Results

By type

          2021-06-05 10:34:16,138 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-06-05 10:34:19,851 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-06-05 10:34:22.742  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-06-05 10:34:34.451 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-06-05 10:34:35.457  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-06-05 10:34:36.235  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-06-05 10:34:49.147  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 35.49 seconds (JVM running for 42.721)
2021-06-05 10:50:01.152  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-05 10:50:01.240 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-05 10:50:01.352 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-06-05 10:50:01.355 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-05 10:50:01.443  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-06-05 10:50:01.446  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-05 10:50:01.450  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-05 10:50:01.451  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 10:50:01.451  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-05 10:50:01.540  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-05 10:50:01.545  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-05 10:50:01.655  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-05 10:50:01.741  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 10:50:01.742  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 10:50:01.757  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-05 10:50:02.948  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-05 10:50:02.951  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-05 10:50:02.952 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-05 10:50:02.957 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-05 10:50:03.034  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1575
2021-06-05 10:50:03.036  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-05 10:50:03.041  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-05 10:50:03.042  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-05 10:50:03.049  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-05 10:50:03.050  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-05 10:50:03.135 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 10:50:03.136 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 10:50:03.137 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 10:50:03.152 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 10:50:03.152 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 10:50:03.153 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 10:50:03.157 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-05 10:50:03.341 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 662177529468125435422034534271666145310945197757
             IssuerDN: UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 05 10:28:58 UTC 2021
           Final Date: Thu Jun 05 10:28:57 UTC 2031
            SubjectDN: UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d0:3b:b8:f7:0e:9a:a1:8c:a0:a3:30:37:60:b7:b2:d4:2b:6e:01:86]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 63228e3e066e0dddfe536936a5be045499769844
                       bbccdd8ff55a683a1f5f51eb54fd99b976596248
                       dfc2f86d3ae5dbb19ced2276145ff2c97897473a
                       b7372bf03a7221b89630ea45330273bcc07048c8
                       fafcc4bc11e925a77cd42d42b17ef3efadc45f40
                       2c5a80f011280c931ac3b897a0552de4ef2eb54d
                       27cc3257244db496387e5cf9c1af589cee589244
                       b7e8be5429792aefed3e8d4df8f0d57e12d1d724
                       c63cbd77d35874b5b451a9c363eda2db33087dca
                       21945fd6117f484f7df6a99cd41c3b51e9b2a1e9
                       1fc747702aed018172092ca65a4b00da561ebbac
                       b4d634249eaa825119e88e6f48a29ef543801646
                       7620c8508784dea1bc1b8d200a5e643a9359c0ab
                       3ebab0eca4b03ddd86727c13cb8f67ec09ff0623
                       611c092771965ea7271ae5e25957e38f62d3ddf8
                       1e20613d98b901e9327c2171bf8956fd770e3508
                       e6159a8f552c6d0e40719f5e3d64902d530ac117
                       2af64e30f48a083031261d4ff989bb2845879394
                       6c40db4d4f5233131c0d041061d1ce412e3f5661
                       c06e9660
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0c:e5:57:9d:29:ad:c8:3f:80:53:e5:5a:b4:71:f0:bf:76:d5:76:e5]
            modulus: 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
    public exponent: 10001

] 
2021-06-05 12:17:06.254  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-05 12:17:06.255 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-05 12:17:06.257 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-05 12:17:06.259 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-05 12:17:06.260  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-05 12:17:06.260  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-05 12:17:06.261  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-05 12:17:06.261  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-05 12:17:06.262  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-05 12:17:06.269  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-05 12:17:06.270  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 12:17:06.271  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 12:17:06.275  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-05 12:17:06.453  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-05 12:17:06.454  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-05 12:17:06.454 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-05 12:17:06.458 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-05 12:17:06.459  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1575
2021-06-05 12:17:06.459  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-05 12:17:06.464  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-05 12:17:06.465  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-05 12:17:06.465  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-05 12:17:06.535  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-05 12:17:06.536 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 12:17:06.536 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 12:17:06.536 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 12:17:06.537 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 12:17:06.538 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 12:17:06.538 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 12:17:06.539 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-05 12:17:06.546 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 662177529468125435422034534271666145310945197757
             IssuerDN: UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 05 10:28:58 UTC 2021
           Final Date: Thu Jun 05 10:28:57 UTC 2031
            SubjectDN: UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d0:3b:b8:f7:0e:9a:a1:8c:a0:a3:30:37:60:b7:b2:d4:2b:6e:01:86]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 63228e3e066e0dddfe536936a5be045499769844
                       bbccdd8ff55a683a1f5f51eb54fd99b976596248
                       dfc2f86d3ae5dbb19ced2276145ff2c97897473a
                       b7372bf03a7221b89630ea45330273bcc07048c8
                       fafcc4bc11e925a77cd42d42b17ef3efadc45f40
                       2c5a80f011280c931ac3b897a0552de4ef2eb54d
                       27cc3257244db496387e5cf9c1af589cee589244
                       b7e8be5429792aefed3e8d4df8f0d57e12d1d724
                       c63cbd77d35874b5b451a9c363eda2db33087dca
                       21945fd6117f484f7df6a99cd41c3b51e9b2a1e9
                       1fc747702aed018172092ca65a4b00da561ebbac
                       b4d634249eaa825119e88e6f48a29ef543801646
                       7620c8508784dea1bc1b8d200a5e643a9359c0ab
                       3ebab0eca4b03ddd86727c13cb8f67ec09ff0623
                       611c092771965ea7271ae5e25957e38f62d3ddf8
                       1e20613d98b901e9327c2171bf8956fd770e3508
                       e6159a8f552c6d0e40719f5e3d64902d530ac117
                       2af64e30f48a083031261d4ff989bb2845879394
                       6c40db4d4f5233131c0d041061d1ce412e3f5661
                       c06e9660
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [06:b0:fd:d0:56:38:fe:79:38:c7:98:e2:68:25:72:7e:48:b5:37:17]
            modulus: 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
    public exponent: 10001

