:07:53.774  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-07 05:07:53.774  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-07 05:07:53.775  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-07 05:07:53.775  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-07 05:07:53.775 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:07:53.776 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:07:53.776 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:07:53.777 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:07:53.777 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:07:53.777 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:07:53.778 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-07 05:07:53.781 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373080454980337413300303407909358500915481267252
             IssuerDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 07 01:51:59 UTC 2021
           Final Date: Sun Sep 07 01:51:58 UTC 2031
            SubjectDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [84:b2:29:f5:c9:4d:75:65:3b:87:0d:e5:cb:93:b6:b1:f9:19:38:f5]
            modulus: c9f39d6d1474478b1180c7a3d41a99f483ffb8ff5b76e93ae01fd6b863f589e5882428f76970d6f2d85b7affc94efbdb705082b5cdb0fcccb6455c03cb565b02380b4b12c831f2ecf4a96d7f5e3e79562a78f1e31357d35dfd0dfc7de11e2aaf05838d6fc57fef574c4f7162c296c3030e9ac7e9e0b9ce08aa397bcc3af08a869609199c2075d321f168fe215381a8c00ac94acaaefa7a5172edf726ff4c3141cba0ef3d37077b853e64af7412366095881999906222bfb789b8d4ec5979a393dec89ce0b286f0f0e708261025b7793a916a99f66cf383c71d7ad3761666216e059daaff5e6f6242e6da8e9c41b21fefeb0eabcefecc1d0960f10bcea1e3cbb84dbf42d014b96b12a0438f03e2d573b767f90db0f34591399bc1dbbc57daeec4d7f2e3fdd4a40baf8b41bada03989b106e372fd89bd30ba8be35417ebcdce8e71dde4e80d340f2660c2db3f4baa7a6dc96a6afc5ffab4a5b38e48a43eae48687fb8106e94b4910356d6d7a34340b1e71e423ad276fe9d8c8b2dd81a400b2b441
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a877486f10bcf67b637cd73a15014236022943ee
                       a991d3c52753b73130fb1d15bddc043c21ef54b9
                       105e268829ed67c9e399efac3b83772db32ab1a8
                       2947b1de498034b6554bc6f42eb192201aaadc0b
                       5027e8c8dbeb728fed83432f764e9494262af1dc
                       22bff9e160f3d07ae4fa58cff44beb94cfac0240
                       09f6efc95b4c7ed0d81be1e1422a7bcda684a496
                       b3a18caceb4f347b1ea315cbc5ebcea17d430917
                       fad0292e063c4865ef4f27f0f8daa348eb75c36d
                       e0d1a4d1bac691472d3088971f32689327c577fd
                       d62e5ecea046bcde93b966c4a8b378871928b0bd
                       3a29e2daade444f11403c584f96504066019cac7
                       86c2afbd6d822a16fc8513b0228a6d21666eff2c
                       d6a7893a600a763f293b948598f32c74bc0aab71
                       a7243965d89aed7764053bd4becf44176f45fbd6
                       4958a3a0cc52791c2e3c99cc2e0cc739e78decde
                       f5ee98dbf59fb1972fc7dc321c6dc953a05d1166
                       681e45257c5a2aa744563df20466102ef3a77e41
                       b27e1ab7881638b3d085c71cd65f78d2fb828837
                       53d9ef34
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8a:51:47:5a:a7:5c:20:bf:e6:7b:f0:3c:06:08:b2:a9:44:3b:b9:45]
            modulus: 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
    public exponent: 10001

] 
2021-09-07 05:09:46.726  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-07 05:09:46.727 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-07 05:09:46.728 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-09-07 05:09:46.729 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-07 05:09:46.729  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-09-07 05:09:46.730  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-07 05:09:46.730  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-07 05:09:46.730  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-07 05:09:46.731  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-07 05:09:46.735  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-07 05:09:46.735  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:09:46.736  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:09:46.737  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-07 05:09:46.849  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-07 05:09:46.850  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-07 05:09:46.850 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-07 05:09:46.852 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-07 05:09:46.853  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1051
2021-09-07 05:09:46.853  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-07 05:09:46.855  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-07 05:09:46.855  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-07 05:09:46.856  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-07 05:09:46.856  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-07 05:09:46.856 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:09:46.857 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:09:46.857 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:09:46.858 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:09:46.858 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:09:46.870 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:09:46.871 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-07 05:09:46.874 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373080454980337413300303407909358500915481267252
             IssuerDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 07 01:51:59 UTC 2021
           Final Date: Sun Sep 07 01:51:58 UTC 2031
            SubjectDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [84:b2:29:f5:c9:4d:75:65:3b:87:0d:e5:cb:93:b6:b1:f9:19:38:f5]
            modulus: c9f39d6d1474478b1180c7a3d41a99f483ffb8ff5b76e93ae01fd6b863f589e5882428f76970d6f2d85b7affc94efbdb705082b5cdb0fcccb6455c03cb565b02380b4b12c831f2ecf4a96d7f5e3e79562a78f1e31357d35dfd0dfc7de11e2aaf05838d6fc57fef574c4f7162c296c3030e9ac7e9e0b9ce08aa397bcc3af08a869609199c2075d321f168fe215381a8c00ac94acaaefa7a5172edf726ff4c3141cba0ef3d37077b853e64af7412366095881999906222bfb789b8d4ec5979a393dec89ce0b286f0f0e708261025b7793a916a99f66cf383c71d7ad3761666216e059daaff5e6f6242e6da8e9c41b21fefeb0eabcefecc1d0960f10bcea1e3cbb84dbf42d014b96b12a0438f03e2d573b767f90db0f34591399bc1dbbc57daeec4d7f2e3fdd4a40baf8b41bada03989b106e372fd89bd30ba8be35417ebcdce8e71dde4e80d340f2660c2db3f4baa7a6dc96a6afc5ffab4a5b38e48a43eae48687fb8106e94b4910356d6d7a34340b1e71e423ad276fe9d8c8b2dd81a400b2b441
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a877486f10bcf67b637cd73a15014236022943ee
                       a991d3c52753b73130fb1d15bddc043c21ef54b9
                       105e268829ed67c9e399efac3b83772db32ab1a8
                       2947b1de498034b6554bc6f42eb192201aaadc0b
                       5027e8c8dbeb728fed83432f764e9494262af1dc
                       22bff9e160f3d07ae4fa58cff44beb94cfac0240
                       09f6efc95b4c7ed0d81be1e1422a7bcda684a496
                       b3a18caceb4f347b1ea315cbc5ebcea17d430917
                       fad0292e063c4865ef4f27f0f8daa348eb75c36d
                       e0d1a4d1bac691472d3088971f32689327c577fd
                       d62e5ecea046bcde93b966c4a8b378871928b0bd
                       3a29e2daade444f11403c584f96504066019cac7
                       86c2afbd6d822a16fc8513b0228a6d21666eff2c
                       d6a7893a600a763f293b948598f32c74bc0aab71
                       a7243965d89aed7764053bd4becf44176f45fbd6
                       4958a3a0cc52791c2e3c99cc2e0cc739e78decde
                       f5ee98dbf59fb1972fc7dc321c6dc953a05d1166
                       681e45257c5a2aa744563df20466102ef3a77e41
                       b27e1ab7881638b3d085c71cd65f78d2fb828837
                       53d9ef34
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b0:4e:ea:b4:64:13:9e:45:ea:7d:22:b5:35:55:ea:4e:ab:c5:c7:6d]
            modulus: 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
    public exponent: 10001

