Results

By type

          2021-05-16 00:02:50,571 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-05-16 00:02:55,083 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-05-16 00:02:58.292  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-05-16 00:03:11.591 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-05-16 00:03:12.876  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-05-16 00:03:13.792  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-05-16 00:03:28.176  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 40.298 seconds (JVM running for 48.423)
2021-05-16 00:11:12.285  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-16 00:11:12.378 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-16 00:11:12.495 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-16 00:11:12.498 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-16 00:11:12.574  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-16 00:11:12.578  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-16 00:11:12.583  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-16 00:11:12.583  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-16 00:11:12.583  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-16 00:11:12.669  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-16 00:11:12.673  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-16 00:11:12.974  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-16 00:11:12.983  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-16 00:11:12.984  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-16 00:11:13.179  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-16 00:11:14.974  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-16 00:11:14.978  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-16 00:11:14.978 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-16 00:11:14.983 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-16 00:11:14.985  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1951
2021-05-16 00:11:14.985  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-16 00:11:14.989  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-16 00:11:15.068  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-16 00:11:15.075  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-16 00:11:15.077  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-16 00:11:15.077 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-16 00:11:15.078 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-16 00:11:15.078 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-16 00:11:15.091 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-16 00:11:15.167 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-16 00:11:15.169 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-16 00:11:15.179 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-16 00:11:15.371 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 504798786928008489038430342992662870084472796449
             IssuerDN: UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 15 23:59:35 UTC 2021
           Final Date: Thu May 15 23:59:35 UTC 2031
            SubjectDN: UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6d:8f:9d:bd:ab:c3:ea:de:65:c2:82:35:f9:1a:b6:53:69:68:20:b0]
            modulus: b864984e4c2b6a48b83d2ae7d8d1bf3573e6a4b05195f7e38652ba24df3880967ab4a0d42a235da2628da57821851e89b1398e87366c4b5f13b5ec4de9e4d951b3a666b902b793504dcdb5ea78534f7b6df947f2f7bd835d230419a4bd018e7fa0ade7a323e717f6465342ed046df4edc1dddc46a857b8f37a4615e624e549ada49fe3585e1d6fc8f19daa7bb61cce64a594e05ee94ccbc2536140ceca0aed36c4d026f077d4b5e8c73502f24bbd220dde391bf069e02cd9020fc8d7691d7c86832c50223e3acf7e7006603479c0aaef50797680a67a7ff724f87dd8c7bea91fe9e3fc8309fc85544528020518211ab8c9188b95b9bf4c3583915f18fd10aaeb9b21cd9e2515e58e73551c0cc104525d1e74e9a47b54b1c4fe713b4b5148238806eb708b83720a004b705a931ceb0e46234ffd801f67f7694136b44b82941f5df63b65cf70d73136855bc82f01bd822c6cc5e6255ef732eb9fcdacfe7017399658f62c3ee46564841014c596ddb6b428e787bb4a0c119249bf3f37fef8166e59
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4f4d0ef6148b2ed86b5dff18b064c922b7175a76
                       92c93bab047132947238ee0a7deccad84d5bc183
                       e4dc2ca4bc0ae9e3a1328fa89b4b7225a46630bf
                       1c3bbeb21354699d61d9003d76c31ee25e00a457
                       a761f5ef8a8e4c6443aaa33ec7c6b904c5483807
                       dd9e51a6730829cbf7cf21546311cb1e68ca34c9
                       2aa37274413cb983755cc32e2bcab22243e3cb71
                       a5e0ffaaf1d869542c8d27d0c21b77889cd88694
                       0c84ca4687084e0c956f0fc05d7f0fcb1b9f2aec
                       d5f6ccc3c13acd94d9c23aebb0c590676812752b
                       235d9d99bb99b015fd14686a66e63b9daae97156
                       5f5e44aba8f708648c7ba33d8e1f199f6f94edcb
                       86bbb37d290697fa34bbfea412c1d83552341f81
                       e5e2a78aad00976db1fa04a5ec61e4207197ddfb
                       3bcad6a22db3acb134a73dc9f463fff549ea87d7
                       8b2393bc3edc4326f5c42f051ea7863df98b94b8
                       c300e7612299c84cd6457d839ae108aa12ae4443
                       cda805662a870cdfc3e0addd7e9bdceda9d65742
                       7785909805d8939d4dda799a2d154b70d77b8323
                       494ca1b0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c6:8b:a1:51:0c:21:4c:9a:51:2f:52:18:ed:ae:be:de:43:ac:35:21]
            modulus: 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
    public exponent: 10001