] 
2021-06-05 12:21:44.586  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-05 12:21:44.587 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-05 12:21:44.589 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-05 12:21:44.590 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-05 12:21:44.590  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-05 12:21:44.591  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-05 12:21:44.592  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-05 12:21:44.592  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-05 12:21:44.592  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-05 12:21:44.598  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-05 12:21:44.636  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 12:21:44.637  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 12:21:44.646  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-05 12:21:44.839  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-05 12:21:44.840  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-05 12:21:44.840 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-05 12:21:44.842 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-05 12:21:44.844  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1575
2021-06-05 12:21:44.844  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-05 12:21:44.849  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-05 12:21:44.850  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-05 12:21:44.851  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-05 12:21:44.851  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-05 12:21:44.852 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 12:21:44.852 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 12:21:44.853 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 12:21:44.854 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 12:21:44.854 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 12:21:44.854 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 12:21:44.855 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-05 12:21:44.938 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 662177529468125435422034534271666145310945197757
             IssuerDN: UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 05 10:28:58 UTC 2021
           Final Date: Thu Jun 05 10:28:57 UTC 2031
            SubjectDN: UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d0:3b:b8:f7:0e:9a:a1:8c:a0:a3:30:37:60:b7:b2:d4:2b:6e:01:86]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 63228e3e066e0dddfe536936a5be045499769844
                       bbccdd8ff55a683a1f5f51eb54fd99b976596248
                       dfc2f86d3ae5dbb19ced2276145ff2c97897473a
                       b7372bf03a7221b89630ea45330273bcc07048c8
                       fafcc4bc11e925a77cd42d42b17ef3efadc45f40
                       2c5a80f011280c931ac3b897a0552de4ef2eb54d
                       27cc3257244db496387e5cf9c1af589cee589244
                       b7e8be5429792aefed3e8d4df8f0d57e12d1d724
                       c63cbd77d35874b5b451a9c363eda2db33087dca
                       21945fd6117f484f7df6a99cd41c3b51e9b2a1e9
                       1fc747702aed018172092ca65a4b00da561ebbac
                       b4d634249eaa825119e88e6f48a29ef543801646
                       7620c8508784dea1bc1b8d200a5e643a9359c0ab
                       3ebab0eca4b03ddd86727c13cb8f67ec09ff0623
                       611c092771965ea7271ae5e25957e38f62d3ddf8
                       1e20613d98b901e9327c2171bf8956fd770e3508
                       e6159a8f552c6d0e40719f5e3d64902d530ac117
                       2af64e30f48a083031261d4ff989bb2845879394
                       6c40db4d4f5233131c0d041061d1ce412e3f5661
                       c06e9660
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e2:25:1a:ef:6c:1b:4c:d2:b3:b3:27:50:7c:a1:de:95:4d:6e:fc:0b]
            modulus: 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
    public exponent: 10001

] 
2021-06-05 12:22:31.348  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-05 12:22:31.350 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-05 12:22:31.352 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-06-05 12:22:31.352 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-05 12:22:31.353  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-06-05 12:22:31.353  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-05 12:22:31.354  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-05 12:22:31.354  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-05 12:22:31.355  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-05 12:22:31.359  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-05 12:22:31.360  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 12:22:31.360  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 12:22:31.361  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-05 12:22:31.465  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-05 12:22:31.466  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-05 12:22:31.466 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-05 12:22:31.467 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-05 12:22:31.468  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1575
2021-06-05 12:22:31.468  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-05 12:22:31.469  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-05 12:22:31.469  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-05 12:22:31.470  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-05 12:22:31.470  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-05 12:22:31.470 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 12:22:31.471 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 12:22:31.471 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 12:22:31.471 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 12:22:31.472 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 12:22:31.472 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 12:22:31.472 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-05 12:22:31.475 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 662177529468125435422034534271666145310945197757
             IssuerDN: UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 05 10:28:58 UTC 2021
           Final Date: Thu Jun 05 10:28:57 UTC 2031
            SubjectDN: UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d0:3b:b8:f7:0e:9a:a1:8c:a0:a3:30:37:60:b7:b2:d4:2b:6e:01:86]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 63228e3e066e0dddfe536936a5be045499769844
                       bbccdd8ff55a683a1f5f51eb54fd99b976596248
                       dfc2f86d3ae5dbb19ced2276145ff2c97897473a
                       b7372bf03a7221b89630ea45330273bcc07048c8
                       fafcc4bc11e925a77cd42d42b17ef3efadc45f40
                       2c5a80f011280c931ac3b897a0552de4ef2eb54d
                       27cc3257244db496387e5cf9c1af589cee589244
                       b7e8be5429792aefed3e8d4df8f0d57e12d1d724
                       c63cbd77d35874b5b451a9c363eda2db33087dca
                       21945fd6117f484f7df6a99cd41c3b51e9b2a1e9
                       1fc747702aed018172092ca65a4b00da561ebbac
                       b4d634249eaa825119e88e6f48a29ef543801646
                       7620c8508784dea1bc1b8d200a5e643a9359c0ab
                       3ebab0eca4b03ddd86727c13cb8f67ec09ff0623
                       611c092771965ea7271ae5e25957e38f62d3ddf8
                       1e20613d98b901e9327c2171bf8956fd770e3508
                       e6159a8f552c6d0e40719f5e3d64902d530ac117
                       2af64e30f48a083031261d4ff989bb2845879394
                       6c40db4d4f5233131c0d041061d1ce412e3f5661
                       c06e9660
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [88:c4:b5:b2:f2:99:08:f7:68:53:60:2a:2e:1b:90:d1:87:52:55:93]
            modulus: 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
    public exponent: 10001

