Results

By type

          2021-05-31 17:44:22,130 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-05-31 17:44:27,333 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-05-31 17:44:30.831  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-05-31 17:44:43.942 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-05-31 17:44:45.144  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-05-31 17:44:45.945  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-05-31 17:45:00.955  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 41.796 seconds (JVM running for 49.876)
2021-05-31 18:03:47.441  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-31 18:03:47.529 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-31 18:03:47.629 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-31 18:03:47.635 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-31 18:03:47.735  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-31 18:03:47.738  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-31 18:03:47.743  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-31 18:03:47.743  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 18:03:47.744  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-31 18:03:47.829  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-31 18:03:47.835  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-31 18:03:47.945  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-31 18:03:47.951  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 18:03:47.951  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 18:03:48.043  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-31 18:03:49.643  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-31 18:03:49.646  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-31 18:03:49.646 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-31 18:03:49.651 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-31 18:03:49.653  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1924
2021-05-31 18:03:49.653  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-31 18:03:49.738  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-31 18:03:49.740  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-31 18:03:49.832  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-31 18:03:49.833  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-31 18:03:49.835 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 18:03:49.836 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 18:03:49.836 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 18:03:49.930 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 18:03:49.931 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 18:03:49.932 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 18:03:49.940 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-31 18:03:50.228 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 41464566516957036916953857025484523159459021871
             IssuerDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 31 17:27:41 UTC 2021
           Final Date: Sat May 31 17:27:40 UTC 2031
            SubjectDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c9:ac:05:e2:35:60:18:9b:09:d2:6a:a5:b6:d7:b0:4f:9a:59:5d:b0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6918b35748421da66fe2359e56a547a6ac0be65e
                       5edbe0f5daf2354bfa1e842e5bbf5024a15f04a2
                       0bb8fd5d7c38b286e93ea8bc93b1b3cd59dd9ba8
                       34404bf572ca1d7f1075007e4dc6f57bac6464a6
                       3b0ba488daff53b898b430881c5ce415d9847e1a
                       4af5411e108b6f8f1340a64f757734ee2cc5350b
                       0bedef9c9983155aeab7e594a5547d1d6dd65f31
                       41c839822589d34c06db3db6eeab2cd42aac4594
                       3d1408f7218b4404559becda67e91603c4c55492
                       cce6ed8db99be96d6d85f02d27ac5c2f384722c0
                       df6f03846be43fb4c7b9492a002ae9a75c24cb3d
                       4fca9eaac526dc621616a8532c4a8f01a7f4fa9e
                       73144f7e087a650265a5feae3f4a6da5aab650d1
                       226e67752d86da74026d526afb08689e3c056b49
                       c149b5196465df3c65c5fe7c4d1300f498e2209a
                       2c6c07bdd1ce3b2e1017cc9a6b1f4029cdf2ce3a
                       b6c2a99c495c613722681413fbbbd1989ba058f4
                       c43dba993f0a1273e0a591aaf7853f0883787782
                       4f54e2a64027e050da89e7551f0fcc2ea974802c
                       d0081bd3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [72:c9:a2:86:d2:71:9c:52:65:f0:e7:60:98:10:5f:15:30:ba:a2:b1]
            modulus: a510290846a505732532acfedcce1dc318d208469a1e72f53677f98134f37e375f1cb5c12fc64ab23a66ef61fa7735e6dfdeeabaa59a0e532141e5c9856c1c53cc06b33f312c203ef951d8323e97113fb8140183f3fa9c743aa87ac3c20d4b1ab0fc9e4449343f2570e8850b1064e7b9c206ea3160e25b7fe2e38c4858c6bc7feca2a7007746fa828880f9b755b574a21f5f42a94cd391af5b2d846b848315f1cd95b1d204ad015474affd24b1872776aafcfe9f022323018708e323703737ea1d8d63df715098e060c415a7e689738f3627197f95d9698687e11e0a49ebdb14612ff74e9983fc9b361a7279208ae85b32f5c4afe0f9e96dfcce942dbdd19147
    public exponent: 10001

] 