] 
2021-05-16 01:17:40.596  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-16 01:17:40.598 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-16 01:17:40.601 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-16 01:17:40.604 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-16 01:17:40.606  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-16 01:17:40.607  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-16 01:17:40.608  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-16 01:17:40.668  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-16 01:17:40.670  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-16 01:17:40.684  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-16 01:17:40.768  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-16 01:17:40.768  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-16 01:17:40.774  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-16 01:17:40.994  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-16 01:17:40.995  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-16 01:17:40.996 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-16 01:17:41.000 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-16 01:17:41.001  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1951
2021-05-16 01:17:41.001  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-16 01:17:41.071  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-16 01:17:41.072  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-16 01:17:41.073  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-16 01:17:41.073  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-16 01:17:41.074 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-16 01:17:41.075 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-16 01:17:41.076 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-16 01:17:41.078 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-16 01:17:41.079 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-16 01:17:41.080 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-16 01:17:41.082 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-16 01:17:41.087 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 504798786928008489038430342992662870084472796449
             IssuerDN: UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 15 23:59:35 UTC 2021
           Final Date: Thu May 15 23:59:35 UTC 2031
            SubjectDN: UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6d:8f:9d:bd:ab:c3:ea:de:65:c2:82:35:f9:1a:b6:53:69:68:20:b0]
            modulus: b864984e4c2b6a48b83d2ae7d8d1bf3573e6a4b05195f7e38652ba24df3880967ab4a0d42a235da2628da57821851e89b1398e87366c4b5f13b5ec4de9e4d951b3a666b902b793504dcdb5ea78534f7b6df947f2f7bd835d230419a4bd018e7fa0ade7a323e717f6465342ed046df4edc1dddc46a857b8f37a4615e624e549ada49fe3585e1d6fc8f19daa7bb61cce64a594e05ee94ccbc2536140ceca0aed36c4d026f077d4b5e8c73502f24bbd220dde391bf069e02cd9020fc8d7691d7c86832c50223e3acf7e7006603479c0aaef50797680a67a7ff724f87dd8c7bea91fe9e3fc8309fc85544528020518211ab8c9188b95b9bf4c3583915f18fd10aaeb9b21cd9e2515e58e73551c0cc104525d1e74e9a47b54b1c4fe713b4b5148238806eb708b83720a004b705a931ceb0e46234ffd801f67f7694136b44b82941f5df63b65cf70d73136855bc82f01bd822c6cc5e6255ef732eb9fcdacfe7017399658f62c3ee46564841014c596ddb6b428e787bb4a0c119249bf3f37fef8166e59
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4f4d0ef6148b2ed86b5dff18b064c922b7175a76
                       92c93bab047132947238ee0a7deccad84d5bc183
                       e4dc2ca4bc0ae9e3a1328fa89b4b7225a46630bf
                       1c3bbeb21354699d61d9003d76c31ee25e00a457
                       a761f5ef8a8e4c6443aaa33ec7c6b904c5483807
                       dd9e51a6730829cbf7cf21546311cb1e68ca34c9
                       2aa37274413cb983755cc32e2bcab22243e3cb71
                       a5e0ffaaf1d869542c8d27d0c21b77889cd88694
                       0c84ca4687084e0c956f0fc05d7f0fcb1b9f2aec
                       d5f6ccc3c13acd94d9c23aebb0c590676812752b
                       235d9d99bb99b015fd14686a66e63b9daae97156
                       5f5e44aba8f708648c7ba33d8e1f199f6f94edcb
                       86bbb37d290697fa34bbfea412c1d83552341f81
                       e5e2a78aad00976db1fa04a5ec61e4207197ddfb
                       3bcad6a22db3acb134a73dc9f463fff549ea87d7
                       8b2393bc3edc4326f5c42f051ea7863df98b94b8
                       c300e7612299c84cd6457d839ae108aa12ae4443
                       cda805662a870cdfc3e0addd7e9bdceda9d65742
                       7785909805d8939d4dda799a2d154b70d77b8323
                       494ca1b0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [68:57:a3:3a:7f:91:1d:e3:4c:a1:7a:0a:e5:d6:0b:8d:40:a7:9b:26]
            modulus: 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
    public exponent: 10001

] 
2021-05-16 01:19:25.036  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-16 01:19:25.038 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-16 01:19:25.039 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-16 01:19:25.040 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-16 01:19:25.041  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-16 01:19:25.041  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-16 01:19:25.042  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-16 01:19:25.042  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-16 01:19:25.043  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-16 01:19:25.051  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-16 01:19:25.051  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-16 01:19:25.051  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-16 01:19:25.071  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-16 01:19:25.176  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-16 01:19:25.177  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-16 01:19:25.177 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-16 01:19:25.182 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-16 01:19:25.183  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1951
2021-05-16 01:19:25.183  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-16 01:19:25.187  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-16 01:19:25.188  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-16 01:19:25.188  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-16 01:19:25.188  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-16 01:19:25.189 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-16 01:19:25.189 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-16 01:19:25.189 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-16 01:19:25.190 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-16 01:19:25.190 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-16 01:19:25.190 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-16 01:19:25.191 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-16 01:19:25.270 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 504798786928008489038430342992662870084472796449
             IssuerDN: UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 15 23:59:35 UTC 2021
           Final Date: Thu May 15 23:59:35 UTC 2031
            SubjectDN: UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6d:8f:9d:bd:ab:c3:ea:de:65:c2:82:35:f9:1a:b6:53:69:68:20:b0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4f4d0ef6148b2ed86b5dff18b064c922b7175a76
                       92c93bab047132947238ee0a7deccad84d5bc183
                       e4dc2ca4bc0ae9e3a1328fa89b4b7225a46630bf
                       1c3bbeb21354699d61d9003d76c31ee25e00a457
                       a761f5ef8a8e4c6443aaa33ec7c6b904c5483807
                       dd9e51a6730829cbf7cf21546311cb1e68ca34c9
                       2aa37274413cb983755cc32e2bcab22243e3cb71
                       a5e0ffaaf1d869542c8d27d0c21b77889cd88694
                       0c84ca4687084e0c956f0fc05d7f0fcb1b9f2aec
                       d5f6ccc3c13acd94d9c23aebb0c590676812752b
                       235d9d99bb99b015fd14686a66e63b9daae97156
                       5f5e44aba8f708648c7ba33d8e1f199f6f94edcb
                       86bbb37d290697fa34bbfea412c1d83552341f81
                       e5e2a78aad00976db1fa04a5ec61e4207197ddfb
                       3bcad6a22db3acb134a73dc9f463fff549ea87d7
                       8b2393bc3edc4326f5c42f051ea7863df98b94b8
                       c300e7612299c84cd6457d839ae108aa12ae4443
                       cda805662a870cdfc3e0addd7e9bdceda9d65742
                       7785909805d8939d4dda799a2d154b70d77b8323
                       494ca1b0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [79:17:f1:66:22:ec:37:b7:b2:8e:04:cd:dc:63:b1:87:42:d4:15:44]
            modulus: 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
    public exponent: 10001