] 
2021-06-05 12:23:10.771  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-05 12:23:10.772 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-05 12:23:10.774 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-06-05 12:23:10.775 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-05 12:23:10.776  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-06-05 12:23:10.776  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-05 12:23:10.777  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-05 12:23:10.777  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-05 12:23:10.777  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-05 12:23:10.784  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-05 12:23:10.785  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 12:23:10.785  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 12:23:10.786  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-05 12:23:10.944  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-05 12:23:10.945  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-05 12:23:10.945 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-05 12:23:10.946 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-05 12:23:10.947  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1575
2021-06-05 12:23:10.947  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-05 12:23:10.948  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-05 12:23:10.949  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-05 12:23:10.949  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-05 12:23:10.950  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-05 12:23:10.950 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 12:23:10.950 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 12:23:10.951 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 12:23:10.951 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 12:23:10.952 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 12:23:10.952 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 12:23:10.953 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-05 12:23:10.955 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 662177529468125435422034534271666145310945197757
             IssuerDN: UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 05 10:28:58 UTC 2021
           Final Date: Thu Jun 05 10:28:57 UTC 2031
            SubjectDN: UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d0:3b:b8:f7:0e:9a:a1:8c:a0:a3:30:37:60:b7:b2:d4:2b:6e:01:86]
            modulus: a86ad51e33133c5748b5da5ddb079d05a97c4bcd7d4f238e4f4da44f6d8964a1499b1e35b775e171fc4295accf51ef331f3513c2d816bce4a18ad195c258796c955633d64315b8a11fe2d2e163cd4ef24144bc943f86cd72c6ae152d168c9128fdcffbe105a5d7ef60e9265af92495e81e84ec793d1ee610b9906e1edc4b605ff7ad1bd5014ef4b031e2a13d22529aec8e353fab46f438170be019af9c9595427cd3ea396a267765109249880e14a0718ed9689d3ccdf9b1681d878899b781fddc1ba5e82458eba10996b4c11401f67cd3555b1d1d6897902bd734b91827aea632e9dba6954b8038f349a8a3ff259f2d61a035123dd3033563dd807f5dfe4d5abb23fffae8575050c1fe9276684737e74a2842b44d7e63c22a0b8f7d6f9f0b6dfc841d43becbb376fa110860c9bb50838473189c51d28ab2f43830097447f625ab42294c18cdb357a979d004a04c5a47163fa10fb1ee0e58b60ac5f896a5c7e1e0907876199e986cbaa96ef31a1e44fa934a9559fbfa5efac8d856050fcc75fb
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 63228e3e066e0dddfe536936a5be045499769844
                       bbccdd8ff55a683a1f5f51eb54fd99b976596248
                       dfc2f86d3ae5dbb19ced2276145ff2c97897473a
                       b7372bf03a7221b89630ea45330273bcc07048c8
                       fafcc4bc11e925a77cd42d42b17ef3efadc45f40
                       2c5a80f011280c931ac3b897a0552de4ef2eb54d
                       27cc3257244db496387e5cf9c1af589cee589244
                       b7e8be5429792aefed3e8d4df8f0d57e12d1d724
                       c63cbd77d35874b5b451a9c363eda2db33087dca
                       21945fd6117f484f7df6a99cd41c3b51e9b2a1e9
                       1fc747702aed018172092ca65a4b00da561ebbac
                       b4d634249eaa825119e88e6f48a29ef543801646
                       7620c8508784dea1bc1b8d200a5e643a9359c0ab
                       3ebab0eca4b03ddd86727c13cb8f67ec09ff0623
                       611c092771965ea7271ae5e25957e38f62d3ddf8
                       1e20613d98b901e9327c2171bf8956fd770e3508
                       e6159a8f552c6d0e40719f5e3d64902d530ac117
                       2af64e30f48a083031261d4ff989bb2845879394
                       6c40db4d4f5233131c0d041061d1ce412e3f5661
                       c06e9660
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [85:2b:5e:ea:23:5c:4a:97:ab:e7:2b:7a:ed:aa:44:75:4a:e9:ff:95]
            modulus: 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
    public exponent: 10001

] 
2021-06-05 12:23:25.581  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-05 12:23:25.582 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-05 12:23:25.583 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-05 12:23:25.584 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-05 12:23:25.584  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-05 12:23:25.585  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-05 12:23:25.585  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-05 12:23:25.585  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-05 12:23:25.586  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-05 12:23:25.590  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-05 12:23:25.591  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 12:23:25.591  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 12:23:25.592  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-05 12:23:25.658  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-05 12:23:25.658  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-05 12:23:25.659 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-05 12:23:25.660 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-05 12:23:25.660  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1575
2021-06-05 12:23:25.661  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-05 12:23:25.662  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-05 12:23:25.662  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-05 12:23:25.662  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-05 12:23:25.663  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-05 12:23:25.663 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 12:23:25.663 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 12:23:25.663 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 12:23:25.664 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 12:23:25.664 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 12:23:25.664 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 12:23:25.665 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-05 12:23:25.667 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 662177529468125435422034534271666145310945197757
             IssuerDN: UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 05 10:28:58 UTC 2021
           Final Date: Thu Jun 05 10:28:57 UTC 2031
            SubjectDN: UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d0:3b:b8:f7:0e:9a:a1:8c:a0:a3:30:37:60:b7:b2:d4:2b:6e:01:86]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 63228e3e066e0dddfe536936a5be045499769844
                       bbccdd8ff55a683a1f5f51eb54fd99b976596248
                       dfc2f86d3ae5dbb19ced2276145ff2c97897473a
                       b7372bf03a7221b89630ea45330273bcc07048c8
                       fafcc4bc11e925a77cd42d42b17ef3efadc45f40
                       2c5a80f011280c931ac3b897a0552de4ef2eb54d
                       27cc3257244db496387e5cf9c1af589cee589244
                       b7e8be5429792aefed3e8d4df8f0d57e12d1d724
                       c63cbd77d35874b5b451a9c363eda2db33087dca
                       21945fd6117f484f7df6a99cd41c3b51e9b2a1e9
                       1fc747702aed018172092ca65a4b00da561ebbac
                       b4d634249eaa825119e88e6f48a29ef543801646
                       7620c8508784dea1bc1b8d200a5e643a9359c0ab
                       3ebab0eca4b03ddd86727c13cb8f67ec09ff0623
                       611c092771965ea7271ae5e25957e38f62d3ddf8
                       1e20613d98b901e9327c2171bf8956fd770e3508
                       e6159a8f552c6d0e40719f5e3d64902d530ac117
                       2af64e30f48a083031261d4ff989bb2845879394
                       6c40db4d4f5233131c0d041061d1ce412e3f5661
                       c06e9660
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9f:e9:58:96:37:a9:96:21:89:af:aa:35:c7:43:25:0a:28:9f:20:23]
            modulus: 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
    public exponent: 10001