] 
2021-09-07 05:14:18.166  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-07 05:14:18.167 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-07 05:14:18.168 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-07 05:14:18.169 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-07 05:14:18.169  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-07 05:14:18.170  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-07 05:14:18.170  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-07 05:14:18.171  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-07 05:14:18.171  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-07 05:14:18.175  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-07 05:14:18.176  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:14:18.177  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:14:18.177  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-07 05:14:18.279  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-07 05:14:18.280  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-07 05:14:18.280 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-07 05:14:18.281 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-07 05:14:18.282  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1051
2021-09-07 05:14:18.282  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-07 05:14:18.283  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-07 05:14:18.284  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-07 05:14:18.284  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-07 05:14:18.285  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-07 05:14:18.285 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:14:18.285 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:14:18.286 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:14:18.286 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:14:18.287 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:14:18.287 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:14:18.288 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-07 05:14:18.290 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373080454980337413300303407909358500915481267252
             IssuerDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 07 01:51:59 UTC 2021
           Final Date: Sun Sep 07 01:51:58 UTC 2031
            SubjectDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [84:b2:29:f5:c9:4d:75:65:3b:87:0d:e5:cb:93:b6:b1:f9:19:38:f5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a877486f10bcf67b637cd73a15014236022943ee
                       a991d3c52753b73130fb1d15bddc043c21ef54b9
                       105e268829ed67c9e399efac3b83772db32ab1a8
                       2947b1de498034b6554bc6f42eb192201aaadc0b
                       5027e8c8dbeb728fed83432f764e9494262af1dc
                       22bff9e160f3d07ae4fa58cff44beb94cfac0240
                       09f6efc95b4c7ed0d81be1e1422a7bcda684a496
                       b3a18caceb4f347b1ea315cbc5ebcea17d430917
                       fad0292e063c4865ef4f27f0f8daa348eb75c36d
                       e0d1a4d1bac691472d3088971f32689327c577fd
                       d62e5ecea046bcde93b966c4a8b378871928b0bd
                       3a29e2daade444f11403c584f96504066019cac7
                       86c2afbd6d822a16fc8513b0228a6d21666eff2c
                       d6a7893a600a763f293b948598f32c74bc0aab71
                       a7243965d89aed7764053bd4becf44176f45fbd6
                       4958a3a0cc52791c2e3c99cc2e0cc739e78decde
                       f5ee98dbf59fb1972fc7dc321c6dc953a05d1166
                       681e45257c5a2aa744563df20466102ef3a77e41
                       b27e1ab7881638b3d085c71cd65f78d2fb828837
                       53d9ef34
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [15:17:49:a5:7b:56:56:81:b5:ce:08:b5:29:2a:a7:ef:44:23:3e:21]
            modulus: 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
    public exponent: 10001

] 
2021-09-07 05:17:17.187  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-07 05:17:17.189 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-07 05:17:17.190 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-09-07 05:17:17.191 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-07 05:17:17.191  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-09-07 05:17:17.192  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-07 05:17:17.192  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-07 05:17:17.192  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-07 05:17:17.193  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-07 05:17:17.276  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-07 05:17:17.277  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:17:17.277  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:17:17.278  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-07 05:17:17.363  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-07 05:17:17.370  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-07 05:17:17.370 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-07 05:17:17.372 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-07 05:17:17.373  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1051
2021-09-07 05:17:17.373  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-07 05:17:17.374  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-07 05:17:17.375  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-07 05:17:17.377  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-07 05:17:17.377  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-07 05:17:17.378 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:17:17.378 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:17:17.379 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:17:17.380 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:17:17.381 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:17:17.381 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:17:17.383 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-07 05:17:17.387 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373080454980337413300303407909358500915481267252
             IssuerDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 07 01:51:59 UTC 2021
           Final Date: Sun Sep 07 01:51:58 UTC 2031
            SubjectDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [84:b2:29:f5:c9:4d:75:65:3b:87:0d:e5:cb:93:b6:b1:f9:19:38:f5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a877486f10bcf67b637cd73a15014236022943ee
                       a991d3c52753b73130fb1d15bddc043c21ef54b9
                       105e268829ed67c9e399efac3b83772db32ab1a8
                       2947b1de498034b6554bc6f42eb192201aaadc0b
                       5027e8c8dbeb728fed83432f764e9494262af1dc
                       22bff9e160f3d07ae4fa58cff44beb94cfac0240
                       09f6efc95b4c7ed0d81be1e1422a7bcda684a496
                       b3a18caceb4f347b1ea315cbc5ebcea17d430917
                       fad0292e063c4865ef4f27f0f8daa348eb75c36d
                       e0d1a4d1bac691472d3088971f32689327c577fd
                       d62e5ecea046bcde93b966c4a8b378871928b0bd
                       3a29e2daade444f11403c584f96504066019cac7
                       86c2afbd6d822a16fc8513b0228a6d21666eff2c
                       d6a7893a600a763f293b948598f32c74bc0aab71
                       a7243965d89aed7764053bd4becf44176f45fbd6
                       4958a3a0cc52791c2e3c99cc2e0cc739e78decde
                       f5ee98dbf59fb1972fc7dc321c6dc953a05d1166
                       681e45257c5a2aa744563df20466102ef3a77e41
                       b27e1ab7881638b3d085c71cd65f78d2fb828837
                       53d9ef34
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1a:38:00:cc:ea:83:5f:04:d0:0e:bc:3f:99:29:89:23:5c:a7:68:c2]
            modulus: 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
    public exponent: 10001

] 
2021-09-07 05:19:46.262  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-07 05:19:46.263 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-07 05:19:46.264 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-07 05:19:46.265 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-07 05:19:46.265  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-07 05:19:46.266  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-07 05:19:46.266  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-07 05:19:46.266  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-07 05:19:46.267  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-07 05:19:46.271  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-07 05:19:46.271  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:19:46.272  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:19:46.273  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-07 05:19:46.370  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-07 05:19:46.371  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-07 05:19:46.371 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-07 05:19:46.372 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-07 05:19:46.373  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1051
2021-09-07 05:19:46.373  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-07 05:19:46.374  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-07 05:19:46.374  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-07 05:19:46.375  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-07 05:19:46.375  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-07 05:19:46.375 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:19:46.376 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:19:46.376 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:19:46.376 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:19:46.377 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:19:46.377 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:19:46.378 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-07 05:19:46.381 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373080454980337413300303407909358500915481267252
             IssuerDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 07 01:51:59 UTC 2021
           Final Date: Sun Sep 07 01:51:58 UTC 2031
            SubjectDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [84:b2:29:f5:c9:4d:75:65:3b:87:0d:e5:cb:93:b6:b1:f9:19:38:f5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a877486f10bcf67b637cd73a15014236022943ee
                       a991d3c52753b73130fb1d15bddc043c21ef54b9
                       105e268829ed67c9e399efac3b83772db32ab1a8
                       2947b1de498034b6554bc6f42eb192201aaadc0b
                       5027e8c8dbeb728fed83432f764e9494262af1dc
                       22bff9e160f3d07ae4fa58cff44beb94cfac0240
                       09f6efc95b4c7ed0d81be1e1422a7bcda684a496
                       b3a18caceb4f347b1ea315cbc5ebcea17d430917
                       fad0292e063c4865ef4f27f0f8daa348eb75c36d
                       e0d1a4d1bac691472d3088971f32689327c577fd
                       d62e5ecea046bcde93b966c4a8b378871928b0bd
                       3a29e2daade444f11403c584f96504066019cac7
                       86c2afbd6d822a16fc8513b0228a6d21666eff2c
                       d6a7893a600a763f293b948598f32c74bc0aab71
                       a7243965d89aed7764053bd4becf44176f45fbd6
                       4958a3a0cc52791c2e3c99cc2e0cc739e78decde
                       f5ee98dbf59fb1972fc7dc321c6dc953a05d1166
                       681e45257c5a2aa744563df20466102ef3a77e41
                       b27e1ab7881638b3d085c71cd65f78d2fb828837
                       53d9ef34
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [83:a4:1d:00:bb:0d:03:c0:b2:98:b0:14:df:db:34:36:a5:82:99:d7]
            modulus: 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
    public exponent: 10001