] 
2021-05-16 01:22:40.391  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-16 01:22:40.392 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-16 01:22:40.394 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-16 01:22:40.395 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-16 01:22:40.395  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-16 01:22:40.396  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-16 01:22:40.396  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-16 01:22:40.397  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-16 01:22:40.397  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-16 01:22:40.401  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-16 01:22:40.402  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-16 01:22:40.402  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-16 01:22:40.406  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-16 01:22:40.619  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-16 01:22:40.620  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-16 01:22:40.621 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-16 01:22:40.623 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-16 01:22:40.625  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1951
2021-05-16 01:22:40.625  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-16 01:22:40.627  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-16 01:22:40.628  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-16 01:22:40.628  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-16 01:22:40.668  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-16 01:22:40.669 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-16 01:22:40.669 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-16 01:22:40.669 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-16 01:22:40.670 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-16 01:22:40.670 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-16 01:22:40.671 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-16 01:22:40.671 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-16 01:22:40.675 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 504798786928008489038430342992662870084472796449
             IssuerDN: UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 15 23:59:35 UTC 2021
           Final Date: Thu May 15 23:59:35 UTC 2031
            SubjectDN: UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6d:8f:9d:bd:ab:c3:ea:de:65:c2:82:35:f9:1a:b6:53:69:68:20:b0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4f4d0ef6148b2ed86b5dff18b064c922b7175a76
                       92c93bab047132947238ee0a7deccad84d5bc183
                       e4dc2ca4bc0ae9e3a1328fa89b4b7225a46630bf
                       1c3bbeb21354699d61d9003d76c31ee25e00a457
                       a761f5ef8a8e4c6443aaa33ec7c6b904c5483807
                       dd9e51a6730829cbf7cf21546311cb1e68ca34c9
                       2aa37274413cb983755cc32e2bcab22243e3cb71
                       a5e0ffaaf1d869542c8d27d0c21b77889cd88694
                       0c84ca4687084e0c956f0fc05d7f0fcb1b9f2aec
                       d5f6ccc3c13acd94d9c23aebb0c590676812752b
                       235d9d99bb99b015fd14686a66e63b9daae97156
                       5f5e44aba8f708648c7ba33d8e1f199f6f94edcb
                       86bbb37d290697fa34bbfea412c1d83552341f81
                       e5e2a78aad00976db1fa04a5ec61e4207197ddfb
                       3bcad6a22db3acb134a73dc9f463fff549ea87d7
                       8b2393bc3edc4326f5c42f051ea7863df98b94b8
                       c300e7612299c84cd6457d839ae108aa12ae4443
                       cda805662a870cdfc3e0addd7e9bdceda9d65742
                       7785909805d8939d4dda799a2d154b70d77b8323
                       494ca1b0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3a:56:a7:4b:68:e9:f1:8a:fe:7d:3d:6a:77:37:78:1b:63:1d:66:f0]
            modulus: 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
    public exponent: 10001

] 
2021-05-16 01:22:47.135  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-16 01:22:47.136 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-16 01:22:47.137 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-16 01:22:47.138 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-16 01:22:47.138  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-16 01:22:47.139  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-16 01:22:47.140  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-16 01:22:47.140  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-16 01:22:47.140  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-16 01:22:47.145  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-16 01:22:47.145  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-16 01:22:47.146  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-16 01:22:47.148  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-16 01:22:47.268  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-16 01:22:47.269  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-16 01:22:47.269 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-16 01:22:47.270 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-16 01:22:47.271  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1951
2021-05-16 01:22:47.272  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-16 01:22:47.273  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-16 01:22:47.274  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-16 01:22:47.274  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-16 01:22:47.275  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-16 01:22:47.275 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-16 01:22:47.275 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-16 01:22:47.276 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-16 01:22:47.277 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-16 01:22:47.277 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-16 01:22:47.277 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-16 01:22:47.278 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-16 01:22:47.370 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 504798786928008489038430342992662870084472796449
             IssuerDN: UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 15 23:59:35 UTC 2021
           Final Date: Thu May 15 23:59:35 UTC 2031
            SubjectDN: UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6d:8f:9d:bd:ab:c3:ea:de:65:c2:82:35:f9:1a:b6:53:69:68:20:b0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4f4d0ef6148b2ed86b5dff18b064c922b7175a76
                       92c93bab047132947238ee0a7deccad84d5bc183
                       e4dc2ca4bc0ae9e3a1328fa89b4b7225a46630bf
                       1c3bbeb21354699d61d9003d76c31ee25e00a457
                       a761f5ef8a8e4c6443aaa33ec7c6b904c5483807
                       dd9e51a6730829cbf7cf21546311cb1e68ca34c9
                       2aa37274413cb983755cc32e2bcab22243e3cb71
                       a5e0ffaaf1d869542c8d27d0c21b77889cd88694
                       0c84ca4687084e0c956f0fc05d7f0fcb1b9f2aec
                       d5f6ccc3c13acd94d9c23aebb0c590676812752b
                       235d9d99bb99b015fd14686a66e63b9daae97156
                       5f5e44aba8f708648c7ba33d8e1f199f6f94edcb
                       86bbb37d290697fa34bbfea412c1d83552341f81
                       e5e2a78aad00976db1fa04a5ec61e4207197ddfb
                       3bcad6a22db3acb134a73dc9f463fff549ea87d7
                       8b2393bc3edc4326f5c42f051ea7863df98b94b8
                       c300e7612299c84cd6457d839ae108aa12ae4443
                       cda805662a870cdfc3e0addd7e9bdceda9d65742
                       7785909805d8939d4dda799a2d154b70d77b8323
                       494ca1b0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [72:96:87:9d:53:e5:15:06:cb:3d:eb:90:9e:67:22:2c:39:d7:e1:b0]
            modulus: 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
    public exponent: 10001