] 
2021-06-05 12:24:35.947  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-05 12:24:35.949 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-05 12:24:35.950 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-06-05 12:24:35.951 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-05 12:24:35.951  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-06-05 12:24:35.952  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-05 12:24:35.952  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-05 12:24:35.952  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-05 12:24:35.953  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-05 12:24:35.956  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-05 12:24:35.957  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 12:24:35.957  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 12:24:35.958  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-05 12:24:36.041  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-05 12:24:36.042  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-05 12:24:36.043 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-05 12:24:36.047 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-05 12:24:36.048  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1575
2021-06-05 12:24:36.049  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-05 12:24:36.050  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-05 12:24:36.051  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-05 12:24:36.051  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-05 12:24:36.052  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-05 12:24:36.052 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 12:24:36.053 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 12:24:36.053 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 12:24:36.054 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 12:24:36.054 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 12:24:36.054 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 12:24:36.055 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-05 12:24:36.058 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 662177529468125435422034534271666145310945197757
             IssuerDN: UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 05 10:28:58 UTC 2021
           Final Date: Thu Jun 05 10:28:57 UTC 2031
            SubjectDN: UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d0:3b:b8:f7:0e:9a:a1:8c:a0:a3:30:37:60:b7:b2:d4:2b:6e:01:86]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 63228e3e066e0dddfe536936a5be045499769844
                       bbccdd8ff55a683a1f5f51eb54fd99b976596248
                       dfc2f86d3ae5dbb19ced2276145ff2c97897473a
                       b7372bf03a7221b89630ea45330273bcc07048c8
                       fafcc4bc11e925a77cd42d42b17ef3efadc45f40
                       2c5a80f011280c931ac3b897a0552de4ef2eb54d
                       27cc3257244db496387e5cf9c1af589cee589244
                       b7e8be5429792aefed3e8d4df8f0d57e12d1d724
                       c63cbd77d35874b5b451a9c363eda2db33087dca
                       21945fd6117f484f7df6a99cd41c3b51e9b2a1e9
                       1fc747702aed018172092ca65a4b00da561ebbac
                       b4d634249eaa825119e88e6f48a29ef543801646
                       7620c8508784dea1bc1b8d200a5e643a9359c0ab
                       3ebab0eca4b03ddd86727c13cb8f67ec09ff0623
                       611c092771965ea7271ae5e25957e38f62d3ddf8
                       1e20613d98b901e9327c2171bf8956fd770e3508
                       e6159a8f552c6d0e40719f5e3d64902d530ac117
                       2af64e30f48a083031261d4ff989bb2845879394
                       6c40db4d4f5233131c0d041061d1ce412e3f5661
                       c06e9660
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8f:74:d9:88:6c:89:ec:a2:07:1b:d5:78:4d:b2:19:7e:aa:44:1b:62]
            modulus: 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
    public exponent: 10001

] 
2021-06-05 12:25:34.542  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-05 12:25:34.544 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-05 12:25:34.545 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-06-05 12:25:34.546 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-05 12:25:34.546  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-06-05 12:25:34.546  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-05 12:25:34.547  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-05 12:25:34.547  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-05 12:25:34.548  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-05 12:25:34.551  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-05 12:25:34.552  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 12:25:34.552  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 12:25:34.553  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-05 12:25:34.654  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-05 12:25:34.655  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-05 12:25:34.656 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-05 12:25:34.658 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-05 12:25:34.659  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1575
2021-06-05 12:25:34.660  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-05 12:25:34.662  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-05 12:25:34.663  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-05 12:25:34.663  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-05 12:25:34.664  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-05 12:25:34.664 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 12:25:34.664 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 12:25:34.664 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 12:25:34.665 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 12:25:34.665 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 12:25:34.666 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 12:25:34.666 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-05 12:25:34.738 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 662177529468125435422034534271666145310945197757
             IssuerDN: UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 05 10:28:58 UTC 2021
           Final Date: Thu Jun 05 10:28:57 UTC 2031
            SubjectDN: UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d0:3b:b8:f7:0e:9a:a1:8c:a0:a3:30:37:60:b7:b2:d4:2b:6e:01:86]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 63228e3e066e0dddfe536936a5be045499769844
                       bbccdd8ff55a683a1f5f51eb54fd99b976596248
                       dfc2f86d3ae5dbb19ced2276145ff2c97897473a
                       b7372bf03a7221b89630ea45330273bcc07048c8
                       fafcc4bc11e925a77cd42d42b17ef3efadc45f40
                       2c5a80f011280c931ac3b897a0552de4ef2eb54d
                       27cc3257244db496387e5cf9c1af589cee589244
                       b7e8be5429792aefed3e8d4df8f0d57e12d1d724
                       c63cbd77d35874b5b451a9c363eda2db33087dca
                       21945fd6117f484f7df6a99cd41c3b51e9b2a1e9
                       1fc747702aed018172092ca65a4b00da561ebbac
                       b4d634249eaa825119e88e6f48a29ef543801646
                       7620c8508784dea1bc1b8d200a5e643a9359c0ab
                       3ebab0eca4b03ddd86727c13cb8f67ec09ff0623
                       611c092771965ea7271ae5e25957e38f62d3ddf8
                       1e20613d98b901e9327c2171bf8956fd770e3508
                       e6159a8f552c6d0e40719f5e3d64902d530ac117
                       2af64e30f48a083031261d4ff989bb2845879394
                       6c40db4d4f5233131c0d041061d1ce412e3f5661
                       c06e9660
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ad:b6:34:29:45:d8:77:b0:85:c2:a9:48:33:d9:e5:55:d8:f2:f4:34]
            modulus: 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
    public exponent: 10001

