Results

By type

          2021-05-17 23:32:37,276 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-05-17 23:32:41,374 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-05-17 23:32:44.675  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-05-17 23:32:57.087 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-05-17 23:32:58.277  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-05-17 23:32:58.979  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-05-17 23:33:14.589  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 40.105 seconds (JVM running for 48.011)
2021-05-17 23:33:32.478  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-17 23:33:32.486 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-17 23:33:32.768 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-17 23:33:32.774 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-17 23:33:32.879  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-17 23:33:32.969  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-17 23:33:32.976  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-17 23:33:32.977  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-17 23:33:32.977  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-17 23:33:32.985  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-17 23:33:33.072  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-17 23:33:33.380  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-17 23:33:33.473  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-17 23:33:33.474  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-17 23:33:33.581  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-17 23:33:35.085  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-17 23:33:35.088  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-17 23:33:35.167 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-17 23:33:35.176 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-17 23:33:35.178  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1775
2021-05-17 23:33:35.179  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-17 23:33:35.183  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-17 23:33:35.184  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-17 23:33:35.275  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-17 23:33:35.277  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-17 23:33:35.277 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-17 23:33:35.278 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-17 23:33:35.278 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-17 23:33:35.290 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-17 23:33:35.291 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-17 23:33:35.291 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-17 23:33:35.375 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-17 23:33:35.489 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 120934503834391777467864222183749369454841416502
             IssuerDN: UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 17 23:29:13 UTC 2021
           Final Date: Sat May 17 23:29:13 UTC 2031
            SubjectDN: UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [68:51:21:4f:e8:24:a2:a9:36:fd:98:ce:ce:ca:19:16:08:53:2d:c6]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 417c3c51b74b45abea570150ab72a3baceb70433
                       10930dcfb4f89f726a8d11245c49066eca12ec67
                       073c38287d5844f60b7b3230d400512cbb4bbdd4
                       28696098edd36e1a6ea72c6671dad8e7b31c7edf
                       6cbde56539860fc6adb9b4db2969fbd1c5b72980
                       b619bb40f8d1fc8546fdc13feb7024de99129ca7
                       c0c43fbb73e98aaa28c36e94695d76f868cd0e2e
                       556ee7601144b40df1c99384b1ca92c43e3f8c8a
                       48007a6794f111b9b6d912747c2c0cc12c2303a1
                       6b36683c434a256e7aded79a34b7e8b2a6a2a3e9
                       90a26151d7338348d172acc0ae42ca1b13bb5548
                       733fd64e64aef2ed0fc4426bcc6b27ebedb6cf11
                       4afe23f18eaa8e299ee1a7aa5f9766fcf9a37cd1
                       6774863ab556fe3824338591d8ec081b53388de4
                       e73b9fd43b30b813964d5c22437eac8d2b5aefc4
                       a8d92a5150316dee93f70ce7104293baeb6b835c
                       b25e7f7d7946f27caff7f81ee9048e18a93f8eaa
                       b7873036d88efb936eff32fc63c7b6cc2334e45b
                       2dc41e0b3602da04657a8f11e1b0cacc63792e73
                       2b21de0c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4a:75:fa:17:2d:63:dc:df:86:c4:38:2b:93:0b:ce:b7:31:8e:12:cd]
            modulus: b621d74d1490db9d1e551def708a19aff6cc43a5a3c974c6c7a919a5a7b024122fe9c058e3142d1f5fcdd3b052ac94220428dda9503c697dcde30df23bf12831b7dff9318ba24b3e3b90c29e96ac268af879c302bcc5e7fd0831b65cb014a9daa15aca8923a5c6bdb044e73c8834922c53811bbff566ef3aedc6bc241e93ddb269c7ad8783ab5692e4f6f4451d6b82dd6fbdfcd05ec40979b50d192dbc25c64a5303baf2d76a712fd93e7487a76c826b6724f99eb56bddce9daa50639bd3c6d728eb567baaf5173d38898fa5a80eaf4a7a06928a8e8e5652a9cccaf95715331573bf2684f41fcf965635f92a7dea5f16f9bbd79b489a8358d93c7ae9f205f9e1