2021-05-31 19:08:32.872  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-31 19:08:32.875 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-31 19:08:32.878 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-31 19:08:32.881 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-31 19:08:32.882  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-31 19:08:32.883  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-31 19:08:32.884  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-31 19:08:32.884  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-31 19:08:32.885  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-31 19:08:32.941  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-31 19:08:32.943  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 19:08:32.943  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 19:08:32.945  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-31 19:08:33.132  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-31 19:08:33.138  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-31 19:08:33.139 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-31 19:08:33.145 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-31 19:08:33.147  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1924
2021-05-31 19:08:33.148  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-31 19:08:33.150  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-31 19:08:33.151  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-31 19:08:33.229  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-31 19:08:33.230  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-31 19:08:33.231 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 19:08:33.231 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 19:08:33.232 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 19:08:33.234 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 19:08:33.234 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 19:08:33.235 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 19:08:33.238 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-31 19:08:33.247 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 41464566516957036916953857025484523159459021871
             IssuerDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 31 17:27:41 UTC 2021
           Final Date: Sat May 31 17:27:40 UTC 2031
            SubjectDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c9:ac:05:e2:35:60:18:9b:09:d2:6a:a5:b6:d7:b0:4f:9a:59:5d:b0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6918b35748421da66fe2359e56a547a6ac0be65e
                       5edbe0f5daf2354bfa1e842e5bbf5024a15f04a2
                       0bb8fd5d7c38b286e93ea8bc93b1b3cd59dd9ba8
                       34404bf572ca1d7f1075007e4dc6f57bac6464a6
                       3b0ba488daff53b898b430881c5ce415d9847e1a
                       4af5411e108b6f8f1340a64f757734ee2cc5350b
                       0bedef9c9983155aeab7e594a5547d1d6dd65f31
                       41c839822589d34c06db3db6eeab2cd42aac4594
                       3d1408f7218b4404559becda67e91603c4c55492
                       cce6ed8db99be96d6d85f02d27ac5c2f384722c0
                       df6f03846be43fb4c7b9492a002ae9a75c24cb3d
                       4fca9eaac526dc621616a8532c4a8f01a7f4fa9e
                       73144f7e087a650265a5feae3f4a6da5aab650d1
                       226e67752d86da74026d526afb08689e3c056b49
                       c149b5196465df3c65c5fe7c4d1300f498e2209a
                       2c6c07bdd1ce3b2e1017cc9a6b1f4029cdf2ce3a
                       b6c2a99c495c613722681413fbbbd1989ba058f4
                       c43dba993f0a1273e0a591aaf7853f0883787782
                       4f54e2a64027e050da89e7551f0fcc2ea974802c
                       d0081bd3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ff:c1:14:6d:e1:e6:a7:ef:13:80:d9:0c:30:a1:55:92:74:a9:4b:8e]
            modulus: 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
    public exponent: 10001

] 
2021-05-31 19:09:41.874  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-31 19:09:41.875 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-31 19:09:41.876 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-31 19:09:41.877 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-31 19:09:41.877  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-31 19:09:41.878  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-31 19:09:41.878  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-31 19:09:41.879  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-31 19:09:41.879  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-31 19:09:41.884  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-31 19:09:41.885  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 19:09:41.885  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 19:09:41.888  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-31 19:09:42.030  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-31 19:09:42.031  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-31 19:09:42.031 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-31 19:09:42.034 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-31 19:09:42.035  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1924