] 
2021-09-07 05:20:59.260  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-07 05:20:59.261 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-07 05:20:59.262 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-09-07 05:20:59.263 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-07 05:20:59.263  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-09-07 05:20:59.263  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-07 05:20:59.264  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-07 05:20:59.264  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-07 05:20:59.264  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-07 05:20:59.268  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-07 05:20:59.269  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:20:59.269  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:20:59.270  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-07 05:20:59.348  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-07 05:20:59.349  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-07 05:20:59.349 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-07 05:20:59.350 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-07 05:20:59.351  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1051
2021-09-07 05:20:59.351  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-07 05:20:59.352  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-07 05:20:59.353  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-07 05:20:59.353  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-07 05:20:59.353  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-07 05:20:59.354 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:20:59.354 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:20:59.354 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:20:59.355 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:20:59.355 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:20:59.355 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:20:59.356 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-07 05:20:59.358 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373080454980337413300303407909358500915481267252
             IssuerDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 07 01:51:59 UTC 2021
           Final Date: Sun Sep 07 01:51:58 UTC 2031
            SubjectDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [84:b2:29:f5:c9:4d:75:65:3b:87:0d:e5:cb:93:b6:b1:f9:19:38:f5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a877486f10bcf67b637cd73a15014236022943ee
                       a991d3c52753b73130fb1d15bddc043c21ef54b9
                       105e268829ed67c9e399efac3b83772db32ab1a8
                       2947b1de498034b6554bc6f42eb192201aaadc0b
                       5027e8c8dbeb728fed83432f764e9494262af1dc
                       22bff9e160f3d07ae4fa58cff44beb94cfac0240
                       09f6efc95b4c7ed0d81be1e1422a7bcda684a496
                       b3a18caceb4f347b1ea315cbc5ebcea17d430917
                       fad0292e063c4865ef4f27f0f8daa348eb75c36d
                       e0d1a4d1bac691472d3088971f32689327c577fd
                       d62e5ecea046bcde93b966c4a8b378871928b0bd
                       3a29e2daade444f11403c584f96504066019cac7
                       86c2afbd6d822a16fc8513b0228a6d21666eff2c
                       d6a7893a600a763f293b948598f32c74bc0aab71
                       a7243965d89aed7764053bd4becf44176f45fbd6
                       4958a3a0cc52791c2e3c99cc2e0cc739e78decde
                       f5ee98dbf59fb1972fc7dc321c6dc953a05d1166
                       681e45257c5a2aa744563df20466102ef3a77e41
                       b27e1ab7881638b3d085c71cd65f78d2fb828837
                       53d9ef34
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4c:49:00:b8:43:8d:4f:fa:5c:2f:af:ea:cb:27:de:8c:0e:f3:d9:37]
            modulus: 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
    public exponent: 10001

] 
2021-09-07 05:21:34.841  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-07 05:21:34.842 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-07 05:21:34.843 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-09-07 05:21:34.843 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-07 05:21:34.843  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-09-07 05:21:34.844  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-07 05:21:34.845  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-07 05:21:34.845  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-07 05:21:34.845  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-07 05:21:34.849  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-07 05:21:34.850  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:21:34.850  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:21:34.851  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-07 05:21:34.920  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-07 05:21:34.921  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-07 05:21:34.921 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-07 05:21:34.922 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-07 05:21:34.923  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1051
2021-09-07 05:21:34.923  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-07 05:21:34.924  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-07 05:21:34.970  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-07 05:21:34.971  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-07 05:21:34.971  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-07 05:21:34.971 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:21:34.971 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:21:34.971 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:21:34.972 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:21:34.972 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:21:34.973 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:21:34.973 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-07 05:21:34.975 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373080454980337413300303407909358500915481267252
             IssuerDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 07 01:51:59 UTC 2021
           Final Date: Sun Sep 07 01:51:58 UTC 2031
            SubjectDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [84:b2:29:f5:c9:4d:75:65:3b:87:0d:e5:cb:93:b6:b1:f9:19:38:f5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a877486f10bcf67b637cd73a15014236022943ee
                       a991d3c52753b73130fb1d15bddc043c21ef54b9
                       105e268829ed67c9e399efac3b83772db32ab1a8
                       2947b1de498034b6554bc6f42eb192201aaadc0b
                       5027e8c8dbeb728fed83432f764e9494262af1dc
                       22bff9e160f3d07ae4fa58cff44beb94cfac0240
                       09f6efc95b4c7ed0d81be1e1422a7bcda684a496
                       b3a18caceb4f347b1ea315cbc5ebcea17d430917
                       fad0292e063c4865ef4f27f0f8daa348eb75c36d
                       e0d1a4d1bac691472d3088971f32689327c577fd
                       d62e5ecea046bcde93b966c4a8b378871928b0bd
                       3a29e2daade444f11403c584f96504066019cac7
                       86c2afbd6d822a16fc8513b0228a6d21666eff2c
                       d6a7893a600a763f293b948598f32c74bc0aab71
                       a7243965d89aed7764053bd4becf44176f45fbd6
                       4958a3a0cc52791c2e3c99cc2e0cc739e78decde
                       f5ee98dbf59fb1972fc7dc321c6dc953a05d1166
                       681e45257c5a2aa744563df20466102ef3a77e41
                       b27e1ab7881638b3d085c71cd65f78d2fb828837
                       53d9ef34
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d9:14:f4:3d:de:9e:40:70:42:2f:b8:cb:29:18:a6:3a:34:66:8a:49]
            modulus: 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
    public exponent: 10001