    public exponent: 10001

] 
2021-05-18 00:35:53.974  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-18 00:35:53.977 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-18 00:35:53.979 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-18 00:35:53.981 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-18 00:35:53.982  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-18 00:35:53.982  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-18 00:35:53.983  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-18 00:35:53.983  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-18 00:35:53.984  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-18 00:35:54.078  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-18 00:35:54.080  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-18 00:35:54.081  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-18 00:35:54.083  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-18 00:35:54.368  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-18 00:35:54.369  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-18 00:35:54.369 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-18 00:35:54.376 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-18 00:35:54.385  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1775
2021-05-18 00:35:54.386  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-18 00:35:54.390  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-18 00:35:54.469  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-18 00:35:54.469  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-18 00:35:54.470  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-18 00:35:54.471 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-18 00:35:54.472 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-18 00:35:54.472 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-18 00:35:54.474 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-18 00:35:54.474 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-18 00:35:54.475 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-18 00:35:54.476 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-18 00:35:54.482 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 120934503834391777467864222183749369454841416502
             IssuerDN: UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 17 23:29:13 UTC 2021
           Final Date: Sat May 17 23:29:13 UTC 2031
            SubjectDN: UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [68:51:21:4f:e8:24:a2:a9:36:fd:98:ce:ce:ca:19:16:08:53:2d:c6]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 417c3c51b74b45abea570150ab72a3baceb70433
                       10930dcfb4f89f726a8d11245c49066eca12ec67
                       073c38287d5844f60b7b3230d400512cbb4bbdd4
                       28696098edd36e1a6ea72c6671dad8e7b31c7edf
                       6cbde56539860fc6adb9b4db2969fbd1c5b72980
                       b619bb40f8d1fc8546fdc13feb7024de99129ca7
                       c0c43fbb73e98aaa28c36e94695d76f868cd0e2e
                       556ee7601144b40df1c99384b1ca92c43e3f8c8a
                       48007a6794f111b9b6d912747c2c0cc12c2303a1
                       6b36683c434a256e7aded79a34b7e8b2a6a2a3e9
                       90a26151d7338348d172acc0ae42ca1b13bb5548
                       733fd64e64aef2ed0fc4426bcc6b27ebedb6cf11
                       4afe23f18eaa8e299ee1a7aa5f9766fcf9a37cd1
                       6774863ab556fe3824338591d8ec081b53388de4
                       e73b9fd43b30b813964d5c22437eac8d2b5aefc4
                       a8d92a5150316dee93f70ce7104293baeb6b835c
                       b25e7f7d7946f27caff7f81ee9048e18a93f8eaa
                       b7873036d88efb936eff32fc63c7b6cc2334e45b
                       2dc41e0b3602da04657a8f11e1b0cacc63792e73
                       2b21de0c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f2:d6:fc:a2:98:37:a4:1f:f1:c4:b8:a0:29:96:3c:d8:e7:36:44:53]
            modulus: cfb336abe64b93bb10b0f1c52d1508c55004b450ac1411b5b880bd05378f1c2b26c5b44198965ef65da512e015f2ab7bd545e9fb6ff7a0d25985b29dbd52d404a1bdc4684fb9cb5a617b4ee7f16938ea3eae509c20dd68432ea74865f7a7776926481002cca9d9007944d7f9858115f07fabcbd7fd44388a8ecf31c04f0967644c2517059c61f26a85f49aca1bd9eaf58be3a2c9903753629a961067e63665fc6f8b63184729c2a8f5629577eb0ecc3501087f6f601c2b283798982105c8c4af516e388dd3b072e0e1113b285fd17e8e73dc78f2280ce78686fa70ff1f7819f2812c344c5dddae455d498c876340b1c020a7a3515338cb8dacc267f2dd9dacfd
    public exponent: 10001

] 