2021-05-31 19:09:42.035  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-31 19:09:42.038  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-31 19:09:42.038  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-31 19:09:42.039  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-31 19:09:42.039  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-31 19:09:42.040 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 19:09:42.040 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 19:09:42.040 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 19:09:42.041 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 19:09:42.041 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 19:09:42.042 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 19:09:42.043 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-31 19:09:42.046 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 41464566516957036916953857025484523159459021871
             IssuerDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 31 17:27:41 UTC 2021
           Final Date: Sat May 31 17:27:40 UTC 2031
            SubjectDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c9:ac:05:e2:35:60:18:9b:09:d2:6a:a5:b6:d7:b0:4f:9a:59:5d:b0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6918b35748421da66fe2359e56a547a6ac0be65e
                       5edbe0f5daf2354bfa1e842e5bbf5024a15f04a2
                       0bb8fd5d7c38b286e93ea8bc93b1b3cd59dd9ba8
                       34404bf572ca1d7f1075007e4dc6f57bac6464a6
                       3b0ba488daff53b898b430881c5ce415d9847e1a
                       4af5411e108b6f8f1340a64f757734ee2cc5350b
                       0bedef9c9983155aeab7e594a5547d1d6dd65f31
                       41c839822589d34c06db3db6eeab2cd42aac4594
                       3d1408f7218b4404559becda67e91603c4c55492
                       cce6ed8db99be96d6d85f02d27ac5c2f384722c0
                       df6f03846be43fb4c7b9492a002ae9a75c24cb3d
                       4fca9eaac526dc621616a8532c4a8f01a7f4fa9e
                       73144f7e087a650265a5feae3f4a6da5aab650d1
                       226e67752d86da74026d526afb08689e3c056b49
                       c149b5196465df3c65c5fe7c4d1300f498e2209a
                       2c6c07bdd1ce3b2e1017cc9a6b1f4029cdf2ce3a
                       b6c2a99c495c613722681413fbbbd1989ba058f4
                       c43dba993f0a1273e0a591aaf7853f0883787782
                       4f54e2a64027e050da89e7551f0fcc2ea974802c
                       d0081bd3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [18:af:6a:4b:c7:86:bf:42:6b:e2:a5:e8:62:31:e6:c3:3b:42:28:2c]
            modulus: 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
    public exponent: 10001

] 
2021-05-31 19:15:16.072  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-31 19:15:16.074 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-31 19:15:16.077 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-31 19:15:16.078 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-31 19:15:16.079  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-31 19:15:16.080  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-31 19:15:16.080  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-31 19:15:16.081  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-31 19:15:16.082  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-31 19:15:16.087  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-31 19:15:16.088  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 19:15:16.088  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 19:15:16.090  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-31 19:15:16.234  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-31 19:15:16.235  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-31 19:15:16.235 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-31 19:15:16.237 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-31 19:15:16.237  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1924
2021-05-31 19:15:16.238  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-31 19:15:16.239  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-31 19:15:16.240  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-31 19:15:16.240  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-31 19:15:16.240  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-31 19:15:16.241 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 19:15:16.241 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 19:15:16.241 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 19:15:16.242 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 19:15:16.243 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 19:15:16.243 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 19:15:16.244 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-31 19:15:16.250 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 41464566516957036916953857025484523159459021871
             IssuerDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 31 17:27:41 UTC 2021
           Final Date: Sat May 31 17:27:40 UTC 2031
            SubjectDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c9:ac:05:e2:35:60:18:9b:09:d2:6a:a5:b6:d7:b0:4f:9a:59:5d:b0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6918b35748421da66fe2359e56a547a6ac0be65e
                       5edbe0f5daf2354bfa1e842e5bbf5024a15f04a2
                       0bb8fd5d7c38b286e93ea8bc93b1b3cd59dd9ba8
                       34404bf572ca1d7f1075007e4dc6f57bac6464a6
