Results

By type

          2021-06-14 10:10:10,423 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-06-14 10:10:13,837 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-06-14 10:10:16.735  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-06-14 10:10:28.142 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-06-14 10:10:29.127  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-06-14 10:10:29.824  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-06-14 10:10:43.729  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 35.482 seconds (JVM running for 42.471)
2021-06-14 10:31:22.933  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-14 10:31:23.025 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-14 10:31:23.135 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-06-14 10:31:23.139 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-14 10:31:23.232  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-06-14 10:31:23.236  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-14 10:31:23.240  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-14 10:31:23.240  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-14 10:31:23.240  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-14 10:31:23.325  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-14 10:31:23.328  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-14 10:31:23.435  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-14 10:31:23.440  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-14 10:31:23.441  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-14 10:31:23.533  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-14 10:31:24.831  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-14 10:31:24.834  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-14 10:31:24.835 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-14 10:31:24.839 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-14 10:31:24.840  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1582
2021-06-14 10:31:24.841  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-14 10:31:24.849  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-14 10:31:24.924  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-14 10:31:24.934  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-14 10:31:24.935  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-14 10:31:24.936 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-14 10:31:24.936 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-14 10:31:24.936 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-14 10:31:25.031 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-14 10:31:25.032 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-14 10:31:25.033 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-14 10:31:25.124 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-14 10:31:25.155 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 226981689146882109615894733597550008376542593219
             IssuerDN: UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 14 10:06:53 UTC 2021
           Final Date: Sat Jun 14 10:06:53 UTC 2031
            SubjectDN: UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [89:0c:00:b2:d0:55:51:06:19:1e:3c:65:ba:89:67:5c:c7:be:82:d9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a2680bccfac82b8ed5cbcd3e87fcf988aa3ce772
                       c7f328506f75005d0905bf84755cc8217adf3059
                       55218c761f294d927c03c7dc936e115d39169226
                       99c00197e96254b34e602ae3a02e837ba24ff2f4
                       8b009f183a2cf2f13260acc2ace539c20a2063d9
                       6b007c7b8bc4f73cd42f96c941f33c24de9415f2
                       595eb5c772c985861061aca63d2b0dec9af92158
                       d5205fcfdba7d0a3d163200636137840d495eafe
                       ec4111e1b7f0a989a1d36150f725cf3f38f74a28
                       7b8e2a1083496b8687c3a59362188c8c82ad5533
                       af6ba502984531152df2694e20d1b63ebad0d07f
                       043fe00fd77dc145169500199b66862257af8568
                       8f5b798b79f12e221ee5711d8ca5fa7305ee5144
                       8e6f16fe715bd0f453126cccd4b363d97e414d89
                       cf34acf46fec17c5ed7ebb4a811bb26be6e826c4
                       286d0ee033946c740aaa541979bae36bf01cdb91
                       245ac5a5b22a012e3344f958097e57ead78990c2
                       18ca38e9a55b6a110efb2560cb8fce0514ebd8f1
                       889e465546964a5db00547a890f6cea3e236d30b
                       47a2b8bf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5c:3b:1f:67:94:33:78:f4:bf:16:10:c3:ed:be:cd:3f:86:d2:e8:1f]
            modulus: 86fae62bf0b676bf1cab616f79adc3d96ebef4daba5411c1cbf17c9911d55f83bd3ffc54ceaca62de0beb842deca40bd93d40fc73d73a1d4fae9c4971328350e267e435343d458a220e42091a42efdda0ce80a344e7aa7cece91f069db433d73fcbee1862463e900e01f932971020e01974408e675921dbc8e8514b2a1e570d5339f7973fb27adfed2e9392bd834a4f05fb0052a869ceda197e3f5c371aca0721d9b626a531ceb3a3343f3e024bf56a9f81855de97bb128603d3c9e27828edf71d87b1fe1e4105e32ffbc3976d7cb367fbab694268ed3f2d24428acf6cd28bc1a316ce836aade385a72e547c464b9e19d48c816d0658582771021e4f9b0d75ab
    public exponent: 10001

] 
2021-06-14 12:01:19.008  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-14 12:01:19.012 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-14 12:01:19.014 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-14 12:01:19.017 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-14 12:01:19.019  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-14 12:01:19.020  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-14 12:01:19.021  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-14 12:01:19.022  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-14 12:01:19.024  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-14 12:01:19.035  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-14 12:01:19.036  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-14 12:01:19.036  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-14 12:01:19.040  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-14 12:01:19.242  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-14 12:01:19.243  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-14 12:01:19.244 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-14 12:01:19.248 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-14 12:01:19.249  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1582
2021-06-14 12:01:19.252  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-14 12:01:19.254  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-14 12:01:19.255  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-14 12:01:19.256  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-14 12:01:19.256  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-14 12:01:19.256 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-14 12:01:19.257 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-14 12:01:19.257 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-14 12:01:19.258 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-14 12:01:19.259 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-14 12:01:19.259 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-14 12:01:19.323 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-14 12:01:19.332 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 226981689146882109615894733597550008376542593219
             IssuerDN: UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 14 10:06:53 UTC 2021
           Final Date: Sat Jun 14 10:06:53 UTC 2031
            SubjectDN: UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [89:0c:00:b2:d0:55:51:06:19:1e:3c:65:ba:89:67:5c:c7:be:82:d9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a2680bccfac82b8ed5cbcd3e87fcf988aa3ce772
                       c7f328506f75005d0905bf84755cc8217adf3059
                       55218c761f294d927c03c7dc936e115d39169226
                       99c00197e96254b34e602ae3a02e837ba24ff2f4
                       8b009f183a2cf2f13260acc2ace539c20a2063d9
                       6b007c7b8bc4f73cd42f96c941f33c24de9415f2
                       595eb5c772c985861061aca63d2b0dec9af92158
                       d5205fcfdba7d0a3d163200636137840d495eafe
                       ec4111e1b7f0a989a1d36150f725cf3f38f74a28
                       7b8e2a1083496b8687c3a59362188c8c82ad5533
                       af6ba502984531152df2694e20d1b63ebad0d07f
                       043fe00fd77dc145169500199b66862257af8568
                       8f5b798b79f12e221ee5711d8ca5fa7305ee5144
                       8e6f16fe715bd0f453126cccd4b363d97e414d89
                       cf34acf46fec17c5ed7ebb4a811bb26be6e826c4
                       286d0ee033946c740aaa541979bae36bf01cdb91
                       245ac5a5b22a012e3344f958097e57ead78990c2
                       18ca38e9a55b6a110efb2560cb8fce0514ebd8f1
                       889e465546964a5db00547a890f6cea3e236d30b
                       47a2b8bf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [df:67:17:69:d9:cb:a8:e0:69:2d:83:a1:84:d7:e3:e1:bb:83:26:6c]
            modulus: 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
    public exponent: 10001