] 
2021-09-07 05:22:08.015  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-07 05:22:08.015 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-07 05:22:08.016 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-07 05:22:08.017 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-07 05:22:08.017  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-07 05:22:08.017  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-07 05:22:08.017  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-07 05:22:08.018  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-07 05:22:08.018  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-07 05:22:08.022  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-07 05:22:08.022  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:22:08.023  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:22:08.023  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-07 05:22:08.096  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-07 05:22:08.097  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-07 05:22:08.097 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-07 05:22:08.098 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-07 05:22:08.099  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1051
2021-09-07 05:22:08.099  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-07 05:22:08.100  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-07 05:22:08.100  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-07 05:22:08.101  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-07 05:22:08.101  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-07 05:22:08.101 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:22:08.101 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:22:08.102 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:22:08.102 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:22:08.103 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:22:08.103 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:22:08.103 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-07 05:22:08.106 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373080454980337413300303407909358500915481267252
             IssuerDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 07 01:51:59 UTC 2021
           Final Date: Sun Sep 07 01:51:58 UTC 2031
            SubjectDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [84:b2:29:f5:c9:4d:75:65:3b:87:0d:e5:cb:93:b6:b1:f9:19:38:f5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a877486f10bcf67b637cd73a15014236022943ee
                       a991d3c52753b73130fb1d15bddc043c21ef54b9
                       105e268829ed67c9e399efac3b83772db32ab1a8
                       2947b1de498034b6554bc6f42eb192201aaadc0b
                       5027e8c8dbeb728fed83432f764e9494262af1dc
                       22bff9e160f3d07ae4fa58cff44beb94cfac0240
                       09f6efc95b4c7ed0d81be1e1422a7bcda684a496
                       b3a18caceb4f347b1ea315cbc5ebcea17d430917
                       fad0292e063c4865ef4f27f0f8daa348eb75c36d
                       e0d1a4d1bac691472d3088971f32689327c577fd
                       d62e5ecea046bcde93b966c4a8b378871928b0bd
                       3a29e2daade444f11403c584f96504066019cac7
                       86c2afbd6d822a16fc8513b0228a6d21666eff2c
                       d6a7893a600a763f293b948598f32c74bc0aab71
                       a7243965d89aed7764053bd4becf44176f45fbd6
                       4958a3a0cc52791c2e3c99cc2e0cc739e78decde
                       f5ee98dbf59fb1972fc7dc321c6dc953a05d1166
                       681e45257c5a2aa744563df20466102ef3a77e41
                       b27e1ab7881638b3d085c71cd65f78d2fb828837
                       53d9ef34
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [95:fa:06:50:7c:5d:ee:f4:41:97:f0:a5:af:b7:6e:ec:2b:43:b1:75]
            modulus: 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
    public exponent: 10001

] 
2021-09-07 05:22:30.315  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-07 05:22:30.316 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-07 05:22:30.317 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-07 05:22:30.318 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-07 05:22:30.318  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-07 05:22:30.318  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-07 05:22:30.319  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-07 05:22:30.319  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-07 05:22:30.319  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-07 05:22:30.325  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-07 05:22:30.325  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:22:30.326  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:22:30.326  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-07 05:22:30.380  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-07 05:22:30.381  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-07 05:22:30.381 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-07 05:22:30.382 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-07 05:22:30.382  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1051
2021-09-07 05:22:30.383  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-07 05:22:30.384  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-07 05:22:30.384  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-07 05:22:30.385  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-07 05:22:30.385  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-07 05:22:30.385 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:22:30.385 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:22:30.386 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:22:30.386 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:22:30.387 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:22:30.387 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:22:30.387 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-07 05:22:30.390 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373080454980337413300303407909358500915481267252
             IssuerDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 07 01:51:59 UTC 2021
           Final Date: Sun Sep 07 01:51:58 UTC 2031
            SubjectDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [84:b2:29:f5:c9:4d:75:65:3b:87:0d:e5:cb:93:b6:b1:f9:19:38:f5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a877486f10bcf67b637cd73a15014236022943ee
                       a991d3c52753b73130fb1d15bddc043c21ef54b9
                       105e268829ed67c9e399efac3b83772db32ab1a8
                       2947b1de498034b6554bc6f42eb192201aaadc0b
                       5027e8c8dbeb728fed83432f764e9494262af1dc
                       22bff9e160f3d07ae4fa58cff44beb94cfac0240
                       09f6efc95b4c7ed0d81be1e1422a7bcda684a496
                       b3a18caceb4f347b1ea315cbc5ebcea17d430917
                       fad0292e063c4865ef4f27f0f8daa348eb75c36d
                       e0d1a4d1bac691472d3088971f32689327c577fd
                       d62e5ecea046bcde93b966c4a8b378871928b0bd
                       3a29e2daade444f11403c584f96504066019cac7
                       86c2afbd6d822a16fc8513b0228a6d21666eff2c
                       d6a7893a600a763f293b948598f32c74bc0aab71
                       a7243965d89aed7764053bd4becf44176f45fbd6
                       4958a3a0cc52791c2e3c99cc2e0cc739e78decde
                       f5ee98dbf59fb1972fc7dc321c6dc953a05d1166
                       681e45257c5a2aa744563df20466102ef3a77e41
                       b27e1ab7881638b3d085c71cd65f78d2fb828837
                       53d9ef34
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [20:4d:96:71:0f:80:a3:9f:57:1a:84:18:c8:13:05:f7:1c:4b:e0:9e]
            modulus: f0d12f25c24c664d1b99ba41806d5dd78e890f836c15d15da1786f85520412b5b39f8949cb7ec1740ff6ad5acc90d461a5749bb8c753fd07a816392b4d2c86e9b245d5c323fa6f1b3859001053be227cc0221c2f1409e6de4186a3d6a1cf4369ba266acaf7864f95aca2ddc0e2273008954189169680ac2678aa5f45018456db037c6b458e046747ebf1c1b483e4f56e10f62467e9a8b2cbe96910dafbff6727492488d97533cc7c3f3a8fb24b5a138aad3b5ad69210fc6e368ada2a7a3d041ad921053563bfedcb5e64cfd1a1dfa8511a61b336170d7bf59153c3a7997280f2f4df520141caebcbbdafab223347c18ad8adf5fdee96a5abd517f3baf72aa5f7
    public exponent: 10001

] 
2021-09-07 05:22:39.948  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-07 05:22:39.949 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-07 05:22:39.950 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-07 05:22:39.950 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-07 05:22:39.951  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-07 05:22:39.951  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-07 05:22:39.951  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-07 05:22:39.952  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-07 05:22:39.952  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-07 05:22:39.956  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-07 05:22:39.956  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:22:39.956  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:22:39.957  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-07 05:22:40.029  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-07 05:22:40.030  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-07 05:22:40.030 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-07 05:22:40.031 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-07 05:22:40.032  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1051
2021-09-07 05:22:40.032  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-07 05:22:40.033  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-07 05:22:40.033  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-07 05:22:40.033  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-07 05:22:40.034  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-07 05:22:40.034 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:22:40.034 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:22:40.034 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:22:40.035 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:22:40.035 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:22:40.035 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:22:40.036 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-07 05:22:40.039 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373080454980337413300303407909358500915481267252
             IssuerDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 07 01:51:59 UTC 2021
           Final Date: Sun Sep 07 01:51:58 UTC 2031
            SubjectDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [84:b2:29:f5:c9:4d:75:65:3b:87:0d:e5:cb:93:b6:b1:f9:19:38:f5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a877486f10bcf67b637cd73a15014236022943ee
                       a991d3c52753b73130fb1d15bddc043c21ef54b9
                       105e268829ed67c9e399efac3b83772db32ab1a8
                       2947b1de498034b6554bc6f42eb192201aaadc0b
                       5027e8c8dbeb728fed83432f764e9494262af1dc
                       22bff9e160f3d07ae4fa58cff44beb94cfac0240
                       09f6efc95b4c7ed0d81be1e1422a7bcda684a496
                       b3a18caceb4f347b1ea315cbc5ebcea17d430917
                       fad0292e063c4865ef4f27f0f8daa348eb75c36d
                       e0d1a4d1bac691472d3088971f32689327c577fd
                       d62e5ecea046bcde93b966c4a8b378871928b0bd
                       3a29e2daade444f11403c584f96504066019cac7
                       86c2afbd6d822a16fc8513b0228a6d21666eff2c
                       d6a7893a600a763f293b948598f32c74bc0aab71
                       a7243965d89aed7764053bd4becf44176f45fbd6
                       4958a3a0cc52791c2e3c99cc2e0cc739e78decde
                       f5ee98dbf59fb1972fc7dc321c6dc953a05d1166
                       681e45257c5a2aa744563df20466102ef3a77e41
                       b27e1ab7881638b3d085c71cd65f78d2fb828837
                       53d9ef34
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b2:83:0e:53:05:36:76:f5:8d:66:70:fb:0b:60:53:5f:34:f0:89:1b]
            modulus: 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
    public exponent: 10001