                       3b0ba488daff53b898b430881c5ce415d9847e1a
                       4af5411e108b6f8f1340a64f757734ee2cc5350b
                       0bedef9c9983155aeab7e594a5547d1d6dd65f31
                       41c839822589d34c06db3db6eeab2cd42aac4594
                       3d1408f7218b4404559becda67e91603c4c55492
                       cce6ed8db99be96d6d85f02d27ac5c2f384722c0
                       df6f03846be43fb4c7b9492a002ae9a75c24cb3d
                       4fca9eaac526dc621616a8532c4a8f01a7f4fa9e
                       73144f7e087a650265a5feae3f4a6da5aab650d1
                       226e67752d86da74026d526afb08689e3c056b49
                       c149b5196465df3c65c5fe7c4d1300f498e2209a
                       2c6c07bdd1ce3b2e1017cc9a6b1f4029cdf2ce3a
                       b6c2a99c495c613722681413fbbbd1989ba058f4
                       c43dba993f0a1273e0a591aaf7853f0883787782
                       4f54e2a64027e050da89e7551f0fcc2ea974802c
                       d0081bd3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [41:c8:bf:67:9b:33:43:f8:10:a1:54:ba:71:90:2e:66:6b:e4:6d:a1]
            modulus: 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
    public exponent: 10001

] 
2021-05-31 19:15:17.739  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-31 19:15:17.742 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-31 19:15:17.744 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-31 19:15:17.745 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-31 19:15:17.746  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-31 19:15:17.747  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-31 19:15:17.747  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-31 19:15:17.747  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-31 19:15:17.748  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-31 19:15:17.829  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-31 19:15:17.830  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 19:15:17.831  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 19:15:17.833  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-31 19:15:17.928  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-31 19:15:17.929  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-31 19:15:17.929 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-31 19:15:17.930 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-31 19:15:17.931  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1924
2021-05-31 19:15:17.931  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-31 19:15:17.932  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-31 19:15:17.933  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-31 19:15:17.933  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-31 19:15:17.933  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-31 19:15:17.934 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 19:15:17.934 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 19:15:17.934 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 19:15:17.935 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 19:15:17.935 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 19:15:17.935 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 19:15:17.936 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-31 19:15:17.941 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 41464566516957036916953857025484523159459021871
             IssuerDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 31 17:27:41 UTC 2021
           Final Date: Sat May 31 17:27:40 UTC 2031
            SubjectDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c9:ac:05:e2:35:60:18:9b:09:d2:6a:a5:b6:d7:b0:4f:9a:59:5d:b0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6918b35748421da66fe2359e56a547a6ac0be65e
                       5edbe0f5daf2354bfa1e842e5bbf5024a15f04a2
                       0bb8fd5d7c38b286e93ea8bc93b1b3cd59dd9ba8
                       34404bf572ca1d7f1075007e4dc6f57bac6464a6
                       3b0ba488daff53b898b430881c5ce415d9847e1a
                       4af5411e108b6f8f1340a64f757734ee2cc5350b
                       0bedef9c9983155aeab7e594a5547d1d6dd65f31
                       41c839822589d34c06db3db6eeab2cd42aac4594
                       3d1408f7218b4404559becda67e91603c4c55492
                       cce6ed8db99be96d6d85f02d27ac5c2f384722c0
                       df6f03846be43fb4c7b9492a002ae9a75c24cb3d
                       4fca9eaac526dc621616a8532c4a8f01a7f4fa9e
                       73144f7e087a650265a5feae3f4a6da5aab650d1
                       226e67752d86da74026d526afb08689e3c056b49
                       c149b5196465df3c65c5fe7c4d1300f498e2209a
                       2c6c07bdd1ce3b2e1017cc9a6b1f4029cdf2ce3a
                       b6c2a99c495c613722681413fbbbd1989ba058f4
                       c43dba993f0a1273e0a591aaf7853f0883787782
                       4f54e2a64027e050da89e7551f0fcc2ea974802c
                       d0081bd3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3a:18:44:c3:cc:56:42:36:94:00:53:7b:01:e3:35:7d:e9:9b:94:22]
            modulus: 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
    public exponent: 10001

] 