] 
2021-06-14 12:06:34.674  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-14 12:06:34.675 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-14 12:06:34.676 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-14 12:06:34.676 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-14 12:06:34.677  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-14 12:06:34.677  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-14 12:06:34.678  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-14 12:06:34.678  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-14 12:06:34.678  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-14 12:06:34.683  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-14 12:06:34.684  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-14 12:06:34.684  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-14 12:06:34.686  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-14 12:06:34.823  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-14 12:06:34.823  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-14 12:06:34.824 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-14 12:06:34.826 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-14 12:06:34.826  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1582
2021-06-14 12:06:34.827  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-14 12:06:34.828  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-14 12:06:34.828  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-14 12:06:34.829  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-14 12:06:34.829  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-14 12:06:34.829 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-14 12:06:34.830 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-14 12:06:34.830 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-14 12:06:34.830 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-14 12:06:34.831 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-14 12:06:34.831 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-14 12:06:34.831 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-14 12:06:34.834 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 226981689146882109615894733597550008376542593219
             IssuerDN: UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 14 10:06:53 UTC 2021
           Final Date: Sat Jun 14 10:06:53 UTC 2031
            SubjectDN: UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [89:0c:00:b2:d0:55:51:06:19:1e:3c:65:ba:89:67:5c:c7:be:82:d9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a2680bccfac82b8ed5cbcd3e87fcf988aa3ce772
                       c7f328506f75005d0905bf84755cc8217adf3059
                       55218c761f294d927c03c7dc936e115d39169226
                       99c00197e96254b34e602ae3a02e837ba24ff2f4
                       8b009f183a2cf2f13260acc2ace539c20a2063d9
                       6b007c7b8bc4f73cd42f96c941f33c24de9415f2
                       595eb5c772c985861061aca63d2b0dec9af92158
                       d5205fcfdba7d0a3d163200636137840d495eafe
                       ec4111e1b7f0a989a1d36150f725cf3f38f74a28
                       7b8e2a1083496b8687c3a59362188c8c82ad5533
                       af6ba502984531152df2694e20d1b63ebad0d07f
                       043fe00fd77dc145169500199b66862257af8568
                       8f5b798b79f12e221ee5711d8ca5fa7305ee5144
                       8e6f16fe715bd0f453126cccd4b363d97e414d89
                       cf34acf46fec17c5ed7ebb4a811bb26be6e826c4
                       286d0ee033946c740aaa541979bae36bf01cdb91
                       245ac5a5b22a012e3344f958097e57ead78990c2
                       18ca38e9a55b6a110efb2560cb8fce0514ebd8f1
                       889e465546964a5db00547a890f6cea3e236d30b
                       47a2b8bf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6c:10:5d:44:5a:d2:18:c4:6a:c4:0a:3d:a5:6e:8e:5d:b0:a8:93:66]
            modulus: 9c93ba9359a2990e7e3e215c4d68edb860591686f6436ccc8c9f153a70037d19f6a99e471b7d4e6c666cbdc96089608ca469cd64c20a483342957f81aeda35a808171bcfdc88bb150ce8f0bb1fb2a620c835b2d7da743c1cf5454f736dcac0a06fbc894238c0a001da700952ed42cb605ca8c6bf12ceea938895ba958aeed9238dd92d63bc9bbc03bfcb93fbde4c7beb82a091bf18e6f4282dd1d5534d39b3f57fc72dd6e36b5c2f26faa426b70d86d690f8c3e2cc6a0f72c31aac6aa89f2196dae006ae633252f0f6ce50045512e098629b0d8ad9964c1538facb727f2d064b7a615aff72bb20615739c5fe9ff9845c3597780d5bb3183e6e9afed223a5afc7
    public exponent: 10001