2021-05-18 00:38:15.037  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-18 00:38:15.039 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-18 00:38:15.040 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-18 00:38:15.041 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-18 00:38:15.041  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-18 00:38:15.042  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-18 00:38:15.042  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-18 00:38:15.043  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-18 00:38:15.043  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-18 00:38:15.049  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-18 00:38:15.050  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-18 00:38:15.050  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-18 00:38:15.053  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-18 00:38:15.141  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-18 00:38:15.168  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-18 00:38:15.169 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-18 00:38:15.172 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-18 00:38:15.173  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1775
2021-05-18 00:38:15.173  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-18 00:38:15.178  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-18 00:38:15.179  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-18 00:38:15.180  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-18 00:38:15.180  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-18 00:38:15.181 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-18 00:38:15.181 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-18 00:38:15.181 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-18 00:38:15.182 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-18 00:38:15.182 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-18 00:38:15.183 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-18 00:38:15.183 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-18 00:38:15.268 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 120934503834391777467864222183749369454841416502
             IssuerDN: UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 17 23:29:13 UTC 2021
           Final Date: Sat May 17 23:29:13 UTC 2031
            SubjectDN: UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [68:51:21:4f:e8:24:a2:a9:36:fd:98:ce:ce:ca:19:16:08:53:2d:c6]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 417c3c51b74b45abea570150ab72a3baceb70433
                       10930dcfb4f89f726a8d11245c49066eca12ec67
                       073c38287d5844f60b7b3230d400512cbb4bbdd4
                       28696098edd36e1a6ea72c6671dad8e7b31c7edf
                       6cbde56539860fc6adb9b4db2969fbd1c5b72980
                       b619bb40f8d1fc8546fdc13feb7024de99129ca7
                       c0c43fbb73e98aaa28c36e94695d76f868cd0e2e
                       556ee7601144b40df1c99384b1ca92c43e3f8c8a
                       48007a6794f111b9b6d912747c2c0cc12c2303a1
                       6b36683c434a256e7aded79a34b7e8b2a6a2a3e9
                       90a26151d7338348d172acc0ae42ca1b13bb5548
                       733fd64e64aef2ed0fc4426bcc6b27ebedb6cf11
                       4afe23f18eaa8e299ee1a7aa5f9766fcf9a37cd1
                       6774863ab556fe3824338591d8ec081b53388de4
                       e73b9fd43b30b813964d5c22437eac8d2b5aefc4
                       a8d92a5150316dee93f70ce7104293baeb6b835c
                       b25e7f7d7946f27caff7f81ee9048e18a93f8eaa
                       b7873036d88efb936eff32fc63c7b6cc2334e45b
                       2dc41e0b3602da04657a8f11e1b0cacc63792e73
                       2b21de0c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f7:3a:9f:41:e0:0f:e3:e6:b0:6d:89:fc:55:68:4c:a7:20:92:be:94]
            modulus: 971ae9909aed23e258b4f5d89f9d0d95c88004a13a4f239ad8e7e3762913c03a44303fd8abf09f993d1494f8d0e8cd3d29a1900cd7f3518aac9506dac480dd9e2f2f8a1c97a33bf8d21e0f6e8ec31f98930b66a3c762266ddede86d9885b94257ff759daf9bc8eb9edcbaf9074f856ef67edaab735d5755df6356d241600ffc3c05388a699b7e291703bfd75b2f42364eece47afbacdc9efc0037f6d578e4bfbb24821460a93c483c19383b036025f729fbd164134385eb2ee546ed646973eda46dbb3eeba4da37ce84af1906afd1d47510a0b669683bf3e91a14f6e119bce6e0cc5b0a7470f6f21450a791e8b45ea49d9b15604558130d684ecd9d47b14c1d3
    public exponent: 10001

] 
2021-05-18 00:40:40.603  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-18 00:40:40.604 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-18 00:40:40.605 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-18 00:40:40.606 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-18 00:40:40.607  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-18 00:40:40.607  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-18 00:40:40.608  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-18 00:40:40.608  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-18 00:40:40.609  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-18 00:40:40.619  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-18 00:40:40.620  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-18 00:40:40.620  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-18 00:40:40.622  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-18 00:40:40.770  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-18 00:40:40.771  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-18 00:40:40.771 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-18 00:40:40.773 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-18 00:40:40.774  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1775