2021-05-31 19:16:46.453  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-31 19:16:46.457 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-31 19:16:46.459 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-31 19:16:46.462 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-31 19:16:46.463  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-31 19:16:46.464  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-31 19:16:46.465  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-31 19:16:46.465  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-31 19:16:46.466  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-31 19:16:46.477  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-31 19:16:46.528  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 19:16:46.529  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 19:16:46.532  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-31 19:16:46.635  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-31 19:16:46.636  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-31 19:16:46.636 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-31 19:16:46.638 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-31 19:16:46.639  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1924
2021-05-31 19:16:46.639  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-31 19:16:46.641  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-31 19:16:46.642  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-31 19:16:46.645  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-31 19:16:46.645  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-31 19:16:46.646 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 19:16:46.646 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 19:16:46.646 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 19:16:46.649 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 19:16:46.649 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 19:16:46.649 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 19:16:46.655 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-31 19:16:46.735 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 41464566516957036916953857025484523159459021871
             IssuerDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 31 17:27:41 UTC 2021
           Final Date: Sat May 31 17:27:40 UTC 2031
            SubjectDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c9:ac:05:e2:35:60:18:9b:09:d2:6a:a5:b6:d7:b0:4f:9a:59:5d:b0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6918b35748421da66fe2359e56a547a6ac0be65e
                       5edbe0f5daf2354bfa1e842e5bbf5024a15f04a2
                       0bb8fd5d7c38b286e93ea8bc93b1b3cd59dd9ba8
                       34404bf572ca1d7f1075007e4dc6f57bac6464a6
                       3b0ba488daff53b898b430881c5ce415d9847e1a
                       4af5411e108b6f8f1340a64f757734ee2cc5350b
                       0bedef9c9983155aeab7e594a5547d1d6dd65f31
                       41c839822589d34c06db3db6eeab2cd42aac4594
                       3d1408f7218b4404559becda67e91603c4c55492
                       cce6ed8db99be96d6d85f02d27ac5c2f384722c0
                       df6f03846be43fb4c7b9492a002ae9a75c24cb3d
                       4fca9eaac526dc621616a8532c4a8f01a7f4fa9e
                       73144f7e087a650265a5feae3f4a6da5aab650d1
                       226e67752d86da74026d526afb08689e3c056b49
                       c149b5196465df3c65c5fe7c4d1300f498e2209a
                       2c6c07bdd1ce3b2e1017cc9a6b1f4029cdf2ce3a
                       b6c2a99c495c613722681413fbbbd1989ba058f4
                       c43dba993f0a1273e0a591aaf7853f0883787782
                       4f54e2a64027e050da89e7551f0fcc2ea974802c
                       d0081bd3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ec:a7:ee:63:95:71:9e:2a:79:76:11:95:4a:e6:0b:46:ff:9a:22:a7]
            modulus: 8277f3d47152aed26bbcde87c29d6a0b9ee258a81163841d26db245d5c385b3114fcde2f7257d62c1c4744201f9819818ade04f87877f223c2889550ed2ec7b67b44c057610db98e2656003c5d90899d4a39052c7c5cce7b0a640d1ede15c407590acc71cde64b55f149837c2d392738285127238da908f8ccab7a84c8e6eb0e22f8eaa561157b40c49bf4c32c518f333323e889c90415a417e138bec1e1daba09a86bef757fcc753f59af954aa3d1c2c82a41956af84b66295a19bb8ab5b591c615c576137492b1750a8672b5ef1a8a0be48d976acfb97968ea357c9f6b39f346d0ee2ed44b1764c75b87814fb3d286653dc0cc1ea1670c552b2132267425d9
    public exponent: 10001

] 
2021-05-31 19:18:03.276  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-31 19:18:03.278 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-31 19:18:03.280 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-31 19:18:03.280 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-31 19:18:03.281  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-31 19:18:03.282  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-31 19:18:03.282  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-31 19:18:03.283  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-31 19:18:03.283  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-31 19:18:03.289  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-31 19:18:03.290  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 19:18:03.290  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 19:18:03.292  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-31 19:18:03.429  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-31 19:18:03.429  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-31 19:18:03.429 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-31 19:18:03.430 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-31 19:18:03.431  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1924