] 
2021-09-07 05:24:25.015  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-07 05:24:25.016 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-07 05:24:25.018 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-07 05:24:25.018 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-07 05:24:25.018  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-07 05:24:25.019  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-07 05:24:25.019  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-07 05:24:25.020  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-07 05:24:25.020  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-07 05:24:25.026  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-07 05:24:25.026  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:24:25.027  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:24:25.027  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-07 05:24:25.095  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-07 05:24:25.095  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-07 05:24:25.096 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-07 05:24:25.097 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-07 05:24:25.098  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1051
2021-09-07 05:24:25.098  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-07 05:24:25.098  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-07 05:24:25.099  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-07 05:24:25.099  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-07 05:24:25.099  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-07 05:24:25.099 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:24:25.099 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:24:25.100 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:24:25.100 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:24:25.100 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:24:25.101 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:24:25.101 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-07 05:24:25.170 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373080454980337413300303407909358500915481267252
             IssuerDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 07 01:51:59 UTC 2021
           Final Date: Sun Sep 07 01:51:58 UTC 2031
            SubjectDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [84:b2:29:f5:c9:4d:75:65:3b:87:0d:e5:cb:93:b6:b1:f9:19:38:f5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a877486f10bcf67b637cd73a15014236022943ee
                       a991d3c52753b73130fb1d15bddc043c21ef54b9
                       105e268829ed67c9e399efac3b83772db32ab1a8
                       2947b1de498034b6554bc6f42eb192201aaadc0b
                       5027e8c8dbeb728fed83432f764e9494262af1dc
                       22bff9e160f3d07ae4fa58cff44beb94cfac0240
                       09f6efc95b4c7ed0d81be1e1422a7bcda684a496
                       b3a18caceb4f347b1ea315cbc5ebcea17d430917
                       fad0292e063c4865ef4f27f0f8daa348eb75c36d
                       e0d1a4d1bac691472d3088971f32689327c577fd
                       d62e5ecea046bcde93b966c4a8b378871928b0bd
                       3a29e2daade444f11403c584f96504066019cac7
                       86c2afbd6d822a16fc8513b0228a6d21666eff2c
                       d6a7893a600a763f293b948598f32c74bc0aab71
                       a7243965d89aed7764053bd4becf44176f45fbd6
                       4958a3a0cc52791c2e3c99cc2e0cc739e78decde
                       f5ee98dbf59fb1972fc7dc321c6dc953a05d1166
                       681e45257c5a2aa744563df20466102ef3a77e41
                       b27e1ab7881638b3d085c71cd65f78d2fb828837
                       53d9ef34
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ea:7e:42:1f:4f:d1:ea:33:a5:5e:0c:df:8e:c8:5c:a2:4c:3f:aa:79]
            modulus: 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
    public exponent: 10001

] 
2021-09-07 05:30:48.703  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-07 05:30:48.704 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-07 05:30:48.705 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-07 05:30:48.705 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-07 05:30:48.706  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-07 05:30:48.706  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-07 05:30:48.706  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-07 05:30:48.706  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-07 05:30:48.707  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-07 05:30:48.711  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-07 05:30:48.712  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:30:48.712  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:30:48.713  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-07 05:30:48.795  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-07 05:30:48.796  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-07 05:30:48.796 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-07 05:30:48.797 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-07 05:30:48.797  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1051
2021-09-07 05:30:48.798  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-07 05:30:48.798  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-07 05:30:48.799  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-07 05:30:48.799  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-07 05:30:48.799  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-07 05:30:48.799 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:30:48.799 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:30:48.800 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:30:48.800 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:30:48.800 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:30:48.800 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:30:48.801 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-07 05:30:48.803 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373080454980337413300303407909358500915481267252
             IssuerDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 07 01:51:59 UTC 2021
           Final Date: Sun Sep 07 01:51:58 UTC 2031
            SubjectDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [84:b2:29:f5:c9:4d:75:65:3b:87:0d:e5:cb:93:b6:b1:f9:19:38:f5]
            modulus: c9f39d6d1474478b1180c7a3d41a99f483ffb8ff5b76e93ae01fd6b863f589e5882428f76970d6f2d85b7affc94efbdb705082b5cdb0fcccb6455c03cb565b02380b4b12c831f2ecf4a96d7f5e3e79562a78f1e31357d35dfd0dfc7de11e2aaf05838d6fc57fef574c4f7162c296c3030e9ac7e9e0b9ce08aa397bcc3af08a869609199c2075d321f168fe215381a8c00ac94acaaefa7a5172edf726ff4c3141cba0ef3d37077b853e64af7412366095881999906222bfb789b8d4ec5979a393dec89ce0b286f0f0e708261025b7793a916a99f66cf383c71d7ad3761666216e059daaff5e6f6242e6da8e9c41b21fefeb0eabcefecc1d0960f10bcea1e3cbb84dbf42d014b96b12a0438f03e2d573b767f90db0f34591399bc1dbbc57daeec4d7f2e3fdd4a40baf8b41bada03989b106e372fd89bd30ba8be35417ebcdce8e71dde4e80d340f2660c2db3f4baa7a6dc96a6afc5ffab4a5b38e48a43eae48687fb8106e94b4910356d6d7a34340b1e71e423ad276fe9d8c8b2dd81a400b2b441
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a877486f10bcf67b637cd73a15014236022943ee
                       a991d3c52753b73130fb1d15bddc043c21ef54b9
                       105e268829ed67c9e399efac3b83772db32ab1a8
                       2947b1de498034b6554bc6f42eb192201aaadc0b
                       5027e8c8dbeb728fed83432f764e9494262af1dc
                       22bff9e160f3d07ae4fa58cff44beb94cfac0240
                       09f6efc95b4c7ed0d81be1e1422a7bcda684a496
                       b3a18caceb4f347b1ea315cbc5ebcea17d430917
                       fad0292e063c4865ef4f27f0f8daa348eb75c36d
                       e0d1a4d1bac691472d3088971f32689327c577fd
                       d62e5ecea046bcde93b966c4a8b378871928b0bd
                       3a29e2daade444f11403c584f96504066019cac7
                       86c2afbd6d822a16fc8513b0228a6d21666eff2c
                       d6a7893a600a763f293b948598f32c74bc0aab71
                       a7243965d89aed7764053bd4becf44176f45fbd6
                       4958a3a0cc52791c2e3c99cc2e0cc739e78decde
                       f5ee98dbf59fb1972fc7dc321c6dc953a05d1166
                       681e45257c5a2aa744563df20466102ef3a77e41
                       b27e1ab7881638b3d085c71cd65f78d2fb828837
                       53d9ef34
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [62:7d:05:60:33:b7:1e:36:70:0c:70:30:ba:02:01:4d:2e:08:c5:cd]
            modulus: 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
    public exponent: 10001