2021-05-18 00:40:40.774  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-18 00:40:40.776  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-18 00:40:40.776  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-18 00:40:40.777  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-18 00:40:40.777  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-18 00:40:40.778 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-18 00:40:40.782 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-18 00:40:40.782 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-18 00:40:40.783 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-18 00:40:40.783 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-18 00:40:40.784 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-18 00:40:40.784 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-18 00:40:40.787 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 120934503834391777467864222183749369454841416502
             IssuerDN: UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 17 23:29:13 UTC 2021
           Final Date: Sat May 17 23:29:13 UTC 2031
            SubjectDN: UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [68:51:21:4f:e8:24:a2:a9:36:fd:98:ce:ce:ca:19:16:08:53:2d:c6]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 417c3c51b74b45abea570150ab72a3baceb70433
                       10930dcfb4f89f726a8d11245c49066eca12ec67
                       073c38287d5844f60b7b3230d400512cbb4bbdd4
                       28696098edd36e1a6ea72c6671dad8e7b31c7edf
                       6cbde56539860fc6adb9b4db2969fbd1c5b72980
                       b619bb40f8d1fc8546fdc13feb7024de99129ca7
                       c0c43fbb73e98aaa28c36e94695d76f868cd0e2e
                       556ee7601144b40df1c99384b1ca92c43e3f8c8a
                       48007a6794f111b9b6d912747c2c0cc12c2303a1
                       6b36683c434a256e7aded79a34b7e8b2a6a2a3e9
                       90a26151d7338348d172acc0ae42ca1b13bb5548
                       733fd64e64aef2ed0fc4426bcc6b27ebedb6cf11
                       4afe23f18eaa8e299ee1a7aa5f9766fcf9a37cd1
                       6774863ab556fe3824338591d8ec081b53388de4
                       e73b9fd43b30b813964d5c22437eac8d2b5aefc4
                       a8d92a5150316dee93f70ce7104293baeb6b835c
                       b25e7f7d7946f27caff7f81ee9048e18a93f8eaa
                       b7873036d88efb936eff32fc63c7b6cc2334e45b
                       2dc41e0b3602da04657a8f11e1b0cacc63792e73
                       2b21de0c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [59:8d:d4:79:fd:a2:43:1b:c1:4f:31:f2:4c:fa:dd:68:67:5e:d3:4a]
            modulus: 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
    public exponent: 10001

] 
2021-05-18 00:41:18.658  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-18 00:41:18.659 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-18 00:41:18.660 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-18 00:41:18.661 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-18 00:41:18.661  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-18 00:41:18.661  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-18 00:41:18.662  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-18 00:41:18.662  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-18 00:41:18.663  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-18 00:41:18.668  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-18 00:41:18.668  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-18 00:41:18.668  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-18 00:41:18.671  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-18 00:41:18.771  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-18 00:41:18.773  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-18 00:41:18.774 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-18 00:41:18.776 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-18 00:41:18.777  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1775
2021-05-18 00:41:18.777  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-18 00:41:18.780  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-18 00:41:18.781  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-18 00:41:18.781  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-18 00:41:18.781  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-18 00:41:18.782 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-18 00:41:18.782 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-18 00:41:18.782 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-18 00:41:18.783 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-18 00:41:18.783 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-18 00:41:18.783 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-18 00:41:18.784 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-18 00:41:18.868 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 120934503834391777467864222183749369454841416502