2021-05-31 19:18:03.431  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-31 19:18:03.433  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-31 19:18:03.433  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-31 19:18:03.433  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-31 19:18:03.433  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-31 19:18:03.434 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 19:18:03.434 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 19:18:03.434 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 19:18:03.435 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 19:18:03.435 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 19:18:03.435 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 19:18:03.436 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-31 19:18:03.439 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 41464566516957036916953857025484523159459021871
             IssuerDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 31 17:27:41 UTC 2021
           Final Date: Sat May 31 17:27:40 UTC 2031
            SubjectDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c9:ac:05:e2:35:60:18:9b:09:d2:6a:a5:b6:d7:b0:4f:9a:59:5d:b0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6918b35748421da66fe2359e56a547a6ac0be65e
                       5edbe0f5daf2354bfa1e842e5bbf5024a15f04a2
                       0bb8fd5d7c38b286e93ea8bc93b1b3cd59dd9ba8
                       34404bf572ca1d7f1075007e4dc6f57bac6464a6
                       3b0ba488daff53b898b430881c5ce415d9847e1a
                       4af5411e108b6f8f1340a64f757734ee2cc5350b
                       0bedef9c9983155aeab7e594a5547d1d6dd65f31
                       41c839822589d34c06db3db6eeab2cd42aac4594
                       3d1408f7218b4404559becda67e91603c4c55492
                       cce6ed8db99be96d6d85f02d27ac5c2f384722c0
                       df6f03846be43fb4c7b9492a002ae9a75c24cb3d
                       4fca9eaac526dc621616a8532c4a8f01a7f4fa9e
                       73144f7e087a650265a5feae3f4a6da5aab650d1
                       226e67752d86da74026d526afb08689e3c056b49
                       c149b5196465df3c65c5fe7c4d1300f498e2209a
                       2c6c07bdd1ce3b2e1017cc9a6b1f4029cdf2ce3a
                       b6c2a99c495c613722681413fbbbd1989ba058f4
                       c43dba993f0a1273e0a591aaf7853f0883787782
                       4f54e2a64027e050da89e7551f0fcc2ea974802c
                       d0081bd3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [74:3f:fc:5b:b1:68:a7:dd:e7:4f:8e:08:f1:6b:11:42:83:b7:56:fe]
            modulus: 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
    public exponent: 10001

] 
2021-05-31 19:24:44.743  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-31 19:24:44.745 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-31 19:24:44.747 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-31 19:24:44.748 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-31 19:24:44.749  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-31 19:24:44.750  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-31 19:24:44.750  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-31 19:24:44.751  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-31 19:24:44.751  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-31 19:24:44.759  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-31 19:24:44.760  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 19:24:44.761  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 19:24:44.763  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-31 19:24:44.931  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-31 19:24:44.931  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-31 19:24:44.932 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-31 19:24:44.933 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-31 19:24:44.934  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1924
2021-05-31 19:24:44.934  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-31 19:24:44.936  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-31 19:24:44.937  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-31 19:24:44.938  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-31 19:24:44.938  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-31 19:24:44.939 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 19:24:44.939 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 19:24:44.940 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 19:24:44.940 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 19:24:44.941 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 19:24:44.941 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 19:24:44.942 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-31 19:24:44.946 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 41464566516957036916953857025484523159459021871
             IssuerDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 31 17:27:41 UTC 2021