] 
2021-05-16 01:23:26.999  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-16 01:23:27.001 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-16 01:23:27.002 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-16 01:23:27.003 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-16 01:23:27.003  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-16 01:23:27.004  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-16 01:23:27.004  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-16 01:23:27.004  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-16 01:23:27.005  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-16 01:23:27.009  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-16 01:23:27.010  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-16 01:23:27.010  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-16 01:23:27.011  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-16 01:23:27.149  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-16 01:23:27.150  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-16 01:23:27.151 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-16 01:23:27.152 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-16 01:23:27.153  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1951
2021-05-16 01:23:27.153  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-16 01:23:27.155  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-16 01:23:27.155  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-16 01:23:27.156  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-16 01:23:27.157  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-16 01:23:27.157 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-16 01:23:27.158 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-16 01:23:27.158 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-16 01:23:27.159 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-16 01:23:27.159 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-16 01:23:27.160 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-16 01:23:27.162 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-16 01:23:27.169 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 504798786928008489038430342992662870084472796449
             IssuerDN: UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 15 23:59:35 UTC 2021
           Final Date: Thu May 15 23:59:35 UTC 2031
            SubjectDN: UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6d:8f:9d:bd:ab:c3:ea:de:65:c2:82:35:f9:1a:b6:53:69:68:20:b0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4f4d0ef6148b2ed86b5dff18b064c922b7175a76
                       92c93bab047132947238ee0a7deccad84d5bc183
                       e4dc2ca4bc0ae9e3a1328fa89b4b7225a46630bf
                       1c3bbeb21354699d61d9003d76c31ee25e00a457
                       a761f5ef8a8e4c6443aaa33ec7c6b904c5483807
                       dd9e51a6730829cbf7cf21546311cb1e68ca34c9
                       2aa37274413cb983755cc32e2bcab22243e3cb71
                       a5e0ffaaf1d869542c8d27d0c21b77889cd88694
                       0c84ca4687084e0c956f0fc05d7f0fcb1b9f2aec
                       d5f6ccc3c13acd94d9c23aebb0c590676812752b
                       235d9d99bb99b015fd14686a66e63b9daae97156
                       5f5e44aba8f708648c7ba33d8e1f199f6f94edcb
                       86bbb37d290697fa34bbfea412c1d83552341f81
                       e5e2a78aad00976db1fa04a5ec61e4207197ddfb
                       3bcad6a22db3acb134a73dc9f463fff549ea87d7
                       8b2393bc3edc4326f5c42f051ea7863df98b94b8
                       c300e7612299c84cd6457d839ae108aa12ae4443
                       cda805662a870cdfc3e0addd7e9bdceda9d65742
                       7785909805d8939d4dda799a2d154b70d77b8323
                       494ca1b0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bb:c3:8b:4c:ca:ea:98:35:20:e8:ee:e4:c6:d1:63:83:38:9c:2c:eb]
            modulus: 843c6da554485055724b53c1855567c9f3cb8eedf3197f4a2460ce43fc9d3f006712bdc230a3924c124f8382dfa35fd2f665923502e460874d3435498ad2cdfa2b54b0f5e2ea022888f874e2401ea8dcb02738f209ccbe4b73352d63826d0e9ed6bcb8ac0c520012f746d4b9229e8e9062fc3b2dfea8285962efd6ed489c66c8866861d6fb5e9c8ee261a41e3820af9d5e5136da140db6368aa510850944601302baf01a510c0aa976c0ea8f2e49e05d2a702e0285a40a2ee4eea737af0c56054dabd53e0aa4f44d3d7a5e60082e3f8bdfa3492990aaa6fba105eee8b026470bc0e9218564272557f1e7a71612da312c20f0e562909908df038a327c3995589f
    public exponent: 10001

] 
2021-05-16 01:23:36.287  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-16 01:23:36.289 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-16 01:23:36.290 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-16 01:23:36.291 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-16 01:23:36.291  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-16 01:23:36.292  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-16 01:23:36.293  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-16 01:23:36.293  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-16 01:23:36.293  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-16 01:23:36.297  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-16 01:23:36.297  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-16 01:23:36.298  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-16 01:23:36.299  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-16 01:23:36.384  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-16 01:23:36.385  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-16 01:23:36.386 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-16 01:23:36.387 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-16 01:23:36.388  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1951
2021-05-16 01:23:36.388  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-16 01:23:36.390  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-16 01:23:36.391  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-16 01:23:36.392  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-16 01:23:36.392  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-16 01:23:36.392 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-16 01:23:36.393 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-16 01:23:36.393 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-16 01:23:36.394 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-16 01:23:36.395 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-16 01:23:36.395 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-16 01:23:36.396 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-16 01:23:36.472 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 504798786928008489038430342992662870084472796449
             IssuerDN: UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 15 23:59:35 UTC 2021
           Final Date: Thu May 15 23:59:35 UTC 2031
            SubjectDN: UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6d:8f:9d:bd:ab:c3:ea:de:65:c2:82:35:f9:1a:b6:53:69:68:20:b0]
            modulus: b864984e4c2b6a48b83d2ae7d8d1bf3573e6a4b05195f7e38652ba24df3880967ab4a0d42a235da2628da57821851e89b1398e87366c4b5f13b5ec4de9e4d951b3a666b902b793504dcdb5ea78534f7b6df947f2f7bd835d230419a4bd018e7fa0ade7a323e717f6465342ed046df4edc1dddc46a857b8f37a4615e624e549ada49fe3585e1d6fc8f19daa7bb61cce64a594e05ee94ccbc2536140ceca0aed36c4d026f077d4b5e8c73502f24bbd220dde391bf069e02cd9020fc8d7691d7c86832c50223e3acf7e7006603479c0aaef50797680a67a7ff724f87dd8c7bea91fe9e3fc8309fc85544528020518211ab8c9188b95b9bf4c3583915f18fd10aaeb9b21cd9e2515e58e73551c0cc104525d1e74e9a47b54b1c4fe713b4b5148238806eb708b83720a004b705a931ceb0e46234ffd801f67f7694136b44b82941f5df63b65cf70d73136855bc82f01bd822c6cc5e6255ef732eb9fcdacfe7017399658f62c3ee46564841014c596ddb6b428e787bb4a0c119249bf3f37fef8166e59
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4f4d0ef6148b2ed86b5dff18b064c922b7175a76
                       92c93bab047132947238ee0a7deccad84d5bc183
                       e4dc2ca4bc0ae9e3a1328fa89b4b7225a46630bf
                       1c3bbeb21354699d61d9003d76c31ee25e00a457
                       a761f5ef8a8e4c6443aaa33ec7c6b904c5483807
                       dd9e51a6730829cbf7cf21546311cb1e68ca34c9
                       2aa37274413cb983755cc32e2bcab22243e3cb71
                       a5e0ffaaf1d869542c8d27d0c21b77889cd88694
                       0c84ca4687084e0c956f0fc05d7f0fcb1b9f2aec
                       d5f6ccc3c13acd94d9c23aebb0c590676812752b
                       235d9d99bb99b015fd14686a66e63b9daae97156
                       5f5e44aba8f708648c7ba33d8e1f199f6f94edcb
                       86bbb37d290697fa34bbfea412c1d83552341f81
                       e5e2a78aad00976db1fa04a5ec61e4207197ddfb
                       3bcad6a22db3acb134a73dc9f463fff549ea87d7
                       8b2393bc3edc4326f5c42f051ea7863df98b94b8
                       c300e7612299c84cd6457d839ae108aa12ae4443
                       cda805662a870cdfc3e0addd7e9bdceda9d65742
                       7785909805d8939d4dda799a2d154b70d77b8323
                       494ca1b0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7a:35:d7:86:47:72:80:71:40:12:99:82:26:6f:75:a2:b7:e2:cc:78]
            modulus: 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
    public exponent: 10001