             IssuerDN: UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 17 23:29:13 UTC 2021
           Final Date: Sat May 17 23:29:13 UTC 2031
            SubjectDN: UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [68:51:21:4f:e8:24:a2:a9:36:fd:98:ce:ce:ca:19:16:08:53:2d:c6]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 417c3c51b74b45abea570150ab72a3baceb70433
                       10930dcfb4f89f726a8d11245c49066eca12ec67
                       073c38287d5844f60b7b3230d400512cbb4bbdd4
                       28696098edd36e1a6ea72c6671dad8e7b31c7edf
                       6cbde56539860fc6adb9b4db2969fbd1c5b72980
                       b619bb40f8d1fc8546fdc13feb7024de99129ca7
                       c0c43fbb73e98aaa28c36e94695d76f868cd0e2e
                       556ee7601144b40df1c99384b1ca92c43e3f8c8a
                       48007a6794f111b9b6d912747c2c0cc12c2303a1
                       6b36683c434a256e7aded79a34b7e8b2a6a2a3e9
                       90a26151d7338348d172acc0ae42ca1b13bb5548
                       733fd64e64aef2ed0fc4426bcc6b27ebedb6cf11
                       4afe23f18eaa8e299ee1a7aa5f9766fcf9a37cd1
                       6774863ab556fe3824338591d8ec081b53388de4
                       e73b9fd43b30b813964d5c22437eac8d2b5aefc4
                       a8d92a5150316dee93f70ce7104293baeb6b835c
                       b25e7f7d7946f27caff7f81ee9048e18a93f8eaa
                       b7873036d88efb936eff32fc63c7b6cc2334e45b
                       2dc41e0b3602da04657a8f11e1b0cacc63792e73
                       2b21de0c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [02:e4:04:36:04:3e:59:17:8c:59:b3:44:d0:6e:7e:1f:7b:ea:24:fc]
            modulus: 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
    public exponent: 10001

] 
2021-05-18 00:41:53.693  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-18 00:41:53.694 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-18 00:41:53.695 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-18 00:41:53.696 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-18 00:41:53.696  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-18 00:41:53.697  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-18 00:41:53.697  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-18 00:41:53.698  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-18 00:41:53.698  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-18 00:41:53.703  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-18 00:41:53.704  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-18 00:41:53.704  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-18 00:41:53.705  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-18 00:41:53.864  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-18 00:41:53.865  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-18 00:41:53.865 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-18 00:41:53.867 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-18 00:41:53.868  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1775
2021-05-18 00:41:53.868  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-18 00:41:53.870  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-18 00:41:53.871  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-18 00:41:53.871  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-18 00:41:53.872  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-18 00:41:53.872 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-18 00:41:53.872 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-18 00:41:53.872 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-18 00:41:53.876 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-18 00:41:53.877 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-18 00:41:53.877 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-18 00:41:53.878 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-18 00:41:53.880 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 120934503834391777467864222183749369454841416502
             IssuerDN: UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 17 23:29:13 UTC 2021
           Final Date: Sat May 17 23:29:13 UTC 2031
            SubjectDN: UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [68:51:21:4f:e8:24:a2:a9:36:fd:98:ce:ce:ca:19:16:08:53:2d:c6]