] 
2021-09-07 05:32:29.070  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-07 05:32:29.071 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-07 05:32:29.072 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-09-07 05:32:29.073 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-07 05:32:29.073  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-09-07 05:32:29.073  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-07 05:32:29.073  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-07 05:32:29.074  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-07 05:32:29.074  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-07 05:32:29.078  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-07 05:32:29.078  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:32:29.078  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:32:29.079  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-07 05:32:29.166  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-07 05:32:29.166  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-07 05:32:29.166 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-07 05:32:29.167 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-07 05:32:29.168  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1051
2021-09-07 05:32:29.168  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-07 05:32:29.171  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-07 05:32:29.171  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-07 05:32:29.171  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-07 05:32:29.171  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-07 05:32:29.172 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:32:29.172 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:32:29.172 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:32:29.172 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:32:29.173 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:32:29.173 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:32:29.173 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-07 05:32:29.176 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373080454980337413300303407909358500915481267252
             IssuerDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 07 01:51:59 UTC 2021
           Final Date: Sun Sep 07 01:51:58 UTC 2031
            SubjectDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [84:b2:29:f5:c9:4d:75:65:3b:87:0d:e5:cb:93:b6:b1:f9:19:38:f5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a877486f10bcf67b637cd73a15014236022943ee
                       a991d3c52753b73130fb1d15bddc043c21ef54b9
                       105e268829ed67c9e399efac3b83772db32ab1a8
                       2947b1de498034b6554bc6f42eb192201aaadc0b
                       5027e8c8dbeb728fed83432f764e9494262af1dc
                       22bff9e160f3d07ae4fa58cff44beb94cfac0240
                       09f6efc95b4c7ed0d81be1e1422a7bcda684a496
                       b3a18caceb4f347b1ea315cbc5ebcea17d430917
                       fad0292e063c4865ef4f27f0f8daa348eb75c36d
                       e0d1a4d1bac691472d3088971f32689327c577fd
                       d62e5ecea046bcde93b966c4a8b378871928b0bd
                       3a29e2daade444f11403c584f96504066019cac7
                       86c2afbd6d822a16fc8513b0228a6d21666eff2c
                       d6a7893a600a763f293b948598f32c74bc0aab71
                       a7243965d89aed7764053bd4becf44176f45fbd6
                       4958a3a0cc52791c2e3c99cc2e0cc739e78decde
                       f5ee98dbf59fb1972fc7dc321c6dc953a05d1166
                       681e45257c5a2aa744563df20466102ef3a77e41
                       b27e1ab7881638b3d085c71cd65f78d2fb828837
                       53d9ef34
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0d:ad:ed:26:db:80:f7:44:16:22:1a:4e:24:59:8d:af:60:8f:72:31]
            modulus: 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
    public exponent: 10001

] 
2021-09-07 05:33:52.177  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-07 05:33:52.177 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-07 05:33:52.178 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-09-07 05:33:52.179 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-07 05:33:52.179  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-09-07 05:33:52.179  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-07 05:33:52.180  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-07 05:33:52.180  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-07 05:33:52.180  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-07 05:33:52.184  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-07 05:33:52.184  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:33:52.185  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:33:52.185  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-07 05:33:52.266  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-07 05:33:52.270  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-07 05:33:52.270 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-07 05:33:52.271 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-07 05:33:52.272  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1051
2021-09-07 05:33:52.272  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-07 05:33:52.273  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-07 05:33:52.273  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-07 05:33:52.273  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-07 05:33:52.274  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-07 05:33:52.274 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:33:52.274 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:33:52.275 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:33:52.275 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:33:52.275 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:33:52.275 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:33:52.276 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-07 05:33:52.279 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373080454980337413300303407909358500915481267252
             IssuerDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 07 01:51:59 UTC 2021
           Final Date: Sun Sep 07 01:51:58 UTC 2031
            SubjectDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [84:b2:29:f5:c9:4d:75:65:3b:87:0d:e5:cb:93:b6:b1:f9:19:38:f5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a877486f10bcf67b637cd73a15014236022943ee
                       a991d3c52753b73130fb1d15bddc043c21ef54b9
                       105e268829ed67c9e399efac3b83772db32ab1a8
                       2947b1de498034b6554bc6f42eb192201aaadc0b
                       5027e8c8dbeb728fed83432f764e9494262af1dc
                       22bff9e160f3d07ae4fa58cff44beb94cfac0240
                       09f6efc95b4c7ed0d81be1e1422a7bcda684a496
                       b3a18caceb4f347b1ea315cbc5ebcea17d430917
                       fad0292e063c4865ef4f27f0f8daa348eb75c36d
                       e0d1a4d1bac691472d3088971f32689327c577fd
                       d62e5ecea046bcde93b966c4a8b378871928b0bd
                       3a29e2daade444f11403c584f96504066019cac7
                       86c2afbd6d822a16fc8513b0228a6d21666eff2c
                       d6a7893a600a763f293b948598f32c74bc0aab71
                       a7243965d89aed7764053bd4becf44176f45fbd6
                       4958a3a0cc52791c2e3c99cc2e0cc739e78decde
                       f5ee98dbf59fb1972fc7dc321c6dc953a05d1166
                       681e45257c5a2aa744563df20466102ef3a77e41
                       b27e1ab7881638b3d085c71cd65f78d2fb828837
                       53d9ef34
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [89:c3:da:72:b2:38:1f:d4:7e:d4:5b:3d:64:9c:a8:f4:84:a3:af:e9]
            modulus: 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
    public exponent: 10001

] 
2021-09-07 05:33:54.677  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-07 05:33:54.678 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-07 05:33:54.679 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-07 05:33:54.680 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-07 05:33:54.680  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-07 05:33:54.681  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-07 05:33:54.681  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-07 05:33:54.681  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-07 05:33:54.682  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-07 05:33:54.686  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-07 05:33:54.686  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:33:54.687  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:33:54.688  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-07 05:33:54.770  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-07 05:33:54.771  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-07 05:33:54.771 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-07 05:33:54.772 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-07 05:33:54.772  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1051
2021-09-07 05:33:54.773  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-07 05:33:54.774  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-07 05:33:54.774  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-07 05:33:54.774  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-07 05:33:54.774  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-07 05:33:54.775 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:33:54.775 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:33:54.775 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:33:54.775 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:33:54.775 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:33:54.776 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:33:54.776 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-07 05:33:54.778 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373080454980337413300303407909358500915481267252
             IssuerDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 07 01:51:59 UTC 2021
           Final Date: Sun Sep 07 01:51:58 UTC 2031
            SubjectDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [84:b2:29:f5:c9:4d:75:65:3b:87:0d:e5:cb:93:b6:b1:f9:19:38:f5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a877486f10bcf67b637cd73a15014236022943ee
                       a991d3c52753b73130fb1d15bddc043c21ef54b9
                       105e268829ed67c9e399efac3b83772db32ab1a8
                       2947b1de498034b6554bc6f42eb192201aaadc0b
                       5027e8c8dbeb728fed83432f764e9494262af1dc
                       22bff9e160f3d07ae4fa58cff44beb94cfac0240
                       09f6efc95b4c7ed0d81be1e1422a7bcda684a496
                       b3a18caceb4f347b1ea315cbc5ebcea17d430917
                       fad0292e063c4865ef4f27f0f8daa348eb75c36d
                       e0d1a4d1bac691472d3088971f32689327c577fd
                       d62e5ecea046bcde93b966c4a8b378871928b0bd
                       3a29e2daade444f11403c584f96504066019cac7
                       86c2afbd6d822a16fc8513b0228a6d21666eff2c
                       d6a7893a600a763f293b948598f32c74bc0aab71
                       a7243965d89aed7764053bd4becf44176f45fbd6
                       4958a3a0cc52791c2e3c99cc2e0cc739e78decde
                       f5ee98dbf59fb1972fc7dc321c6dc953a05d1166
                       681e45257c5a2aa744563df20466102ef3a77e41
                       b27e1ab7881638b3d085c71cd65f78d2fb828837
                       53d9ef34
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5d:8d:0c:0a:87:53:38:aa:94:08:dc:e0:8c:56:a0:a1:b3:51:12:c2]
            modulus: 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
    public exponent: 10001