] 
2021-06-14 12:06:55.811  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-14 12:06:55.812 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-14 12:06:55.812 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-06-14 12:06:55.813 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-14 12:06:55.813  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-06-14 12:06:55.814  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-14 12:06:55.814  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-14 12:06:55.814  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-14 12:06:55.815  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-14 12:06:55.819  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-14 12:06:55.819  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-14 12:06:55.820  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-14 12:06:55.821  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-14 12:06:55.892  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-14 12:06:55.892  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-14 12:06:55.893 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-14 12:06:55.924 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-14 12:06:55.924  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1582
2021-06-14 12:06:55.925  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-14 12:06:55.926  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-14 12:06:55.926  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-14 12:06:55.926  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-14 12:06:55.926  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-14 12:06:55.927 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-14 12:06:55.927 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-14 12:06:55.927 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-14 12:06:55.927 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-14 12:06:55.928 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-14 12:06:55.928 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-14 12:06:55.928 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-14 12:06:55.930 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 226981689146882109615894733597550008376542593219
             IssuerDN: UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 14 10:06:53 UTC 2021
           Final Date: Sat Jun 14 10:06:53 UTC 2031
            SubjectDN: UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [89:0c:00:b2:d0:55:51:06:19:1e:3c:65:ba:89:67:5c:c7:be:82:d9]
            modulus: a6223090ca01b783d82b2c7fc7e5938541c70c363aae03b9b27b7b506baff6879b90ab905676f296eead4822fe49da881e0dd4dcb979f2c2587e0aea5fdb6d751bc3f4559582e20391c51c7485da6f48659de4701f061d932715e81ed9216e3ce6ebf8696730c4b76128ba30800bf23605f04ed17c792a08aacb97f2ebcf62465926ae57562914652f8f171198ddd06b1adb7cd6b51b135b061d56c27303dc9f6392fd738c53407e7e9e0e7a0396f4d4572ecf573fead4ee48e02aa11a3502bb11db491f2f53cd03b5189b2155cfe0ab3fe62c0688a8d43e5677572fbbb81cb49703846982539f478fcaab0133ab6b3134b12be84262bd0dbb13fb757e4e1d493eaa659a96baa43917f82b46d178a145449b562458ef715ab8798b1e551ee769c056acabb7e646e67c03c8bf031f0f8fb484fe202adb948d9ccbdede5ab099e7028985954c21060a756770aaa63fa3ce1fce95d8d75d5e421e3c9630dd9531e7a279576fb0a075d041e0007d22befc1c24b539c9bfd2da0bdcf5ba2a419b0221
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a2680bccfac82b8ed5cbcd3e87fcf988aa3ce772
                       c7f328506f75005d0905bf84755cc8217adf3059
                       55218c761f294d927c03c7dc936e115d39169226
                       99c00197e96254b34e602ae3a02e837ba24ff2f4
                       8b009f183a2cf2f13260acc2ace539c20a2063d9
                       6b007c7b8bc4f73cd42f96c941f33c24de9415f2
                       595eb5c772c985861061aca63d2b0dec9af92158
                       d5205fcfdba7d0a3d163200636137840d495eafe
                       ec4111e1b7f0a989a1d36150f725cf3f38f74a28
                       7b8e2a1083496b8687c3a59362188c8c82ad5533
                       af6ba502984531152df2694e20d1b63ebad0d07f
                       043fe00fd77dc145169500199b66862257af8568
                       8f5b798b79f12e221ee5711d8ca5fa7305ee5144
                       8e6f16fe715bd0f453126cccd4b363d97e414d89
                       cf34acf46fec17c5ed7ebb4a811bb26be6e826c4
                       286d0ee033946c740aaa541979bae36bf01cdb91
                       245ac5a5b22a012e3344f958097e57ead78990c2
                       18ca38e9a55b6a110efb2560cb8fce0514ebd8f1
                       889e465546964a5db00547a890f6cea3e236d30b
                       47a2b8bf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [43:ff:bb:92:59:1f:ed:d3:80:88:ba:c9:5c:4e:e0:5e:68:7e:f2:ec]
            modulus: 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
    public exponent: 10001

] 
2021-06-14 12:08:02.820  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-14 12:08:02.821 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-14 12:08:02.823 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-06-14 12:08:02.823 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-14 12:08:02.823  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-06-14 12:08:02.824  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-14 12:08:02.824  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-14 12:08:02.824  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-14 12:08:02.825  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-14 12:08:02.831  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-14 12:08:02.831  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-14 12:08:02.831  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-14 12:08:02.833  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-14 12:08:02.919  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-14 12:08:02.920  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-14 12:08:02.921 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-14 12:08:02.925 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-14 12:08:02.926  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1582
2021-06-14 12:08:02.927  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-14 12:08:02.929  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-14 12:08:02.930  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-14 12:08:02.930  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-14 12:08:02.931  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-14 12:08:02.931 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-14 12:08:02.932 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-14 12:08:02.932 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-14 12:08:02.933 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-14 12:08:02.934 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-14 12:08:02.934 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-14 12:08:02.935 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-14 12:08:02.937 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 226981689146882109615894733597550008376542593219
             IssuerDN: UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 14 10:06:53 UTC 2021
           Final Date: Sat Jun 14 10:06:53 UTC 2031
            SubjectDN: UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [89:0c:00:b2:d0:55:51:06:19:1e:3c:65:ba:89:67:5c:c7:be:82:d9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a2680bccfac82b8ed5cbcd3e87fcf988aa3ce772
                       c7f328506f75005d0905bf84755cc8217adf3059
                       55218c761f294d927c03c7dc936e115d39169226
                       99c00197e96254b34e602ae3a02e837ba24ff2f4
                       8b009f183a2cf2f13260acc2ace539c20a2063d9
                       6b007c7b8bc4f73cd42f96c941f33c24de9415f2
                       595eb5c772c985861061aca63d2b0dec9af92158
                       d5205fcfdba7d0a3d163200636137840d495eafe
                       ec4111e1b7f0a989a1d36150f725cf3f38f74a28
                       7b8e2a1083496b8687c3a59362188c8c82ad5533
                       af6ba502984531152df2694e20d1b63ebad0d07f
                       043fe00fd77dc145169500199b66862257af8568
                       8f5b798b79f12e221ee5711d8ca5fa7305ee5144
                       8e6f16fe715bd0f453126cccd4b363d97e414d89
                       cf34acf46fec17c5ed7ebb4a811bb26be6e826c4
                       286d0ee033946c740aaa541979bae36bf01cdb91
                       245ac5a5b22a012e3344f958097e57ead78990c2
                       18ca38e9a55b6a110efb2560cb8fce0514ebd8f1
                       889e465546964a5db00547a890f6cea3e236d30b
                       47a2b8bf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e6:d7:24:8d:05:ce:11:5b:f4:63:dc:5c:1c:95:f6:6a:f8:1f:b3:bf]
            modulus: 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
    public exponent: 10001