            modulus: caee18cb9eaef7a8ffdfdb18607509f6e1932f1b06ce19981640d7f6b97150f4e6218f9ad8ad76c3afaa06f0b46dffe5f47446d7d990e32e5c272c8f5dc92236edfec722d306e59a7b010cd77cff49df62f83617eab846564e959716c0c2274ac30376b26c2e97604ec720b2eee48267faf6ce75a15bd5ad3ba374ae62c6be5e52f3e3935b5c5389dadca9bb3938bf955c33f3e1c8bfe1b78b8604094bfc7a2992dcf684c9d5f4512da19a40bc83c58c5ad8a143636d9e01a15419faf5d217e26e6d39ff08af206205430805e93cf7a74dbeabca5af8a3f2b71122d5c622438c7e4603b646e733abfb9c950731cb34d3bcdcb22ab76b0b6f3fdc0857e1576b0fe9f4a9a2a8556da863f51e1f08793bcec1f0d0239e508ac750a7155b85d85903bee166e7a40cd933143717dd34ffac8f2f0ee39e8006355d1f3535562670d48a7223c060cfb169580a1f7011f07370f0aa625b8b98dd0ee1810435b45566b82d3db22846366473944ef25ae9a6001c247f20f435a3a57510ad0dd387d7651a8f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 417c3c51b74b45abea570150ab72a3baceb70433
                       10930dcfb4f89f726a8d11245c49066eca12ec67
                       073c38287d5844f60b7b3230d400512cbb4bbdd4
                       28696098edd36e1a6ea72c6671dad8e7b31c7edf
                       6cbde56539860fc6adb9b4db2969fbd1c5b72980
                       b619bb40f8d1fc8546fdc13feb7024de99129ca7
                       c0c43fbb73e98aaa28c36e94695d76f868cd0e2e
                       556ee7601144b40df1c99384b1ca92c43e3f8c8a
                       48007a6794f111b9b6d912747c2c0cc12c2303a1
                       6b36683c434a256e7aded79a34b7e8b2a6a2a3e9
                       90a26151d7338348d172acc0ae42ca1b13bb5548
                       733fd64e64aef2ed0fc4426bcc6b27ebedb6cf11
                       4afe23f18eaa8e299ee1a7aa5f9766fcf9a37cd1
                       6774863ab556fe3824338591d8ec081b53388de4
                       e73b9fd43b30b813964d5c22437eac8d2b5aefc4
                       a8d92a5150316dee93f70ce7104293baeb6b835c
                       b25e7f7d7946f27caff7f81ee9048e18a93f8eaa
                       b7873036d88efb936eff32fc63c7b6cc2334e45b
                       2dc41e0b3602da04657a8f11e1b0cacc63792e73
                       2b21de0c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9e:87:a3:32:90:9b:b9:b8:d6:2c:24:d6:03:e8:f6:ee:d7:fa:43:d0]
            modulus: 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
    public exponent: 10001

] 
2021-05-18 00:41:56.849  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-18 00:41:56.850 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-18 00:41:56.851 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-18 00:41:56.852 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-18 00:41:56.852  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-18 00:41:56.853  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-18 00:41:56.853  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-18 00:41:56.853  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-18 00:41:56.853  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-18 00:41:56.857  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-18 00:41:56.858  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-18 00:41:56.858  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-18 00:41:56.859  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-18 00:41:56.908  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-18 00:41:56.909  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-18 00:41:56.909 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-18 00:41:56.910 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-18 00:41:56.911  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1775
2021-05-18 00:41:56.911  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-18 00:41:56.913  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-18 00:41:56.913  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-18 00:41:56.913  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-18 00:41:56.914  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-18 00:41:56.914 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-18 00:41:56.914 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-18 00:41:56.915 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-18 00:41:56.915 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-18 00:41:56.916 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-18 00:41:56.916 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-18 00:41:56.916 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-18 00:41:56.970 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 120934503834391777467864222183749369454841416502
             IssuerDN: UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 17 23:29:13 UTC 2021
           Final Date: Sat May 17 23:29:13 UTC 2031
            SubjectDN: UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [68:51:21:4f:e8:24:a2:a9:36:fd:98:ce:ce:ca:19:16:08:53:2d:c6]
            modulus: caee18cb9eaef7a8ffdfdb18607509f6e1932f1b06ce19981640d7f6b97150f4e6218f9ad8ad76c3afaa06f0b46dffe5f47446d7d990e32e5c272c8f5dc92236edfec722d306e59a7b010cd77cff49df62f83617eab846564e959716c0c2274ac30376b26c2e97604ec720b2eee48267faf6ce75a15bd5ad3ba374ae62c6be5e52f3e3935b5c5389dadca9bb3938bf955c33f3e1c8bfe1b78b8604094bfc7a2992dcf684c9d5f4512da19a40bc83c58c5ad8a143636d9e01a15419faf5d217e26e6d39ff08af206205430805e93cf7a74dbeabca5af8a3f2b71122d5c622438c7e4603b646e733abfb9c950731cb34d3bcdcb22ab76b0b6f3fdc0857e1576b0fe9f4a9a2a8556da863f51e1f08793bcec1f0d0239e508ac750a7155b85d85903bee166e7a40cd933143717dd34ffac8f2f0ee39e8006355d1f3535562670d48a7223c060cfb169580a1f7011f07370f0aa625b8b98dd0ee1810435b45566b82d3db22846366473944ef25ae9a6001c247f20f435a3a57510ad0dd387d7651a8f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 417c3c51b74b45abea570150ab72a3baceb70433