] 
2021-09-07 05:37:40.023  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-07 05:37:40.024 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-07 05:37:40.025 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-09-07 05:37:40.026 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-07 05:37:40.026  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-09-07 05:37:40.027  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-07 05:37:40.027  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-07 05:37:40.027  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-07 05:37:40.027  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-07 05:37:40.031  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-07 05:37:40.032  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:37:40.032  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:37:40.033  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-07 05:37:40.105  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-07 05:37:40.106  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-07 05:37:40.106 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-07 05:37:40.107 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-07 05:37:40.107  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1051
2021-09-07 05:37:40.107  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-07 05:37:40.108  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-07 05:37:40.109  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-07 05:37:40.109  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-07 05:37:40.109  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-07 05:37:40.109 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:37:40.110 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:37:40.110 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:37:40.110 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:37:40.110 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:37:40.111 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:37:40.111 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-07 05:37:40.113 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373080454980337413300303407909358500915481267252
             IssuerDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 07 01:51:59 UTC 2021
           Final Date: Sun Sep 07 01:51:58 UTC 2031
            SubjectDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [84:b2:29:f5:c9:4d:75:65:3b:87:0d:e5:cb:93:b6:b1:f9:19:38:f5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a877486f10bcf67b637cd73a15014236022943ee
                       a991d3c52753b73130fb1d15bddc043c21ef54b9
                       105e268829ed67c9e399efac3b83772db32ab1a8
                       2947b1de498034b6554bc6f42eb192201aaadc0b
                       5027e8c8dbeb728fed83432f764e9494262af1dc
                       22bff9e160f3d07ae4fa58cff44beb94cfac0240
                       09f6efc95b4c7ed0d81be1e1422a7bcda684a496
                       b3a18caceb4f347b1ea315cbc5ebcea17d430917
                       fad0292e063c4865ef4f27f0f8daa348eb75c36d
                       e0d1a4d1bac691472d3088971f32689327c577fd
                       d62e5ecea046bcde93b966c4a8b378871928b0bd
                       3a29e2daade444f11403c584f96504066019cac7
                       86c2afbd6d822a16fc8513b0228a6d21666eff2c
                       d6a7893a600a763f293b948598f32c74bc0aab71
                       a7243965d89aed7764053bd4becf44176f45fbd6
                       4958a3a0cc52791c2e3c99cc2e0cc739e78decde
                       f5ee98dbf59fb1972fc7dc321c6dc953a05d1166
                       681e45257c5a2aa744563df20466102ef3a77e41
                       b27e1ab7881638b3d085c71cd65f78d2fb828837
                       53d9ef34
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [44:db:1d:8b:61:bd:ad:70:c4:89:97:91:bb:fc:5f:e4:1c:48:5f:c9]
            modulus: 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
    public exponent: 10001

] 
2021-09-07 05:38:12.286  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-07 05:38:12.287 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-07 05:38:12.288 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-07 05:38:12.289 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-07 05:38:12.289  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-07 05:38:12.289  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-07 05:38:12.289  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-07 05:38:12.289  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-07 05:38:12.290  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-07 05:38:12.294  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-07 05:38:12.294  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:38:12.294  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:38:12.295  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-07 05:38:12.364  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-07 05:38:12.370  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-07 05:38:12.370 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-07 05:38:12.371 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-07 05:38:12.373  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1051
2021-09-07 05:38:12.373  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-07 05:38:12.376  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-07 05:38:12.376  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-07 05:38:12.376  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-07 05:38:12.377  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-07 05:38:12.377 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:38:12.378 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:38:12.378 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:38:12.378 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:38:12.378 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:38:12.379 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:38:12.379 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-07 05:38:12.381 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373080454980337413300303407909358500915481267252
             IssuerDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 07 01:51:59 UTC 2021
           Final Date: Sun Sep 07 01:51:58 UTC 2031
            SubjectDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [84:b2:29:f5:c9:4d:75:65:3b:87:0d:e5:cb:93:b6:b1:f9:19:38:f5]
            modulus: c9f39d6d1474478b1180c7a3d41a99f483ffb8ff5b76e93ae01fd6b863f589e5882428f76970d6f2d85b7affc94efbdb705082b5cdb0fcccb6455c03cb565b02380b4b12c831f2ecf4a96d7f5e3e79562a78f1e31357d35dfd0dfc7de11e2aaf05838d6fc57fef574c4f7162c296c3030e9ac7e9e0b9ce08aa397bcc3af08a869609199c2075d321f168fe215381a8c00ac94acaaefa7a5172edf726ff4c3141cba0ef3d37077b853e64af7412366095881999906222bfb789b8d4ec5979a393dec89ce0b286f0f0e708261025b7793a916a99f66cf383c71d7ad3761666216e059daaff5e6f6242e6da8e9c41b21fefeb0eabcefecc1d0960f10bcea1e3cbb84dbf42d014b96b12a0438f03e2d573b767f90db0f34591399bc1dbbc57daeec4d7f2e3fdd4a40baf8b41bada03989b106e372fd89bd30ba8be35417ebcdce8e71dde4e80d340f2660c2db3f4baa7a6dc96a6afc5ffab4a5b38e48a43eae48687fb8106e94b4910356d6d7a34340b1e71e423ad276fe9d8c8b2dd81a400b2b441
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a877486f10bcf67b637cd73a15014236022943ee
                       a991d3c52753b73130fb1d15bddc043c21ef54b9
                       105e268829ed67c9e399efac3b83772db32ab1a8
                       2947b1de498034b6554bc6f42eb192201aaadc0b
                       5027e8c8dbeb728fed83432f764e9494262af1dc
                       22bff9e160f3d07ae4fa58cff44beb94cfac0240
                       09f6efc95b4c7ed0d81be1e1422a7bcda684a496
                       b3a18caceb4f347b1ea315cbc5ebcea17d430917
                       fad0292e063c4865ef4f27f0f8daa348eb75c36d
                       e0d1a4d1bac691472d3088971f32689327c577fd
                       d62e5ecea046bcde93b966c4a8b378871928b0bd
                       3a29e2daade444f11403c584f96504066019cac7
                       86c2afbd6d822a16fc8513b0228a6d21666eff2c
                       d6a7893a600a763f293b948598f32c74bc0aab71
                       a7243965d89aed7764053bd4becf44176f45fbd6
                       4958a3a0cc52791c2e3c99cc2e0cc739e78decde
                       f5ee98dbf59fb1972fc7dc321c6dc953a05d1166
                       681e45257c5a2aa744563df20466102ef3a77e41
                       b27e1ab7881638b3d085c71cd65f78d2fb828837
                       53d9ef34
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bd:46:0a:f1:c2:19:8a:e0:a0:95:24:74:ba:43:6c:3e:b2:91:a5:09]
            modulus: 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
    public exponent: 10001