] 
2021-06-14 12:08:09.130  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-14 12:08:09.131 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-14 12:08:09.133 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-14 12:08:09.134 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-14 12:08:09.134  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-14 12:08:09.135  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-14 12:08:09.135  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-14 12:08:09.136  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-14 12:08:09.136  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-14 12:08:09.142  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-14 12:08:09.143  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-14 12:08:09.146  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-14 12:08:09.148  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-14 12:08:09.286  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-14 12:08:09.286  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-14 12:08:09.286 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-14 12:08:09.288 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-14 12:08:09.288  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1582
2021-06-14 12:08:09.288  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-14 12:08:09.290  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-14 12:08:09.290  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-14 12:08:09.290  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-14 12:08:09.291  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-14 12:08:09.291 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-14 12:08:09.291 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-14 12:08:09.291 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-14 12:08:09.292 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-14 12:08:09.292 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-14 12:08:09.292 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-14 12:08:09.293 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-14 12:08:09.296 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 226981689146882109615894733597550008376542593219
             IssuerDN: UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 14 10:06:53 UTC 2021
           Final Date: Sat Jun 14 10:06:53 UTC 2031
            SubjectDN: UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [89:0c:00:b2:d0:55:51:06:19:1e:3c:65:ba:89:67:5c:c7:be:82:d9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a2680bccfac82b8ed5cbcd3e87fcf988aa3ce772
                       c7f328506f75005d0905bf84755cc8217adf3059
                       55218c761f294d927c03c7dc936e115d39169226
                       99c00197e96254b34e602ae3a02e837ba24ff2f4
                       8b009f183a2cf2f13260acc2ace539c20a2063d9
                       6b007c7b8bc4f73cd42f96c941f33c24de9415f2
                       595eb5c772c985861061aca63d2b0dec9af92158
                       d5205fcfdba7d0a3d163200636137840d495eafe
                       ec4111e1b7f0a989a1d36150f725cf3f38f74a28
                       7b8e2a1083496b8687c3a59362188c8c82ad5533
                       af6ba502984531152df2694e20d1b63ebad0d07f
                       043fe00fd77dc145169500199b66862257af8568
                       8f5b798b79f12e221ee5711d8ca5fa7305ee5144
                       8e6f16fe715bd0f453126cccd4b363d97e414d89
                       cf34acf46fec17c5ed7ebb4a811bb26be6e826c4
                       286d0ee033946c740aaa541979bae36bf01cdb91
                       245ac5a5b22a012e3344f958097e57ead78990c2
                       18ca38e9a55b6a110efb2560cb8fce0514ebd8f1
                       889e465546964a5db00547a890f6cea3e236d30b
                       47a2b8bf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [66:94:72:d5:cc:af:a6:31:e3:60:7c:98:54:b9:b9:3c:a6:33:e3:a9]
            modulus: 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
    public exponent: 10001

] 
2021-06-14 12:09:19.026  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-14 12:09:19.027 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-14 12:09:19.028 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-06-14 12:09:19.029 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-14 12:09:19.029  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-06-14 12:09:19.030  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-14 12:09:19.030  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-14 12:09:19.030  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-14 12:09:19.030  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-14 12:09:19.035  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-14 12:09:19.035  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-14 12:09:19.036  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-14 12:09:19.037  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-14 12:09:19.106  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-14 12:09:19.106  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-14 12:09:19.106 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-14 12:09:19.107 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-14 12:09:19.123  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1582
2021-06-14 12:09:19.123  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-14 12:09:19.126  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-14 12:09:19.126  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-14 12:09:19.127  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-14 12:09:19.127  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-14 12:09:19.128 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-14 12:09:19.128 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-14 12:09:19.128 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-14 12:09:19.129 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-14 12:09:19.130 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-14 12:09:19.130 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-14 12:09:19.131 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-14 12:09:19.133 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 226981689146882109615894733597550008376542593219
             IssuerDN: UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 14 10:06:53 UTC 2021
           Final Date: Sat Jun 14 10:06:53 UTC 2031
            SubjectDN: UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [89:0c:00:b2:d0:55:51:06:19:1e:3c:65:ba:89:67:5c:c7:be:82:d9]
            modulus: a6223090ca01b783d82b2c7fc7e5938541c70c363aae03b9b27b7b506baff6879b90ab905676f296eead4822fe49da881e0dd4dcb979f2c2587e0aea5fdb6d751bc3f4559582e20391c51c7485da6f48659de4701f061d932715e81ed9216e3ce6ebf8696730c4b76128ba30800bf23605f04ed17c792a08aacb97f2ebcf62465926ae57562914652f8f171198ddd06b1adb7cd6b51b135b061d56c27303dc9f6392fd738c53407e7e9e0e7a0396f4d4572ecf573fead4ee48e02aa11a3502bb11db491f2f53cd03b5189b2155cfe0ab3fe62c0688a8d43e5677572fbbb81cb49703846982539f478fcaab0133ab6b3134b12be84262bd0dbb13fb757e4e1d493eaa659a96baa43917f82b46d178a145449b562458ef715ab8798b1e551ee769c056acabb7e646e67c03c8bf031f0f8fb484fe202adb948d9ccbdede5ab099e7028985954c21060a756770aaa63fa3ce1fce95d8d75d5e421e3c9630dd9531e7a279576fb0a075d041e0007d22befc1c24b539c9bfd2da0bdcf5ba2a419b0221
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a2680bccfac82b8ed5cbcd3e87fcf988aa3ce772
                       c7f328506f75005d0905bf84755cc8217adf3059
                       55218c761f294d927c03c7dc936e115d39169226
                       99c00197e96254b34e602ae3a02e837ba24ff2f4
                       8b009f183a2cf2f13260acc2ace539c20a2063d9
                       6b007c7b8bc4f73cd42f96c941f33c24de9415f2
                       595eb5c772c985861061aca63d2b0dec9af92158
                       d5205fcfdba7d0a3d163200636137840d495eafe
                       ec4111e1b7f0a989a1d36150f725cf3f38f74a28
                       7b8e2a1083496b8687c3a59362188c8c82ad5533
                       af6ba502984531152df2694e20d1b63ebad0d07f
                       043fe00fd77dc145169500199b66862257af8568
                       8f5b798b79f12e221ee5711d8ca5fa7305ee5144
                       8e6f16fe715bd0f453126cccd4b363d97e414d89
                       cf34acf46fec17c5ed7ebb4a811bb26be6e826c4
                       286d0ee033946c740aaa541979bae36bf01cdb91
                       245ac5a5b22a012e3344f958097e57ead78990c2
                       18ca38e9a55b6a110efb2560cb8fce0514ebd8f1
                       889e465546964a5db00547a890f6cea3e236d30b
                       47a2b8bf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [41:bc:88:24:74:37:b3:b8:c3:b5:b5:c2:9b:c3:65:8a:b7:c7:56:06]
            modulus: 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
    public exponent: 10001