] 
2021-05-16 01:24:53.953  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-16 01:24:53.955 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-16 01:24:53.957 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-16 01:24:53.958 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-16 01:24:53.959  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-16 01:24:53.960  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-16 01:24:53.960  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-16 01:24:53.960  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-16 01:24:53.961  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-16 01:24:53.965  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-16 01:24:53.965  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-16 01:24:53.966  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-16 01:24:53.967  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-16 01:24:54.060  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-16 01:24:54.061  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-16 01:24:54.061 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-16 01:24:54.063 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-16 01:24:54.064  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1951
2021-05-16 01:24:54.065  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-16 01:24:54.068  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-16 01:24:54.068  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-16 01:24:54.069  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-16 01:24:54.070  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-16 01:24:54.071 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-16 01:24:54.072 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-16 01:24:54.072 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-16 01:24:54.074 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-16 01:24:54.074 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-16 01:24:54.075 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-16 01:24:54.077 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-16 01:24:54.081 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 504798786928008489038430342992662870084472796449
             IssuerDN: UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 15 23:59:35 UTC 2021
           Final Date: Thu May 15 23:59:35 UTC 2031
            SubjectDN: UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6d:8f:9d:bd:ab:c3:ea:de:65:c2:82:35:f9:1a:b6:53:69:68:20:b0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4f4d0ef6148b2ed86b5dff18b064c922b7175a76
                       92c93bab047132947238ee0a7deccad84d5bc183
                       e4dc2ca4bc0ae9e3a1328fa89b4b7225a46630bf
                       1c3bbeb21354699d61d9003d76c31ee25e00a457
                       a761f5ef8a8e4c6443aaa33ec7c6b904c5483807
                       dd9e51a6730829cbf7cf21546311cb1e68ca34c9
                       2aa37274413cb983755cc32e2bcab22243e3cb71
                       a5e0ffaaf1d869542c8d27d0c21b77889cd88694
                       0c84ca4687084e0c956f0fc05d7f0fcb1b9f2aec
                       d5f6ccc3c13acd94d9c23aebb0c590676812752b
                       235d9d99bb99b015fd14686a66e63b9daae97156
                       5f5e44aba8f708648c7ba33d8e1f199f6f94edcb
                       86bbb37d290697fa34bbfea412c1d83552341f81
                       e5e2a78aad00976db1fa04a5ec61e4207197ddfb
                       3bcad6a22db3acb134a73dc9f463fff549ea87d7
                       8b2393bc3edc4326f5c42f051ea7863df98b94b8
                       c300e7612299c84cd6457d839ae108aa12ae4443
                       cda805662a870cdfc3e0addd7e9bdceda9d65742
                       7785909805d8939d4dda799a2d154b70d77b8323
                       494ca1b0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [77:61:29:c3:fd:94:de:b9:06:08:17:e3:9f:ed:c0:a8:9d:f3:3b:9e]
            modulus: b003e3e7302d45f6695de242421e7d5a814ae60cbcc89478965873a4f1d6e06370cb8ba808096a0e1abf12c050eb2ce3f0a2f0c08f521e2163c2e44c7f3517436f229675ee6cfc4743c2b52e67d0b905722cc9503ce62059d7df37856ee5c3731cc9ee2b5a3ed57467ee9184a158a4417571b869195cbf5eb18cef226a2432f38799c6c62c06cedad4b7f21ce0ed8509bfad4e6bfc547b2c0b1f796a7cd7a7d46557653de9e85665f04e49231e52b3e251911a1b8c70610865625452d43a5136b1cd4d45903a36df39a01d145da76446bfe3d680daca832e3f99a6c5192649e25fccc95536c157dc371d8aa3f8949b5aa95416e3efd8e2b69f0528770b87056d
    public exponent: 10001