] 
2021-06-05 12:25:39.720  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-05 12:25:39.720 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-05 12:25:39.722 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-05 12:25:39.722 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-05 12:25:39.722  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-05 12:25:39.723  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-05 12:25:39.723  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-05 12:25:39.723  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-05 12:25:39.723  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-05 12:25:39.727  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-05 12:25:39.728  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 12:25:39.728  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 12:25:39.729  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-05 12:25:39.801  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-05 12:25:39.802  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-05 12:25:39.803 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-05 12:25:39.806 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-05 12:25:39.807  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1575
2021-06-05 12:25:39.808  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-05 12:25:39.811  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-05 12:25:39.811  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-05 12:25:39.835  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-05 12:25:39.835  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-05 12:25:39.836 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 12:25:39.836 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 12:25:39.836 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 12:25:39.837 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 12:25:39.837 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 12:25:39.837 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 12:25:39.838 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-05 12:25:39.840 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 662177529468125435422034534271666145310945197757
             IssuerDN: UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 05 10:28:58 UTC 2021
           Final Date: Thu Jun 05 10:28:57 UTC 2031
            SubjectDN: UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d0:3b:b8:f7:0e:9a:a1:8c:a0:a3:30:37:60:b7:b2:d4:2b:6e:01:86]
            modulus: a86ad51e33133c5748b5da5ddb079d05a97c4bcd7d4f238e4f4da44f6d8964a1499b1e35b775e171fc4295accf51ef331f3513c2d816bce4a18ad195c258796c955633d64315b8a11fe2d2e163cd4ef24144bc943f86cd72c6ae152d168c9128fdcffbe105a5d7ef60e9265af92495e81e84ec793d1ee610b9906e1edc4b605ff7ad1bd5014ef4b031e2a13d22529aec8e353fab46f438170be019af9c9595427cd3ea396a267765109249880e14a0718ed9689d3ccdf9b1681d878899b781fddc1ba5e82458eba10996b4c11401f67cd3555b1d1d6897902bd734b91827aea632e9dba6954b8038f349a8a3ff259f2d61a035123dd3033563dd807f5dfe4d5abb23fffae8575050c1fe9276684737e74a2842b44d7e63c22a0b8f7d6f9f0b6dfc841d43becbb376fa110860c9bb50838473189c51d28ab2f43830097447f625ab42294c18cdb357a979d004a04c5a47163fa10fb1ee0e58b60ac5f896a5c7e1e0907876199e986cbaa96ef31a1e44fa934a9559fbfa5efac8d856050fcc75fb
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 63228e3e066e0dddfe536936a5be045499769844
                       bbccdd8ff55a683a1f5f51eb54fd99b976596248
                       dfc2f86d3ae5dbb19ced2276145ff2c97897473a
                       b7372bf03a7221b89630ea45330273bcc07048c8
                       fafcc4bc11e925a77cd42d42b17ef3efadc45f40
                       2c5a80f011280c931ac3b897a0552de4ef2eb54d
                       27cc3257244db496387e5cf9c1af589cee589244
                       b7e8be5429792aefed3e8d4df8f0d57e12d1d724
                       c63cbd77d35874b5b451a9c363eda2db33087dca
                       21945fd6117f484f7df6a99cd41c3b51e9b2a1e9
                       1fc747702aed018172092ca65a4b00da561ebbac
                       b4d634249eaa825119e88e6f48a29ef543801646
                       7620c8508784dea1bc1b8d200a5e643a9359c0ab
                       3ebab0eca4b03ddd86727c13cb8f67ec09ff0623
                       611c092771965ea7271ae5e25957e38f62d3ddf8
                       1e20613d98b901e9327c2171bf8956fd770e3508
                       e6159a8f552c6d0e40719f5e3d64902d530ac117
                       2af64e30f48a083031261d4ff989bb2845879394
                       6c40db4d4f5233131c0d041061d1ce412e3f5661
                       c06e9660
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [61:3e:87:58:f5:40:92:3c:dc:c4:3f:1f:50:9a:cd:29:0f:f8:ad:f3]
            modulus: 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
    public exponent: 10001