] 
2021-06-14 12:10:21.755  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-14 12:10:21.755 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-14 12:10:21.756 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-06-14 12:10:21.756 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-14 12:10:21.757  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-06-14 12:10:21.757  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-14 12:10:21.757  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-14 12:10:21.757  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-14 12:10:21.757  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-14 12:10:21.761  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-14 12:10:21.761  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-14 12:10:21.761  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-14 12:10:21.762  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-14 12:10:21.841  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-14 12:10:21.842  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-14 12:10:21.842 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-14 12:10:21.844 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-14 12:10:21.844  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1582
2021-06-14 12:10:21.845  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-14 12:10:21.847  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-14 12:10:21.848  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-14 12:10:21.848  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-14 12:10:21.848  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-14 12:10:21.849 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-14 12:10:21.849 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-14 12:10:21.849 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-14 12:10:21.850 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-14 12:10:21.850 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-14 12:10:21.850 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-14 12:10:21.851 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-14 12:10:21.853 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 226981689146882109615894733597550008376542593219
             IssuerDN: UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 14 10:06:53 UTC 2021
           Final Date: Sat Jun 14 10:06:53 UTC 2031
            SubjectDN: UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [89:0c:00:b2:d0:55:51:06:19:1e:3c:65:ba:89:67:5c:c7:be:82:d9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a2680bccfac82b8ed5cbcd3e87fcf988aa3ce772
                       c7f328506f75005d0905bf84755cc8217adf3059
                       55218c761f294d927c03c7dc936e115d39169226
                       99c00197e96254b34e602ae3a02e837ba24ff2f4
                       8b009f183a2cf2f13260acc2ace539c20a2063d9
                       6b007c7b8bc4f73cd42f96c941f33c24de9415f2
                       595eb5c772c985861061aca63d2b0dec9af92158
                       d5205fcfdba7d0a3d163200636137840d495eafe
                       ec4111e1b7f0a989a1d36150f725cf3f38f74a28
                       7b8e2a1083496b8687c3a59362188c8c82ad5533
                       af6ba502984531152df2694e20d1b63ebad0d07f
                       043fe00fd77dc145169500199b66862257af8568
                       8f5b798b79f12e221ee5711d8ca5fa7305ee5144
                       8e6f16fe715bd0f453126cccd4b363d97e414d89
                       cf34acf46fec17c5ed7ebb4a811bb26be6e826c4
                       286d0ee033946c740aaa541979bae36bf01cdb91
                       245ac5a5b22a012e3344f958097e57ead78990c2
                       18ca38e9a55b6a110efb2560cb8fce0514ebd8f1
                       889e465546964a5db00547a890f6cea3e236d30b
                       47a2b8bf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d2:65:0b:fb:7a:a4:d2:48:ae:86:37:09:93:0b:d7:d2:5a:92:af:4d]
            modulus: 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
    public exponent: 10001

] 
2021-06-14 12:10:44.037  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-14 12:10:44.038 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-14 12:10:44.039 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-14 12:10:44.039 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-14 12:10:44.039  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-14 12:10:44.040  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-14 12:10:44.040  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-14 12:10:44.040  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-14 12:10:44.041  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-14 12:10:44.044  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-14 12:10:44.044  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-14 12:10:44.044  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-14 12:10:44.045  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-14 12:10:44.137  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-14 12:10:44.138  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-14 12:10:44.138 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-14 12:10:44.140 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-14 12:10:44.140  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1582
2021-06-14 12:10:44.141  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-14 12:10:44.142  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-14 12:10:44.142  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-14 12:10:44.143  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-14 12:10:44.143  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-14 12:10:44.143 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-14 12:10:44.143 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-14 12:10:44.143 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-14 12:10:44.144 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-14 12:10:44.144 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-14 12:10:44.144 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-14 12:10:44.145 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-14 12:10:44.148 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 226981689146882109615894733597550008376542593219
             IssuerDN: UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 14 10:06:53 UTC 2021
           Final Date: Sat Jun 14 10:06:53 UTC 2031
            SubjectDN: UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [89:0c:00:b2:d0:55:51:06:19:1e:3c:65:ba:89:67:5c:c7:be:82:d9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a2680bccfac82b8ed5cbcd3e87fcf988aa3ce772
                       c7f328506f75005d0905bf84755cc8217adf3059
                       55218c761f294d927c03c7dc936e115d39169226
                       99c00197e96254b34e602ae3a02e837ba24ff2f4
                       8b009f183a2cf2f13260acc2ace539c20a2063d9
                       6b007c7b8bc4f73cd42f96c941f33c24de9415f2
                       595eb5c772c985861061aca63d2b0dec9af92158
                       d5205fcfdba7d0a3d163200636137840d495eafe
                       ec4111e1b7f0a989a1d36150f725cf3f38f74a28
                       7b8e2a1083496b8687c3a59362188c8c82ad5533
                       af6ba502984531152df2694e20d1b63ebad0d07f
                       043fe00fd77dc145169500199b66862257af8568
                       8f5b798b79f12e221ee5711d8ca5fa7305ee5144
                       8e6f16fe715bd0f453126cccd4b363d97e414d89
                       cf34acf46fec17c5ed7ebb4a811bb26be6e826c4
                       286d0ee033946c740aaa541979bae36bf01cdb91
                       245ac5a5b22a012e3344f958097e57ead78990c2
                       18ca38e9a55b6a110efb2560cb8fce0514ebd8f1
                       889e465546964a5db00547a890f6cea3e236d30b
                       47a2b8bf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [31:d1:95:93:6b:90:4c:26:a9:a8:d1:8f:45:7a:77:9d:4d:be:2f:ec]
            modulus: ba2b9a86614b1c9b241ad498473f4d612b89a5986e7a242d4b5d42d4f8a39050cb92db39b16b8ae51fa584cf00026f7fe1ef379c5953de50f69cdf07f9c089053e7722b65655b44a2ae611b7cdc183469ebe46adcb495621f74a726a401b87388ace5a37393c68843966c20f9e266639a2d90eddfa86f233560a503fb8095a7124ddf62b771580ec21e4a08c20a426d052aa8fdc9b1b8fbac0549a3897a4d8b3c2a01ac8506f92e7527ef47328a9686027675245a889cf5a2fc491da03927ec6c1fad2166e9142ddf10fd04f3f87d3f44e5f1c576ef9d5dd035a0691fe8fd7755bf6f56fde9e00e93e3e815e2d9da18b8337c7bf6841fb3cfbe29ac30c9645e5
    public exponent: 10001