] 
2021-05-16 01:25:30.333  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-16 01:25:30.334 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-16 01:25:30.336 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-16 01:25:30.336 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-16 01:25:30.337  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-16 01:25:30.338  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-16 01:25:30.338  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-16 01:25:30.339  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-16 01:25:30.339  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-16 01:25:30.343  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-16 01:25:30.344  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-16 01:25:30.344  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-16 01:25:30.345  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-16 01:25:30.424  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-16 01:25:30.425  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-16 01:25:30.425 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-16 01:25:30.427 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-16 01:25:30.428  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1951
2021-05-16 01:25:30.428  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-16 01:25:30.430  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-16 01:25:30.431  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-16 01:25:30.431  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-16 01:25:30.432  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-16 01:25:30.432 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-16 01:25:30.432 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-16 01:25:30.432 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-16 01:25:30.433 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-16 01:25:30.433 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-16 01:25:30.434 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-16 01:25:30.434 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-16 01:25:30.437 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 504798786928008489038430342992662870084472796449
             IssuerDN: UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 15 23:59:35 UTC 2021
           Final Date: Thu May 15 23:59:35 UTC 2031
            SubjectDN: UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6d:8f:9d:bd:ab:c3:ea:de:65:c2:82:35:f9:1a:b6:53:69:68:20:b0]
            modulus: b864984e4c2b6a48b83d2ae7d8d1bf3573e6a4b05195f7e38652ba24df3880967ab4a0d42a235da2628da57821851e89b1398e87366c4b5f13b5ec4de9e4d951b3a666b902b793504dcdb5ea78534f7b6df947f2f7bd835d230419a4bd018e7fa0ade7a323e717f6465342ed046df4edc1dddc46a857b8f37a4615e624e549ada49fe3585e1d6fc8f19daa7bb61cce64a594e05ee94ccbc2536140ceca0aed36c4d026f077d4b5e8c73502f24bbd220dde391bf069e02cd9020fc8d7691d7c86832c50223e3acf7e7006603479c0aaef50797680a67a7ff724f87dd8c7bea91fe9e3fc8309fc85544528020518211ab8c9188b95b9bf4c3583915f18fd10aaeb9b21cd9e2515e58e73551c0cc104525d1e74e9a47b54b1c4fe713b4b5148238806eb708b83720a004b705a931ceb0e46234ffd801f67f7694136b44b82941f5df63b65cf70d73136855bc82f01bd822c6cc5e6255ef732eb9fcdacfe7017399658f62c3ee46564841014c596ddb6b428e787bb4a0c119249bf3f37fef8166e59
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4f4d0ef6148b2ed86b5dff18b064c922b7175a76
                       92c93bab047132947238ee0a7deccad84d5bc183
                       e4dc2ca4bc0ae9e3a1328fa89b4b7225a46630bf
                       1c3bbeb21354699d61d9003d76c31ee25e00a457
                       a761f5ef8a8e4c6443aaa33ec7c6b904c5483807
                       dd9e51a6730829cbf7cf21546311cb1e68ca34c9
                       2aa37274413cb983755cc32e2bcab22243e3cb71
                       a5e0ffaaf1d869542c8d27d0c21b77889cd88694
                       0c84ca4687084e0c956f0fc05d7f0fcb1b9f2aec
                       d5f6ccc3c13acd94d9c23aebb0c590676812752b
                       235d9d99bb99b015fd14686a66e63b9daae97156
                       5f5e44aba8f708648c7ba33d8e1f199f6f94edcb
                       86bbb37d290697fa34bbfea412c1d83552341f81
                       e5e2a78aad00976db1fa04a5ec61e4207197ddfb
                       3bcad6a22db3acb134a73dc9f463fff549ea87d7
                       8b2393bc3edc4326f5c42f051ea7863df98b94b8
                       c300e7612299c84cd6457d839ae108aa12ae4443
                       cda805662a870cdfc3e0addd7e9bdceda9d65742
                       7785909805d8939d4dda799a2d154b70d77b8323
                       494ca1b0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e0:a4:56:f6:4a:81:c7:d4:e8:ad:ca:cd:4c:44:cd:49:9e:59:c3:a5]
            modulus: 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
    public exponent: 10001

] 
2021-05-16 01:28:11.074  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-16 01:28:11.075 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-16 01:28:11.076 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-16 01:28:11.077 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-16 01:28:11.077  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-16 01:28:11.077  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-16 01:28:11.078  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-16 01:28:11.078  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-16 01:28:11.078  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-16 01:28:11.082  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-16 01:28:11.083  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-16 01:28:11.083  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-16 01:28:11.084  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-16 01:28:11.190  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-16 01:28:11.191  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-16 01:28:11.191 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-16 01:28:11.193 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-16 01:28:11.199  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1951
2021-05-16 01:28:11.200  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-16 01:28:11.202  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-16 01:28:11.202  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-16 01:28:11.203  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-16 01:28:11.268  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-16 01:28:11.269 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-16 01:28:11.269 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-16 01:28:11.269 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-16 01:28:11.270 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-16 01:28:11.270 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-16 01:28:11.271 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-16 01:28:11.272 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-16 01:28:11.276 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 504798786928008489038430342992662870084472796449
             IssuerDN: UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 15 23:59:35 UTC 2021
           Final Date: Thu May 15 23:59:35 UTC 2031
            SubjectDN: UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6d:8f:9d:bd:ab:c3:ea:de:65:c2:82:35:f9:1a:b6:53:69:68:20:b0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4f4d0ef6148b2ed86b5dff18b064c922b7175a76
                       92c93bab047132947238ee0a7deccad84d5bc183
                       e4dc2ca4bc0ae9e3a1328fa89b4b7225a46630bf
                       1c3bbeb21354699d61d9003d76c31ee25e00a457
                       a761f5ef8a8e4c6443aaa33ec7c6b904c5483807
                       dd9e51a6730829cbf7cf21546311cb1e68ca34c9
                       2aa37274413cb983755cc32e2bcab22243e3cb71
                       a5e0ffaaf1d869542c8d27d0c21b77889cd88694
                       0c84ca4687084e0c956f0fc05d7f0fcb1b9f2aec
                       d5f6ccc3c13acd94d9c23aebb0c590676812752b
                       235d9d99bb99b015fd14686a66e63b9daae97156
                       5f5e44aba8f708648c7ba33d8e1f199f6f94edcb
                       86bbb37d290697fa34bbfea412c1d83552341f81
                       e5e2a78aad00976db1fa04a5ec61e4207197ddfb
                       3bcad6a22db3acb134a73dc9f463fff549ea87d7
                       8b2393bc3edc4326f5c42f051ea7863df98b94b8
                       c300e7612299c84cd6457d839ae108aa12ae4443
                       cda805662a870cdfc3e0addd7e9bdceda9d65742
                       7785909805d8939d4dda799a2d154b70d77b8323
                       494ca1b0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [97:68:74:c8:ba:a6:72:28:ea:cf:99:0d:88:ec:ec:36:9d:4a:e7:d5]
            modulus: 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
    public exponent: 10001