] 
2021-09-07 05:38:45.073  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-07 05:38:45.075 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-07 05:38:45.078 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-07 05:38:45.078 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-07 05:38:45.078  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-07 05:38:45.079  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-07 05:38:45.079  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-07 05:38:45.079  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-07 05:38:45.080  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-07 05:38:45.083  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-07 05:38:45.084  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:38:45.084  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:38:45.085  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-07 05:38:45.164  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-07 05:38:45.164  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-07 05:38:45.164 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-07 05:38:45.165 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-07 05:38:45.166  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1051
2021-09-07 05:38:45.166  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-07 05:38:45.167  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-07 05:38:45.167  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-07 05:38:45.167  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-07 05:38:45.167  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-07 05:38:45.168 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:38:45.168 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:38:45.168 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:38:45.168 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:38:45.169 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:38:45.169 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:38:45.169 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-07 05:38:45.171 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373080454980337413300303407909358500915481267252
             IssuerDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 07 01:51:59 UTC 2021
           Final Date: Sun Sep 07 01:51:58 UTC 2031
            SubjectDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [84:b2:29:f5:c9:4d:75:65:3b:87:0d:e5:cb:93:b6:b1:f9:19:38:f5]
            modulus: c9f39d6d1474478b1180c7a3d41a99f483ffb8ff5b76e93ae01fd6b863f589e5882428f76970d6f2d85b7affc94efbdb705082b5cdb0fcccb6455c03cb565b02380b4b12c831f2ecf4a96d7f5e3e79562a78f1e31357d35dfd0dfc7de11e2aaf05838d6fc57fef574c4f7162c296c3030e9ac7e9e0b9ce08aa397bcc3af08a869609199c2075d321f168fe215381a8c00ac94acaaefa7a5172edf726ff4c3141cba0ef3d37077b853e64af7412366095881999906222bfb789b8d4ec5979a393dec89ce0b286f0f0e708261025b7793a916a99f66cf383c71d7ad3761666216e059daaff5e6f6242e6da8e9c41b21fefeb0eabcefecc1d0960f10bcea1e3cbb84dbf42d014b96b12a0438f03e2d573b767f90db0f34591399bc1dbbc57daeec4d7f2e3fdd4a40baf8b41bada03989b106e372fd89bd30ba8be35417ebcdce8e71dde4e80d340f2660c2db3f4baa7a6dc96a6afc5ffab4a5b38e48a43eae48687fb8106e94b4910356d6d7a34340b1e71e423ad276fe9d8c8b2dd81a400b2b441
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a877486f10bcf67b637cd73a15014236022943ee
                       a991d3c52753b73130fb1d15bddc043c21ef54b9
                       105e268829ed67c9e399efac3b83772db32ab1a8
                       2947b1de498034b6554bc6f42eb192201aaadc0b
                       5027e8c8dbeb728fed83432f764e9494262af1dc
                       22bff9e160f3d07ae4fa58cff44beb94cfac0240
                       09f6efc95b4c7ed0d81be1e1422a7bcda684a496
                       b3a18caceb4f347b1ea315cbc5ebcea17d430917
                       fad0292e063c4865ef4f27f0f8daa348eb75c36d
                       e0d1a4d1bac691472d3088971f32689327c577fd
                       d62e5ecea046bcde93b966c4a8b378871928b0bd
                       3a29e2daade444f11403c584f96504066019cac7
                       86c2afbd6d822a16fc8513b0228a6d21666eff2c
                       d6a7893a600a763f293b948598f32c74bc0aab71
                       a7243965d89aed7764053bd4becf44176f45fbd6
                       4958a3a0cc52791c2e3c99cc2e0cc739e78decde
                       f5ee98dbf59fb1972fc7dc321c6dc953a05d1166
                       681e45257c5a2aa744563df20466102ef3a77e41
                       b27e1ab7881638b3d085c71cd65f78d2fb828837
                       53d9ef34
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e7:0b:1c:02:af:96:0b:28:4b:3c:fc:8d:1f:ec:bd:d7:2c:88:67:31]
            modulus: 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
    public exponent: 10001

] 
2021-09-07 05:40:29.838  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-07 05:40:29.839 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-07 05:40:29.840 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-07 05:40:29.840 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-07 05:40:29.841  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-07 05:40:29.841  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-07 05:40:29.841  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-07 05:40:29.842  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-07 05:40:29.842  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-07 05:40:29.846  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-07 05:40:29.846  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:40:29.846  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-07 05:40:29.847  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-07 05:40:29.947  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-07 05:40:29.948  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-07 05:40:29.948 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-07 05:40:29.949 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-07 05:40:29.950  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1051
2021-09-07 05:40:29.950  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-07 05:40:29.951  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-07 05:40:29.951  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-07 05:40:29.951  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-07 05:40:29.952  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-07 05:40:29.952 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:40:29.952 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:40:29.952 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:40:29.953 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-07 05:40:29.953 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-07 05:40:29.953 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-07 05:40:29.953 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-07 05:40:29.956 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 373080454980337413300303407909358500915481267252
             IssuerDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 07 01:51:59 UTC 2021
           Final Date: Sun Sep 07 01:51:58 UTC 2031
            SubjectDN: UID=c-0fkrg9x4n419lfqv4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [84:b2:29:f5:c9:4d:75:65:3b:87:0d:e5:cb:93:b6:b1:f9:19:38:f5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a877486f10bcf67b637cd73a15014236022943ee
                       a991d3c52753b73130fb1d15bddc043c21ef54b9
                       105e268829ed67c9e399efac3b83772db32ab1a8
                       2947b1de498034b6554bc6f42eb192201aaadc0b
                       5027e8c8dbeb728fed83432f764e9494262af1dc
                       22bff9e160f3d07ae4fa58cff44beb94cfac0240
                       09f6efc95b4c7ed0d81be1e1422a7bcda684a496
                       b3a18caceb4f347b1ea315cbc5ebcea17d430917
                       fad0292e063c4865ef4f27f0f8daa348eb75c36d
                       e0d1a4d1bac691472d3088971f32689327c577fd
                       d62e5ecea046bcde93b966c4a8b378871928b0bd
                       3a29e2daade444f11403c584f96504066019cac7
                       86c2afbd6d822a16fc8513b0228a6d21666eff2c
                       d6a7893a600a763f293b948598f32c74bc0aab71
                       a7243965d89aed7764053bd4becf44176f45fbd6
                       4958a3a0cc52791c2e3c99cc2e0cc739e78decde
                       f5ee98dbf59fb1972fc7dc321c6dc953a05d1166
                       681e45257c5a2aa744563df20466102ef3a77e41
                       b27e1ab7881638b3d085c71cd65f78d2fb828837
                       53d9ef34
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f5:4e:f0:55:eb:c0:ba:55:19:0c:6a:d1:7c:e5:33:2a:3f:0e:ac:8f]
            modulus: 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
    public exponent: 10001

]