] 
2021-06-05 12:28:29.631  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-05 12:28:29.632 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-05 12:28:29.633 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-05 12:28:29.634 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-05 12:28:29.634  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-05 12:28:29.635  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-05 12:28:29.635  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-05 12:28:29.635  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-05 12:28:29.635  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-05 12:28:29.639  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-05 12:28:29.640  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 12:28:29.640  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 12:28:29.641  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-05 12:28:29.730  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-05 12:28:29.731  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-05 12:28:29.731 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-05 12:28:29.735 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-05 12:28:29.736  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1575
2021-06-05 12:28:29.736  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-05 12:28:29.737  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-05 12:28:29.737  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-05 12:28:29.738  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-05 12:28:29.738  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-05 12:28:29.738 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 12:28:29.738 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 12:28:29.738 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 12:28:29.739 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 12:28:29.739 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 12:28:29.739 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 12:28:29.740 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-05 12:28:29.742 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 662177529468125435422034534271666145310945197757
             IssuerDN: UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 05 10:28:58 UTC 2021
           Final Date: Thu Jun 05 10:28:57 UTC 2031
            SubjectDN: UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d0:3b:b8:f7:0e:9a:a1:8c:a0:a3:30:37:60:b7:b2:d4:2b:6e:01:86]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 63228e3e066e0dddfe536936a5be045499769844
                       bbccdd8ff55a683a1f5f51eb54fd99b976596248
                       dfc2f86d3ae5dbb19ced2276145ff2c97897473a
                       b7372bf03a7221b89630ea45330273bcc07048c8
                       fafcc4bc11e925a77cd42d42b17ef3efadc45f40
                       2c5a80f011280c931ac3b897a0552de4ef2eb54d
                       27cc3257244db496387e5cf9c1af589cee589244
                       b7e8be5429792aefed3e8d4df8f0d57e12d1d724
                       c63cbd77d35874b5b451a9c363eda2db33087dca
                       21945fd6117f484f7df6a99cd41c3b51e9b2a1e9
                       1fc747702aed018172092ca65a4b00da561ebbac
                       b4d634249eaa825119e88e6f48a29ef543801646
                       7620c8508784dea1bc1b8d200a5e643a9359c0ab
                       3ebab0eca4b03ddd86727c13cb8f67ec09ff0623
                       611c092771965ea7271ae5e25957e38f62d3ddf8
                       1e20613d98b901e9327c2171bf8956fd770e3508
                       e6159a8f552c6d0e40719f5e3d64902d530ac117
                       2af64e30f48a083031261d4ff989bb2845879394
                       6c40db4d4f5233131c0d041061d1ce412e3f5661
                       c06e9660
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c2:70:60:c5:ba:cd:05:bc:18:94:99:1a:1b:a8:92:84:a0:e0:02:ac]
            modulus: 801af499d86f207f7a08eb423e5304d46ccea6fc342c207f6911f8b23db58939a2f411e5def64b06513d0e8e590ecd7716c06dcecdb258819e487eb0350165bc91f45a9a23681028ae732f3f1dd96c1ace17893183527b2bc65b27ffcb404cae9cce06d5ad2949cb5daee5c65b212e76b14e833988ac87da3057154d2500e841a03e5efe6f911984f4306208194b7be83ff136aebb560843d8b74320ccb174af11b850d020dcdf3efdb2f06766dc66e1964fdfeb7defa735cd8bc2cf091d492dc40ff74efb8d706bde3231018911eacea69d530f9129aede420685a399dfbec72100b8e36ff33a8ce2c7deb76f7998efd62ff0f96e7c84ab0a5e736ac5d32aa9
    public exponent: 10001

] 
2021-06-05 12:29:28.933  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-05 12:29:28.934 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-05 12:29:28.935 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-06-05 12:29:28.936 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-05 12:29:28.936  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-06-05 12:29:28.937  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-05 12:29:28.937  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-05 12:29:28.938  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-05 12:29:28.938  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-05 12:29:28.944  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-05 12:29:28.945  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 12:29:28.945  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 12:29:28.946  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-05 12:29:29.023  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-05 12:29:29.024  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-05 12:29:29.024 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-05 12:29:29.040 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-05 12:29:29.041  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1575
2021-06-05 12:29:29.041  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-05 12:29:29.043  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-05 12:29:29.043  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-05 12:29:29.044  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-05 12:29:29.044  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-05 12:29:29.044 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 12:29:29.044 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 12:29:29.044 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 12:29:29.045 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 12:29:29.045 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 12:29:29.045 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 12:29:29.046 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-05 12:29:29.048 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 662177529468125435422034534271666145310945197757
             IssuerDN: UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 05 10:28:58 UTC 2021
           Final Date: Thu Jun 05 10:28:57 UTC 2031
            SubjectDN: UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d0:3b:b8:f7:0e:9a:a1:8c:a0:a3:30:37:60:b7:b2:d4:2b:6e:01:86]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 63228e3e066e0dddfe536936a5be045499769844
                       bbccdd8ff55a683a1f5f51eb54fd99b976596248
                       dfc2f86d3ae5dbb19ced2276145ff2c97897473a
                       b7372bf03a7221b89630ea45330273bcc07048c8
                       fafcc4bc11e925a77cd42d42b17ef3efadc45f40
                       2c5a80f011280c931ac3b897a0552de4ef2eb54d
                       27cc3257244db496387e5cf9c1af589cee589244
                       b7e8be5429792aefed3e8d4df8f0d57e12d1d724
                       c63cbd77d35874b5b451a9c363eda2db33087dca
                       21945fd6117f484f7df6a99cd41c3b51e9b2a1e9
                       1fc747702aed018172092ca65a4b00da561ebbac
                       b4d634249eaa825119e88e6f48a29ef543801646
                       7620c8508784dea1bc1b8d200a5e643a9359c0ab
                       3ebab0eca4b03ddd86727c13cb8f67ec09ff0623
                       611c092771965ea7271ae5e25957e38f62d3ddf8
                       1e20613d98b901e9327c2171bf8956fd770e3508
                       e6159a8f552c6d0e40719f5e3d64902d530ac117
                       2af64e30f48a083031261d4ff989bb2845879394
                       6c40db4d4f5233131c0d041061d1ce412e3f5661
                       c06e9660
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7d:72:2d:8e:df:40:13:f4:c0:9f:ce:02:1b:32:58:e5:f4:a4:6d:d2]
            modulus: aa640e6d8b7f48a9e4238ce255326f58394bc632123d6b10f322ff068bf13873833ca867003d5dba9e55c77c811d69a31c34ffb2aafffa6d6b47ab7a3ce2ec58f2a51c26da5ee39bf3316debbe148c3f37a99018fe1b992bd5c039e79c4d16e84718755a614f326370bc632a935160659bfe0126c7efb508473359654161f7b4431de282beddf21f75c6340cfe4e4ef41d77fb316c64336661d8d5bfb7c26b66a288390d7f6f9b69ccc7eb9ed350d49f7e312e6b5f13f61df45d39351710a5343936b16d9bee038ee058c883f94119c0827a0d35cb5635084f7586e6fd5f557ace4ab50442cdfd97904b4c236afe006aa0c7025d05c379690842f182112af7fd
    public exponent: 10001