] 
2021-05-16 01:30:50.139  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-16 01:30:50.140 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-16 01:30:50.141 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-16 01:30:50.142 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-16 01:30:50.142  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-16 01:30:50.143  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-16 01:30:50.143  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-16 01:30:50.143  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-16 01:30:50.144  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-16 01:30:50.150  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-16 01:30:50.151  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-16 01:30:50.151  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-16 01:30:50.152  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-16 01:30:50.254  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-16 01:30:50.255  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-16 01:30:50.255 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-16 01:30:50.258 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-16 01:30:50.259  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1951
2021-05-16 01:30:50.259  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-16 01:30:50.262  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-16 01:30:50.262  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-16 01:30:50.263  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-16 01:30:50.263  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-16 01:30:50.264 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-16 01:30:50.264 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-16 01:30:50.264 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-16 01:30:50.265 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-16 01:30:50.265 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-16 01:30:50.265 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-16 01:30:50.266 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-16 01:30:50.270 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 504798786928008489038430342992662870084472796449
             IssuerDN: UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 15 23:59:35 UTC 2021
           Final Date: Thu May 15 23:59:35 UTC 2031
            SubjectDN: UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6d:8f:9d:bd:ab:c3:ea:de:65:c2:82:35:f9:1a:b6:53:69:68:20:b0]
            modulus: b864984e4c2b6a48b83d2ae7d8d1bf3573e6a4b05195f7e38652ba24df3880967ab4a0d42a235da2628da57821851e89b1398e87366c4b5f13b5ec4de9e4d951b3a666b902b793504dcdb5ea78534f7b6df947f2f7bd835d230419a4bd018e7fa0ade7a323e717f6465342ed046df4edc1dddc46a857b8f37a4615e624e549ada49fe3585e1d6fc8f19daa7bb61cce64a594e05ee94ccbc2536140ceca0aed36c4d026f077d4b5e8c73502f24bbd220dde391bf069e02cd9020fc8d7691d7c86832c50223e3acf7e7006603479c0aaef50797680a67a7ff724f87dd8c7bea91fe9e3fc8309fc85544528020518211ab8c9188b95b9bf4c3583915f18fd10aaeb9b21cd9e2515e58e73551c0cc104525d1e74e9a47b54b1c4fe713b4b5148238806eb708b83720a004b705a931ceb0e46234ffd801f67f7694136b44b82941f5df63b65cf70d73136855bc82f01bd822c6cc5e6255ef732eb9fcdacfe7017399658f62c3ee46564841014c596ddb6b428e787bb4a0c119249bf3f37fef8166e59
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4f4d0ef6148b2ed86b5dff18b064c922b7175a76
                       92c93bab047132947238ee0a7deccad84d5bc183
                       e4dc2ca4bc0ae9e3a1328fa89b4b7225a46630bf
                       1c3bbeb21354699d61d9003d76c31ee25e00a457
                       a761f5ef8a8e4c6443aaa33ec7c6b904c5483807
                       dd9e51a6730829cbf7cf21546311cb1e68ca34c9
                       2aa37274413cb983755cc32e2bcab22243e3cb71
                       a5e0ffaaf1d869542c8d27d0c21b77889cd88694
                       0c84ca4687084e0c956f0fc05d7f0fcb1b9f2aec
                       d5f6ccc3c13acd94d9c23aebb0c590676812752b
                       235d9d99bb99b015fd14686a66e63b9daae97156
                       5f5e44aba8f708648c7ba33d8e1f199f6f94edcb
                       86bbb37d290697fa34bbfea412c1d83552341f81
                       e5e2a78aad00976db1fa04a5ec61e4207197ddfb
                       3bcad6a22db3acb134a73dc9f463fff549ea87d7
                       8b2393bc3edc4326f5c42f051ea7863df98b94b8
                       c300e7612299c84cd6457d839ae108aa12ae4443
                       cda805662a870cdfc3e0addd7e9bdceda9d65742
                       7785909805d8939d4dda799a2d154b70d77b8323
                       494ca1b0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [35:6d:13:90:4e:51:da:db:56:08:e5:8e:20:f8:bd:bb:d2:40:4b:97]
            modulus: 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
    public exponent: 10001