] 
2021-06-14 12:14:12.330  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-14 12:14:12.330 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-14 12:14:12.331 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-14 12:14:12.332 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-14 12:14:12.332  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-14 12:14:12.332  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-14 12:14:12.332  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-14 12:14:12.332  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-14 12:14:12.332  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-14 12:14:12.338  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-14 12:14:12.423  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-14 12:14:12.424  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-14 12:14:12.427  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-14 12:14:12.511  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-14 12:14:12.512  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-14 12:14:12.512 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-14 12:14:12.524 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-14 12:14:12.525  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1582
2021-06-14 12:14:12.526  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-14 12:14:12.528  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-14 12:14:12.529  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-14 12:14:12.529  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-14 12:14:12.530  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-14 12:14:12.530 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-14 12:14:12.530 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-14 12:14:12.530 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-14 12:14:12.531 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-14 12:14:12.532 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-14 12:14:12.532 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-14 12:14:12.534 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-14 12:14:12.537 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 226981689146882109615894733597550008376542593219
             IssuerDN: UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 14 10:06:53 UTC 2021
           Final Date: Sat Jun 14 10:06:53 UTC 2031
            SubjectDN: UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [89:0c:00:b2:d0:55:51:06:19:1e:3c:65:ba:89:67:5c:c7:be:82:d9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a2680bccfac82b8ed5cbcd3e87fcf988aa3ce772
                       c7f328506f75005d0905bf84755cc8217adf3059
                       55218c761f294d927c03c7dc936e115d39169226
                       99c00197e96254b34e602ae3a02e837ba24ff2f4
                       8b009f183a2cf2f13260acc2ace539c20a2063d9
                       6b007c7b8bc4f73cd42f96c941f33c24de9415f2
                       595eb5c772c985861061aca63d2b0dec9af92158
                       d5205fcfdba7d0a3d163200636137840d495eafe
                       ec4111e1b7f0a989a1d36150f725cf3f38f74a28
                       7b8e2a1083496b8687c3a59362188c8c82ad5533
                       af6ba502984531152df2694e20d1b63ebad0d07f
                       043fe00fd77dc145169500199b66862257af8568
                       8f5b798b79f12e221ee5711d8ca5fa7305ee5144
                       8e6f16fe715bd0f453126cccd4b363d97e414d89
                       cf34acf46fec17c5ed7ebb4a811bb26be6e826c4
                       286d0ee033946c740aaa541979bae36bf01cdb91
                       245ac5a5b22a012e3344f958097e57ead78990c2
                       18ca38e9a55b6a110efb2560cb8fce0514ebd8f1
                       889e465546964a5db00547a890f6cea3e236d30b
                       47a2b8bf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [80:ce:10:ac:e8:15:8e:13:d0:43:24:1b:d6:27:ae:6b:0e:08:3a:69]
            modulus: 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
    public exponent: 10001