] 
2021-06-05 12:30:28.427  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-05 12:30:28.428 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-05 12:30:28.429 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-05 12:30:28.430 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-05 12:30:28.430  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-05 12:30:28.430  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-05 12:30:28.430  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-05 12:30:28.430  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-05 12:30:28.431  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-05 12:30:28.435  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-05 12:30:28.436  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 12:30:28.436  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 12:30:28.438  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-05 12:30:28.520  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-05 12:30:28.521  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-05 12:30:28.521 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-05 12:30:28.523 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-05 12:30:28.523  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1575
2021-06-05 12:30:28.524  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-05 12:30:28.525  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-05 12:30:28.525  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-05 12:30:28.526  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-05 12:30:28.526  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-05 12:30:28.526 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 12:30:28.526 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 12:30:28.526 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 12:30:28.527 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 12:30:28.527 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 12:30:28.527 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 12:30:28.528 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-05 12:30:28.530 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 662177529468125435422034534271666145310945197757
             IssuerDN: UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 05 10:28:58 UTC 2021
           Final Date: Thu Jun 05 10:28:57 UTC 2031
            SubjectDN: UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d0:3b:b8:f7:0e:9a:a1:8c:a0:a3:30:37:60:b7:b2:d4:2b:6e:01:86]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 63228e3e066e0dddfe536936a5be045499769844
                       bbccdd8ff55a683a1f5f51eb54fd99b976596248
                       dfc2f86d3ae5dbb19ced2276145ff2c97897473a
                       b7372bf03a7221b89630ea45330273bcc07048c8
                       fafcc4bc11e925a77cd42d42b17ef3efadc45f40
                       2c5a80f011280c931ac3b897a0552de4ef2eb54d
                       27cc3257244db496387e5cf9c1af589cee589244
                       b7e8be5429792aefed3e8d4df8f0d57e12d1d724
                       c63cbd77d35874b5b451a9c363eda2db33087dca
                       21945fd6117f484f7df6a99cd41c3b51e9b2a1e9
                       1fc747702aed018172092ca65a4b00da561ebbac
                       b4d634249eaa825119e88e6f48a29ef543801646
                       7620c8508784dea1bc1b8d200a5e643a9359c0ab
                       3ebab0eca4b03ddd86727c13cb8f67ec09ff0623
                       611c092771965ea7271ae5e25957e38f62d3ddf8
                       1e20613d98b901e9327c2171bf8956fd770e3508
                       e6159a8f552c6d0e40719f5e3d64902d530ac117
                       2af64e30f48a083031261d4ff989bb2845879394
                       6c40db4d4f5233131c0d041061d1ce412e3f5661
                       c06e9660
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3d:a1:64:98:31:bf:95:5b:03:60:df:31:40:6e:02:b6:3a:43:a8:38]
            modulus: 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
    public exponent: 10001

] 
2021-06-05 12:31:57.544  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-05 12:31:57.545 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-05 12:31:57.546 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-05 12:31:57.547 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-05 12:31:57.547  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-05 12:31:57.547  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-05 12:31:57.548  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-05 12:31:57.548  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-05 12:31:57.548  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-05 12:31:57.552  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-05 12:31:57.553  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 12:31:57.553  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 12:31:57.555  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-05 12:31:57.620  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-05 12:31:57.621  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-05 12:31:57.621 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-05 12:31:57.622 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-05 12:31:57.622  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1575
2021-06-05 12:31:57.623  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-05 12:31:57.635  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-05 12:31:57.635  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-05 12:31:57.636  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-05 12:31:57.636  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-05 12:31:57.636 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 12:31:57.636 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 12:31:57.636 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 12:31:57.636 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 12:31:57.637 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 12:31:57.637 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 12:31:57.637 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-05 12:31:57.641 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 662177529468125435422034534271666145310945197757
             IssuerDN: UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 05 10:28:58 UTC 2021
           Final Date: Thu Jun 05 10:28:57 UTC 2031
            SubjectDN: UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d0:3b:b8:f7:0e:9a:a1:8c:a0:a3:30:37:60:b7:b2:d4:2b:6e:01:86]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 63228e3e066e0dddfe536936a5be045499769844
                       bbccdd8ff55a683a1f5f51eb54fd99b976596248
                       dfc2f86d3ae5dbb19ced2276145ff2c97897473a
                       b7372bf03a7221b89630ea45330273bcc07048c8
                       fafcc4bc11e925a77cd42d42b17ef3efadc45f40
                       2c5a80f011280c931ac3b897a0552de4ef2eb54d
                       27cc3257244db496387e5cf9c1af589cee589244
                       b7e8be5429792aefed3e8d4df8f0d57e12d1d724
                       c63cbd77d35874b5b451a9c363eda2db33087dca
                       21945fd6117f484f7df6a99cd41c3b51e9b2a1e9
                       1fc747702aed018172092ca65a4b00da561ebbac
                       b4d634249eaa825119e88e6f48a29ef543801646
                       7620c8508784dea1bc1b8d200a5e643a9359c0ab
                       3ebab0eca4b03ddd86727c13cb8f67ec09ff0623
                       611c092771965ea7271ae5e25957e38f62d3ddf8
                       1e20613d98b901e9327c2171bf8956fd770e3508
                       e6159a8f552c6d0e40719f5e3d64902d530ac117
                       2af64e30f48a083031261d4ff989bb2845879394
                       6c40db4d4f5233131c0d041061d1ce412e3f5661
                       c06e9660
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [08:6d:b7:6e:b7:58:b6:c8:e9:e9:2a:b0:ed:c6:1e:21:01:6d:d1:f0]
            modulus: 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
    public exponent: 10001