] 
2021-05-16 01:33:01.184  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-16 01:33:01.186 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-16 01:33:01.187 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-16 01:33:01.188 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-16 01:33:01.189  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-16 01:33:01.189  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-16 01:33:01.190  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-16 01:33:01.190  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-16 01:33:01.190  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-16 01:33:01.194  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-16 01:33:01.194  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-16 01:33:01.195  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-16 01:33:01.196  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-16 01:33:01.266  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-16 01:33:01.267  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-16 01:33:01.267 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-16 01:33:01.269 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-16 01:33:01.270  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1951
2021-05-16 01:33:01.270  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-16 01:33:01.273  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-16 01:33:01.274  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-16 01:33:01.274  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-16 01:33:01.275  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-16 01:33:01.275 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-16 01:33:01.276 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-16 01:33:01.276 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-16 01:33:01.277 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-16 01:33:01.277 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-16 01:33:01.277 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-16 01:33:01.278 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-16 01:33:01.281 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 504798786928008489038430342992662870084472796449
             IssuerDN: UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 15 23:59:35 UTC 2021
           Final Date: Thu May 15 23:59:35 UTC 2031
            SubjectDN: UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6d:8f:9d:bd:ab:c3:ea:de:65:c2:82:35:f9:1a:b6:53:69:68:20:b0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4f4d0ef6148b2ed86b5dff18b064c922b7175a76
                       92c93bab047132947238ee0a7deccad84d5bc183
                       e4dc2ca4bc0ae9e3a1328fa89b4b7225a46630bf
                       1c3bbeb21354699d61d9003d76c31ee25e00a457
                       a761f5ef8a8e4c6443aaa33ec7c6b904c5483807
                       dd9e51a6730829cbf7cf21546311cb1e68ca34c9
                       2aa37274413cb983755cc32e2bcab22243e3cb71
                       a5e0ffaaf1d869542c8d27d0c21b77889cd88694
                       0c84ca4687084e0c956f0fc05d7f0fcb1b9f2aec
                       d5f6ccc3c13acd94d9c23aebb0c590676812752b
                       235d9d99bb99b015fd14686a66e63b9daae97156
                       5f5e44aba8f708648c7ba33d8e1f199f6f94edcb
                       86bbb37d290697fa34bbfea412c1d83552341f81
                       e5e2a78aad00976db1fa04a5ec61e4207197ddfb
                       3bcad6a22db3acb134a73dc9f463fff549ea87d7
                       8b2393bc3edc4326f5c42f051ea7863df98b94b8
                       c300e7612299c84cd6457d839ae108aa12ae4443
                       cda805662a870cdfc3e0addd7e9bdceda9d65742
                       7785909805d8939d4dda799a2d154b70d77b8323
                       494ca1b0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [57:cb:0e:a4:61:ff:1a:25:cb:32:6c:e2:8c:78:91:18:3d:94:29:2c]
            modulus: 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
    public exponent: 10001

] 
2021-05-16 01:34:40.680  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-16 01:34:40.682 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-16 01:34:40.683 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-16 01:34:40.683 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-16 01:34:40.684  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-16 01:34:40.684  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-16 01:34:40.685  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-16 01:34:40.685  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-16 01:34:40.685  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-16 01:34:40.690  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-16 01:34:40.690  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-16 01:34:40.691  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-16 01:34:40.692  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-16 01:34:40.776  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-16 01:34:40.777  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-16 01:34:40.777 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-16 01:34:40.779 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-16 01:34:40.779  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1951
2021-05-16 01:34:40.780  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-16 01:34:40.783  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-16 01:34:40.783  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-16 01:34:40.784  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-16 01:34:40.784  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-16 01:34:40.784 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-16 01:34:40.785 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-16 01:34:40.785 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-16 01:34:40.786 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-16 01:34:40.786 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-16 01:34:40.786 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-16 01:34:40.787 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-16 01:34:40.791 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 504798786928008489038430342992662870084472796449
             IssuerDN: UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 15 23:59:35 UTC 2021
           Final Date: Thu May 15 23:59:35 UTC 2031
            SubjectDN: UID=c-0e682b636febb4f3d,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [6d:8f:9d:bd:ab:c3:ea:de:65:c2:82:35:f9:1a:b6:53:69:68:20:b0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4f4d0ef6148b2ed86b5dff18b064c922b7175a76
                       92c93bab047132947238ee0a7deccad84d5bc183
                       e4dc2ca4bc0ae9e3a1328fa89b4b7225a46630bf
                       1c3bbeb21354699d61d9003d76c31ee25e00a457
                       a761f5ef8a8e4c6443aaa33ec7c6b904c5483807
                       dd9e51a6730829cbf7cf21546311cb1e68ca34c9
                       2aa37274413cb983755cc32e2bcab22243e3cb71
                       a5e0ffaaf1d869542c8d27d0c21b77889cd88694
                       0c84ca4687084e0c956f0fc05d7f0fcb1b9f2aec
                       d5f6ccc3c13acd94d9c23aebb0c590676812752b
                       235d9d99bb99b015fd14686a66e63b9daae97156
                       5f5e44aba8f708648c7ba33d8e1f199f6f94edcb
                       86bbb37d290697fa34bbfea412c1d83552341f81
                       e5e2a78aad00976db1fa04a5ec61e4207197ddfb
                       3bcad6a22db3acb134a73dc9f463fff549ea87d7
                       8b2393bc3edc4326f5c42f051ea7863df98b94b8
                       c300e7612299c84cd6457d839ae108aa12ae4443
                       cda805662a870cdfc3e0addd7e9bdceda9d65742
                       7785909805d8939d4dda799a2d154b70d77b8323
                       494ca1b0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [54:c6:86:24:16:1c:3f:2c:63:1a:86:7e:bf:df:0b:e9:52:9a:dd:8c]
            modulus: 891f5c2f3583480c802c2084874c115f5b798dce6d0fae28e9005af4b898b0f841328a5d15d5b85bc6888a0a04f22cd30ea870e0a4a851b98f821c9739b6c129ef5362bb8c6e51167480d77e451f2dc6ef869ef07840a6c0634de6dcc37fec9ba1e20383216725271deb3001db30213a6d8d86bf0ccaff273b4a78bdf71667b744c8651361390cbbbcdce8c9efc8318545475b3dab2438853d886cdddbbcf6733eb017d252a58c1c1d131ed5eb9163587a1b5e402a6295176900cdac6cb0c06f501675281ced99bdf19480b5fc3a76efd553b62a2ffb1e8754fc943ec87e7957ed7c09630fe006609e2d10bfc4bdba948fe86237156128ea6e76d23c05e96b09
    public exponent: 10001

]