           Final Date: Sat May 31 17:27:40 UTC 2031
            SubjectDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c9:ac:05:e2:35:60:18:9b:09:d2:6a:a5:b6:d7:b0:4f:9a:59:5d:b0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6918b35748421da66fe2359e56a547a6ac0be65e
                       5edbe0f5daf2354bfa1e842e5bbf5024a15f04a2
                       0bb8fd5d7c38b286e93ea8bc93b1b3cd59dd9ba8
                       34404bf572ca1d7f1075007e4dc6f57bac6464a6
                       3b0ba488daff53b898b430881c5ce415d9847e1a
                       4af5411e108b6f8f1340a64f757734ee2cc5350b
                       0bedef9c9983155aeab7e594a5547d1d6dd65f31
                       41c839822589d34c06db3db6eeab2cd42aac4594
                       3d1408f7218b4404559becda67e91603c4c55492
                       cce6ed8db99be96d6d85f02d27ac5c2f384722c0
                       df6f03846be43fb4c7b9492a002ae9a75c24cb3d
                       4fca9eaac526dc621616a8532c4a8f01a7f4fa9e
                       73144f7e087a650265a5feae3f4a6da5aab650d1
                       226e67752d86da74026d526afb08689e3c056b49
                       c149b5196465df3c65c5fe7c4d1300f498e2209a
                       2c6c07bdd1ce3b2e1017cc9a6b1f4029cdf2ce3a
                       b6c2a99c495c613722681413fbbbd1989ba058f4
                       c43dba993f0a1273e0a591aaf7853f0883787782
                       4f54e2a64027e050da89e7551f0fcc2ea974802c
                       d0081bd3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9a:93:7d:cc:e8:2a:27:7a:e6:75:59:56:26:00:74:4e:f5:8b:6e:1c]
            modulus: cd41839c61b4db63c01c30a6d1e1eff42890379e291ef88126715871f9d56e69f192f86567f1b9d473ce6669023010b6e3e90bd070833cb493f8e2ea76b007f6e0d5a539f3551a52027c13ece7ff635b7ef3ba9acef9e7e0aab6f49abf8948681c440d747fdd5be22a69e3be542e777231f4977aca8e9e0d4d052308bb3579a8bd0a65bfd08e60d893d304714b37766e5f7d2bc494f9925609c9cacceda2b8ce41dd9227e1b3b02d541baf1dcd37e4e065c9f9423c155dfc9287060be1ce18ffcfd5c9c48c7e60d1b735c4a913c135700e2ad357b8f96807e9348b5dd362c787868a8ded34d0323357c25413ac3febd355428af30c3d8a650cdd2ba4218536a3
    public exponent: 10001

] 
2021-05-31 19:25:28.265  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-31 19:25:28.268 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-31 19:25:28.270 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-31 19:25:28.271 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-31 19:25:28.271  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-31 19:25:28.272  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-31 19:25:28.273  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-31 19:25:28.273  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-31 19:25:28.274  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-31 19:25:28.281  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-31 19:25:28.282  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 19:25:28.282  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 19:25:28.284  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-31 19:25:28.411  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-31 19:25:28.411  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-31 19:25:28.412 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-31 19:25:28.413 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-31 19:25:28.413  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1924
2021-05-31 19:25:28.414  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-31 19:25:28.415  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-31 19:25:28.415  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-31 19:25:28.415  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-31 19:25:28.416  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-31 19:25:28.416 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 19:25:28.416 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 19:25:28.416 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 19:25:28.417 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 19:25:28.417 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 19:25:28.417 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 19:25:28.428 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-31 19:25:28.432 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 41464566516957036916953857025484523159459021871
             IssuerDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 31 17:27:41 UTC 2021
           Final Date: Sat May 31 17:27:40 UTC 2031
            SubjectDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c9:ac:05:e2:35:60:18:9b:09:d2:6a:a5:b6:d7:b0:4f:9a:59:5d:b0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6918b35748421da66fe2359e56a547a6ac0be65e
                       5edbe0f5daf2354bfa1e842e5bbf5024a15f04a2
                       0bb8fd5d7c38b286e93ea8bc93b1b3cd59dd9ba8
                       34404bf572ca1d7f1075007e4dc6f57bac6464a6
                       3b0ba488daff53b898b430881c5ce415d9847e1a
                       4af5411e108b6f8f1340a64f757734ee2cc5350b
                       0bedef9c9983155aeab7e594a5547d1d6dd65f31
                       41c839822589d34c06db3db6eeab2cd42aac4594
                       3d1408f7218b4404559becda67e91603c4c55492
                       cce6ed8db99be96d6d85f02d27ac5c2f384722c0