] 
2021-06-14 12:15:57.622  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-14 12:15:57.623 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-14 12:15:57.625 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-14 12:15:57.626 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-14 12:15:57.626  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-14 12:15:57.627  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-14 12:15:57.627  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-14 12:15:57.628  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-14 12:15:57.628  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-14 12:15:57.632  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-14 12:15:57.632  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-14 12:15:57.632  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-14 12:15:57.633  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-14 12:15:57.723  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-14 12:15:57.724  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-14 12:15:57.724 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-14 12:15:57.724 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-14 12:15:57.725  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1582
2021-06-14 12:15:57.725  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-14 12:15:57.726  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-14 12:15:57.726  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-14 12:15:57.726  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-14 12:15:57.726  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-14 12:15:57.726 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-14 12:15:57.726 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-14 12:15:57.727 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-14 12:15:57.727 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-14 12:15:57.727 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-14 12:15:57.727 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-14 12:15:57.727 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-14 12:15:57.729 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 226981689146882109615894733597550008376542593219
             IssuerDN: UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 14 10:06:53 UTC 2021
           Final Date: Sat Jun 14 10:06:53 UTC 2031
            SubjectDN: UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [89:0c:00:b2:d0:55:51:06:19:1e:3c:65:ba:89:67:5c:c7:be:82:d9]
            modulus: a6223090ca01b783d82b2c7fc7e5938541c70c363aae03b9b27b7b506baff6879b90ab905676f296eead4822fe49da881e0dd4dcb979f2c2587e0aea5fdb6d751bc3f4559582e20391c51c7485da6f48659de4701f061d932715e81ed9216e3ce6ebf8696730c4b76128ba30800bf23605f04ed17c792a08aacb97f2ebcf62465926ae57562914652f8f171198ddd06b1adb7cd6b51b135b061d56c27303dc9f6392fd738c53407e7e9e0e7a0396f4d4572ecf573fead4ee48e02aa11a3502bb11db491f2f53cd03b5189b2155cfe0ab3fe62c0688a8d43e5677572fbbb81cb49703846982539f478fcaab0133ab6b3134b12be84262bd0dbb13fb757e4e1d493eaa659a96baa43917f82b46d178a145449b562458ef715ab8798b1e551ee769c056acabb7e646e67c03c8bf031f0f8fb484fe202adb948d9ccbdede5ab099e7028985954c21060a756770aaa63fa3ce1fce95d8d75d5e421e3c9630dd9531e7a279576fb0a075d041e0007d22befc1c24b539c9bfd2da0bdcf5ba2a419b0221
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a2680bccfac82b8ed5cbcd3e87fcf988aa3ce772
                       c7f328506f75005d0905bf84755cc8217adf3059
                       55218c761f294d927c03c7dc936e115d39169226
                       99c00197e96254b34e602ae3a02e837ba24ff2f4
                       8b009f183a2cf2f13260acc2ace539c20a2063d9
                       6b007c7b8bc4f73cd42f96c941f33c24de9415f2
                       595eb5c772c985861061aca63d2b0dec9af92158
                       d5205fcfdba7d0a3d163200636137840d495eafe
                       ec4111e1b7f0a989a1d36150f725cf3f38f74a28
                       7b8e2a1083496b8687c3a59362188c8c82ad5533
                       af6ba502984531152df2694e20d1b63ebad0d07f
                       043fe00fd77dc145169500199b66862257af8568
                       8f5b798b79f12e221ee5711d8ca5fa7305ee5144
                       8e6f16fe715bd0f453126cccd4b363d97e414d89
                       cf34acf46fec17c5ed7ebb4a811bb26be6e826c4
                       286d0ee033946c740aaa541979bae36bf01cdb91
                       245ac5a5b22a012e3344f958097e57ead78990c2
                       18ca38e9a55b6a110efb2560cb8fce0514ebd8f1
                       889e465546964a5db00547a890f6cea3e236d30b
                       47a2b8bf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c1:77:7b:71:80:ce:36:1f:0e:31:61:00:d2:4f:06:48:f7:d2:b1:3a]
            modulus: c5ce5e6627ab53501a3aad29eef335de98d2b0a0cac1442c3273eb9cf2f75aff20b9c5d2f169a32a3f9b8825c93b4e3989588d1cc63927a4c0ff5d91f22af047b2e4cf65f76f7cdb13c7cd414c18758138caeb9048d81a7e4439de49358ac79077efea143da88eb4df3996d4299d0db936ec33f30f37e439f8cd3894b58c490dcd593cbd058a5d360cd63a7dc412424acd69878d12b052d70860f734e60d273c5335d6483d77762fd45a90e8ab08db2caf673b848b6ea816275fe41c51f2c25512231e2d8afccef23c9876ab007663bb3ba0649ad8461d6c150c90994227d5c0b3eed1295c424d422ba955cbb693df17577974bb6bb077fb6db974ce9d9f325f
    public exponent: 10001

] 
2021-06-14 12:17:37.568  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-14 12:17:37.570 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-14 12:17:37.572 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-14 12:17:37.573 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-14 12:17:37.573  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-14 12:17:37.573  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-14 12:17:37.574  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-14 12:17:37.574  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-14 12:17:37.574  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-14 12:17:37.578  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-14 12:17:37.579  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-14 12:17:37.579  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-14 12:17:37.580  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-14 12:17:37.726  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-14 12:17:37.727  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-14 12:17:37.728 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-14 12:17:37.730 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-14 12:17:37.731  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1582
2021-06-14 12:17:37.731  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-14 12:17:37.733  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-14 12:17:37.734  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-14 12:17:37.734  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-14 12:17:37.734  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-14 12:17:37.735 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-14 12:17:37.735 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-14 12:17:37.735 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-14 12:17:37.735 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-14 12:17:37.735 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-14 12:17:37.736 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-14 12:17:37.736 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-14 12:17:37.739 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 226981689146882109615894733597550008376542593219
             IssuerDN: UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 14 10:06:53 UTC 2021
           Final Date: Sat Jun 14 10:06:53 UTC 2031
            SubjectDN: UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [89:0c:00:b2:d0:55:51:06:19:1e:3c:65:ba:89:67:5c:c7:be:82:d9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a2680bccfac82b8ed5cbcd3e87fcf988aa3ce772
                       c7f328506f75005d0905bf84755cc8217adf3059
                       55218c761f294d927c03c7dc936e115d39169226
                       99c00197e96254b34e602ae3a02e837ba24ff2f4
                       8b009f183a2cf2f13260acc2ace539c20a2063d9
                       6b007c7b8bc4f73cd42f96c941f33c24de9415f2
                       595eb5c772c985861061aca63d2b0dec9af92158
                       d5205fcfdba7d0a3d163200636137840d495eafe
                       ec4111e1b7f0a989a1d36150f725cf3f38f74a28
                       7b8e2a1083496b8687c3a59362188c8c82ad5533
                       af6ba502984531152df2694e20d1b63ebad0d07f
                       043fe00fd77dc145169500199b66862257af8568
                       8f5b798b79f12e221ee5711d8ca5fa7305ee5144
                       8e6f16fe715bd0f453126cccd4b363d97e414d89
                       cf34acf46fec17c5ed7ebb4a811bb26be6e826c4
                       286d0ee033946c740aaa541979bae36bf01cdb91
                       245ac5a5b22a012e3344f958097e57ead78990c2
                       18ca38e9a55b6a110efb2560cb8fce0514ebd8f1
                       889e465546964a5db00547a890f6cea3e236d30b
                       47a2b8bf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f4:59:b4:b4:58:9c:89:21:1a:bf:3d:d8:0f:7c:e6:17:f5:52:02:79]
            modulus: 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
    public exponent: 10001