] 
2021-06-05 12:32:05.574  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-05 12:32:05.574 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-05 12:32:05.575 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-05 12:32:05.575 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-05 12:32:05.576  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-05 12:32:05.576  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-05 12:32:05.576  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-05 12:32:05.576  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-05 12:32:05.576  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-05 12:32:05.580  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-05 12:32:05.580  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 12:32:05.580  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 12:32:05.581  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-05 12:32:05.655  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-05 12:32:05.656  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-05 12:32:05.656 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-05 12:32:05.657 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-05 12:32:05.657  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1575
2021-06-05 12:32:05.658  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-05 12:32:05.658  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-05 12:32:05.659  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-05 12:32:05.659  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-05 12:32:05.659  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-05 12:32:05.659 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 12:32:05.659 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 12:32:05.660 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 12:32:05.660 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 12:32:05.660 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 12:32:05.660 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 12:32:05.661 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-05 12:32:05.663 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 662177529468125435422034534271666145310945197757
             IssuerDN: UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 05 10:28:58 UTC 2021
           Final Date: Thu Jun 05 10:28:57 UTC 2031
            SubjectDN: UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d0:3b:b8:f7:0e:9a:a1:8c:a0:a3:30:37:60:b7:b2:d4:2b:6e:01:86]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 63228e3e066e0dddfe536936a5be045499769844
                       bbccdd8ff55a683a1f5f51eb54fd99b976596248
                       dfc2f86d3ae5dbb19ced2276145ff2c97897473a
                       b7372bf03a7221b89630ea45330273bcc07048c8
                       fafcc4bc11e925a77cd42d42b17ef3efadc45f40
                       2c5a80f011280c931ac3b897a0552de4ef2eb54d
                       27cc3257244db496387e5cf9c1af589cee589244
                       b7e8be5429792aefed3e8d4df8f0d57e12d1d724
                       c63cbd77d35874b5b451a9c363eda2db33087dca
                       21945fd6117f484f7df6a99cd41c3b51e9b2a1e9
                       1fc747702aed018172092ca65a4b00da561ebbac
                       b4d634249eaa825119e88e6f48a29ef543801646
                       7620c8508784dea1bc1b8d200a5e643a9359c0ab
                       3ebab0eca4b03ddd86727c13cb8f67ec09ff0623
                       611c092771965ea7271ae5e25957e38f62d3ddf8
                       1e20613d98b901e9327c2171bf8956fd770e3508
                       e6159a8f552c6d0e40719f5e3d64902d530ac117
                       2af64e30f48a083031261d4ff989bb2845879394
                       6c40db4d4f5233131c0d041061d1ce412e3f5661
                       c06e9660
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ef:69:3b:94:4f:13:f5:ee:91:b2:0c:4d:ec:ce:6e:a4:46:26:ca:d7]
            modulus: 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
    public exponent: 10001

] 
2021-06-05 12:33:36.016  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-05 12:33:36.017 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-05 12:33:36.018 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-06-05 12:33:36.018 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-05 12:33:36.018  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-06-05 12:33:36.019  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-05 12:33:36.019  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-05 12:33:36.019  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-05 12:33:36.019  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-05 12:33:36.023  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-05 12:33:36.024  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 12:33:36.024  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 12:33:36.025  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-05 12:33:36.135  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-05 12:33:36.136  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-05 12:33:36.136 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-05 12:33:36.137 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-05 12:33:36.137  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1575
2021-06-05 12:33:36.138  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-05 12:33:36.139  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-05 12:33:36.139  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-05 12:33:36.139  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-05 12:33:36.139  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-05 12:33:36.140 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 12:33:36.140 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 12:33:36.140 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 12:33:36.140 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 12:33:36.140 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 12:33:36.141 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 12:33:36.141 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-05 12:33:36.144 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 662177529468125435422034534271666145310945197757
             IssuerDN: UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 05 10:28:58 UTC 2021
           Final Date: Thu Jun 05 10:28:57 UTC 2031
            SubjectDN: UID=c-0mq3662g2qqhty67q,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d0:3b:b8:f7:0e:9a:a1:8c:a0:a3:30:37:60:b7:b2:d4:2b:6e:01:86]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 63228e3e066e0dddfe536936a5be045499769844
                       bbccdd8ff55a683a1f5f51eb54fd99b976596248
                       dfc2f86d3ae5dbb19ced2276145ff2c97897473a
                       b7372bf03a7221b89630ea45330273bcc07048c8
                       fafcc4bc11e925a77cd42d42b17ef3efadc45f40
                       2c5a80f011280c931ac3b897a0552de4ef2eb54d
                       27cc3257244db496387e5cf9c1af589cee589244
                       b7e8be5429792aefed3e8d4df8f0d57e12d1d724
                       c63cbd77d35874b5b451a9c363eda2db33087dca
                       21945fd6117f484f7df6a99cd41c3b51e9b2a1e9
                       1fc747702aed018172092ca65a4b00da561ebbac
                       b4d634249eaa825119e88e6f48a29ef543801646
                       7620c8508784dea1bc1b8d200a5e643a9359c0ab
                       3ebab0eca4b03ddd86727c13cb8f67ec09ff0623
                       611c092771965ea7271ae5e25957e38f62d3ddf8
                       1e20613d98b901e9327c2171bf8956fd770e3508
                       e6159a8f552c6d0e40719f5e3d64902d530ac117
                       2af64e30f48a083031261d4ff989bb2845879394
                       6c40db4d4f5233131c0d041061d1ce412e3f5661
                       c06e9660
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [54:13:21:ca:dd:2f:54:cf:4f:49:84:bf:62:a5:7a:1c:8c:ee:70:b0]
            modulus: 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
    public exponent: 10001

]