                       df6f03846be43fb4c7b9492a002ae9a75c24cb3d
                       4fca9eaac526dc621616a8532c4a8f01a7f4fa9e
                       73144f7e087a650265a5feae3f4a6da5aab650d1
                       226e67752d86da74026d526afb08689e3c056b49
                       c149b5196465df3c65c5fe7c4d1300f498e2209a
                       2c6c07bdd1ce3b2e1017cc9a6b1f4029cdf2ce3a
                       b6c2a99c495c613722681413fbbbd1989ba058f4
                       c43dba993f0a1273e0a591aaf7853f0883787782
                       4f54e2a64027e050da89e7551f0fcc2ea974802c
                       d0081bd3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4d:3f:73:ad:16:26:90:92:b7:32:06:3a:76:5e:75:06:d3:09:ca:20]
            modulus: ba2e803a85aceb65510e82fb9a3e7b9d0554d8689fd41f737e2e1d9b41163641b935474666606e55da997835dfe74884d9f4bae579c3f4e82a56a3d8a20fa415ad51489498f12c46d6f129bdc908f965cd038306b65acf36c09bced7edd33b97c26b250a4f35f959596159df5a15d5d7b80632e06a95ff87e607d57def805fd70989273ae8585098b8aff3998ff77412fde1718b43cd02785beff8752d4dcb054d9403ce46b3ffa137095f1fcbadf15b1c920406d423f2e789052a2ccca9695498bfe62befd4ed037e842038c3bb1393449bcad67aeb7706ec3d4d88ad9cbbe9ad12749fb3c8fbef3662cacbb75142e1c6065ca6bf3635db1240c1b5ce885345
    public exponent: 10001

] 
2021-05-31 19:27:00.040  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-31 19:27:00.044 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-31 19:27:00.046 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-31 19:27:00.047 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-31 19:27:00.047  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-31 19:27:00.048  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-31 19:27:00.049  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-31 19:27:00.049  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-31 19:27:00.049  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-31 19:27:00.136  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-31 19:27:00.137  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 19:27:00.138  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 19:27:00.140  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-31 19:27:00.229  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-31 19:27:00.230  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-31 19:27:00.230 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-31 19:27:00.232 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-31 19:27:00.234  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1924
2021-05-31 19:27:00.235  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-31 19:27:00.238  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-31 19:27:00.238  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-31 19:27:00.239  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-31 19:27:00.239  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-31 19:27:00.239 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 19:27:00.239 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 19:27:00.240 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 19:27:00.240 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 19:27:00.240 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 19:27:00.241 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 19:27:00.241 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-31 19:27:00.244 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 41464566516957036916953857025484523159459021871
             IssuerDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 31 17:27:41 UTC 2021
           Final Date: Sat May 31 17:27:40 UTC 2031
            SubjectDN: UID=c-0c62spu66ci508av5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c9:ac:05:e2:35:60:18:9b:09:d2:6a:a5:b6:d7:b0:4f:9a:59:5d:b0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6918b35748421da66fe2359e56a547a6ac0be65e
                       5edbe0f5daf2354bfa1e842e5bbf5024a15f04a2
                       0bb8fd5d7c38b286e93ea8bc93b1b3cd59dd9ba8
                       34404bf572ca1d7f1075007e4dc6f57bac6464a6
                       3b0ba488daff53b898b430881c5ce415d9847e1a
                       4af5411e108b6f8f1340a64f757734ee2cc5350b
                       0bedef9c9983155aeab7e594a5547d1d6dd65f31
                       41c839822589d34c06db3db6eeab2cd42aac4594
                       3d1408f7218b4404559becda67e91603c4c55492
                       cce6ed8db99be96d6d85f02d27ac5c2f384722c0
                       df6f03846be43fb4c7b9492a002ae9a75c24cb3d
                       4fca9eaac526dc621616a8532c4a8f01a7f4fa9e
                       73144f7e087a650265a5feae3f4a6da5aab650d1
                       226e67752d86da74026d526afb08689e3c056b49
                       c149b5196465df3c65c5fe7c4d1300f498e2209a
                       2c6c07bdd1ce3b2e1017cc9a6b1f4029cdf2ce3a
                       b6c2a99c495c613722681413fbbbd1989ba058f4
                       c43dba993f0a1273e0a591aaf7853f0883787782
                       4f54e2a64027e050da89e7551f0fcc2ea974802c
                       d0081bd3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7d:49:00:fd:95:a4:16:31:3f:e9:72:10:33:b2:1c:f7:17:c6:37:15]
            modulus: 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
    public exponent: 10001

]