] 
2021-06-14 12:17:38.799  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-14 12:17:38.799 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-14 12:17:38.800 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-14 12:17:38.800 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-14 12:17:38.801  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-14 12:17:38.801  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-14 12:17:38.801  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-14 12:17:38.802  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-14 12:17:38.802  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-14 12:17:38.806  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-14 12:17:38.806  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-14 12:17:38.806  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-14 12:17:38.807  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-14 12:17:38.862  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-14 12:17:38.863  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-14 12:17:38.863 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-14 12:17:38.865 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-14 12:17:38.866  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1582
2021-06-14 12:17:38.866  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-14 12:17:38.868  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-14 12:17:38.868  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-14 12:17:38.869  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-14 12:17:38.869  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-14 12:17:38.869 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-14 12:17:38.870 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-14 12:17:38.870 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-14 12:17:38.871 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-14 12:17:38.871 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-14 12:17:38.871 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-14 12:17:38.872 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-14 12:17:38.875 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 226981689146882109615894733597550008376542593219
             IssuerDN: UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 14 10:06:53 UTC 2021
           Final Date: Sat Jun 14 10:06:53 UTC 2031
            SubjectDN: UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [89:0c:00:b2:d0:55:51:06:19:1e:3c:65:ba:89:67:5c:c7:be:82:d9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a2680bccfac82b8ed5cbcd3e87fcf988aa3ce772
                       c7f328506f75005d0905bf84755cc8217adf3059
                       55218c761f294d927c03c7dc936e115d39169226
                       99c00197e96254b34e602ae3a02e837ba24ff2f4
                       8b009f183a2cf2f13260acc2ace539c20a2063d9
                       6b007c7b8bc4f73cd42f96c941f33c24de9415f2
                       595eb5c772c985861061aca63d2b0dec9af92158
                       d5205fcfdba7d0a3d163200636137840d495eafe
                       ec4111e1b7f0a989a1d36150f725cf3f38f74a28
                       7b8e2a1083496b8687c3a59362188c8c82ad5533
                       af6ba502984531152df2694e20d1b63ebad0d07f
                       043fe00fd77dc145169500199b66862257af8568
                       8f5b798b79f12e221ee5711d8ca5fa7305ee5144
                       8e6f16fe715bd0f453126cccd4b363d97e414d89
                       cf34acf46fec17c5ed7ebb4a811bb26be6e826c4
                       286d0ee033946c740aaa541979bae36bf01cdb91
                       245ac5a5b22a012e3344f958097e57ead78990c2
                       18ca38e9a55b6a110efb2560cb8fce0514ebd8f1
                       889e465546964a5db00547a890f6cea3e236d30b
                       47a2b8bf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f2:c4:1f:c3:78:16:70:6b:a3:a2:1a:c2:35:00:ca:c7:1e:a9:f2:4a]
            modulus: 83d4d9a1dd4ca1a289bfda1d0849aeef3ca077e438905e311940ef375e550c39d62f2782dd66a4ae277879cae1234db3ead006464769de5aaecd704de9b9fcd2cd4d2e1511a601b7c9b308102cd8fec510c8ca721f658180b65f40181de822c631ec70d7a3d25a3a6b312f268a7b4c06bc881ac374341d6fbf4949e21b2875c67e6c20d906d36cf3a3536bf39a93443a8a1159737d6a2df93ad0abaf7752b89ec6d1e0a675122348d5cc47e67515a61c7dab91129c0cb57c2c032632c52ed854d058526393cc28c8038f03b9531b0298f98f1712ea47a3c777801692f97764366eeb620bc76dae50a926814b851d1d6d1dd217f1f751a383c295acc791c80165
    public exponent: 10001

] 
2021-06-14 12:19:23.094  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-14 12:19:23.095 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-14 12:19:23.096 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-06-14 12:19:23.096 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-14 12:19:23.096  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-06-14 12:19:23.097  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-14 12:19:23.097  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-14 12:19:23.097  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-14 12:19:23.098  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-14 12:19:23.103  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-14 12:19:23.103  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-14 12:19:23.104  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-14 12:19:23.104  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-14 12:19:23.191  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-14 12:19:23.191  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-14 12:19:23.192 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-14 12:19:23.194 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-14 12:19:23.195  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1582
2021-06-14 12:19:23.195  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-14 12:19:23.198  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-14 12:19:23.198  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-14 12:19:23.199  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-14 12:19:23.199  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-14 12:19:23.200 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-14 12:19:23.200 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-14 12:19:23.200 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-14 12:19:23.201 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-14 12:19:23.202 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-14 12:19:23.202 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-14 12:19:23.203 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-14 12:19:23.205 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 226981689146882109615894733597550008376542593219
             IssuerDN: UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 14 10:06:53 UTC 2021
           Final Date: Sat Jun 14 10:06:53 UTC 2031
            SubjectDN: UID=c-067c5234175fed65e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [89:0c:00:b2:d0:55:51:06:19:1e:3c:65:ba:89:67:5c:c7:be:82:d9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a2680bccfac82b8ed5cbcd3e87fcf988aa3ce772
                       c7f328506f75005d0905bf84755cc8217adf3059
                       55218c761f294d927c03c7dc936e115d39169226
                       99c00197e96254b34e602ae3a02e837ba24ff2f4
                       8b009f183a2cf2f13260acc2ace539c20a2063d9
                       6b007c7b8bc4f73cd42f96c941f33c24de9415f2
                       595eb5c772c985861061aca63d2b0dec9af92158
                       d5205fcfdba7d0a3d163200636137840d495eafe
                       ec4111e1b7f0a989a1d36150f725cf3f38f74a28
                       7b8e2a1083496b8687c3a59362188c8c82ad5533
                       af6ba502984531152df2694e20d1b63ebad0d07f
                       043fe00fd77dc145169500199b66862257af8568
                       8f5b798b79f12e221ee5711d8ca5fa7305ee5144
                       8e6f16fe715bd0f453126cccd4b363d97e414d89
                       cf34acf46fec17c5ed7ebb4a811bb26be6e826c4
                       286d0ee033946c740aaa541979bae36bf01cdb91
                       245ac5a5b22a012e3344f958097e57ead78990c2
                       18ca38e9a55b6a110efb2560cb8fce0514ebd8f1
                       889e465546964a5db00547a890f6cea3e236d30b
                       47a2b8bf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [36:2b:81:3e:d1:68:4c:c9:77:2e:17:2c:24:f6:09:d2:7c:3f:81:7f]
            modulus: 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
    public exponent: 10001

]