                       10930dcfb4f89f726a8d11245c49066eca12ec67
                       073c38287d5844f60b7b3230d400512cbb4bbdd4
                       28696098edd36e1a6ea72c6671dad8e7b31c7edf
                       6cbde56539860fc6adb9b4db2969fbd1c5b72980
                       b619bb40f8d1fc8546fdc13feb7024de99129ca7
                       c0c43fbb73e98aaa28c36e94695d76f868cd0e2e
                       556ee7601144b40df1c99384b1ca92c43e3f8c8a
                       48007a6794f111b9b6d912747c2c0cc12c2303a1
                       6b36683c434a256e7aded79a34b7e8b2a6a2a3e9
                       90a26151d7338348d172acc0ae42ca1b13bb5548
                       733fd64e64aef2ed0fc4426bcc6b27ebedb6cf11
                       4afe23f18eaa8e299ee1a7aa5f9766fcf9a37cd1
                       6774863ab556fe3824338591d8ec081b53388de4
                       e73b9fd43b30b813964d5c22437eac8d2b5aefc4
                       a8d92a5150316dee93f70ce7104293baeb6b835c
                       b25e7f7d7946f27caff7f81ee9048e18a93f8eaa
                       b7873036d88efb936eff32fc63c7b6cc2334e45b
                       2dc41e0b3602da04657a8f11e1b0cacc63792e73
                       2b21de0c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3b:22:62:e7:40:cd:b1:a6:6a:7b:78:90:c4:be:85:e3:e6:21:f7:e2]
            modulus: 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
    public exponent: 10001

] 
2021-05-18 00:43:00.432  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-18 00:43:00.434 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-18 00:43:00.435 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-18 00:43:00.436 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-18 00:43:00.436  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-18 00:43:00.437  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-18 00:43:00.437  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-18 00:43:00.437  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-18 00:43:00.438  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-18 00:43:00.442  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-18 00:43:00.443  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-18 00:43:00.443  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-18 00:43:00.445  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-18 00:43:00.561  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-18 00:43:00.567  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-18 00:43:00.568 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-18 00:43:00.570 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-18 00:43:00.571  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1775
2021-05-18 00:43:00.572  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-18 00:43:00.575  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-18 00:43:00.576  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-18 00:43:00.577  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-18 00:43:00.577  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-18 00:43:00.577 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-18 00:43:00.578 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-18 00:43:00.578 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-18 00:43:00.579 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-18 00:43:00.579 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-18 00:43:00.580 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-18 00:43:00.581 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-18 00:43:00.584 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 120934503834391777467864222183749369454841416502
             IssuerDN: UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 17 23:29:13 UTC 2021
           Final Date: Sat May 17 23:29:13 UTC 2031
            SubjectDN: UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [68:51:21:4f:e8:24:a2:a9:36:fd:98:ce:ce:ca:19:16:08:53:2d:c6]
            modulus: caee18cb9eaef7a8ffdfdb18607509f6e1932f1b06ce19981640d7f6b97150f4e6218f9ad8ad76c3afaa06f0b46dffe5f47446d7d990e32e5c272c8f5dc92236edfec722d306e59a7b010cd77cff49df62f83617eab846564e959716c0c2274ac30376b26c2e97604ec720b2eee48267faf6ce75a15bd5ad3ba374ae62c6be5e52f3e3935b5c5389dadca9bb3938bf955c33f3e1c8bfe1b78b8604094bfc7a2992dcf684c9d5f4512da19a40bc83c58c5ad8a143636d9e01a15419faf5d217e26e6d39ff08af206205430805e93cf7a74dbeabca5af8a3f2b71122d5c622438c7e4603b646e733abfb9c950731cb34d3bcdcb22ab76b0b6f3fdc0857e1576b0fe9f4a9a2a8556da863f51e1f08793bcec1f0d0239e508ac750a7155b85d85903bee166e7a40cd933143717dd34ffac8f2f0ee39e8006355d1f3535562670d48a7223c060cfb169580a1f7011f07370f0aa625b8b98dd0ee1810435b45566b82d3db22846366473944ef25ae9a6001c247f20f435a3a57510ad0dd387d7651a8f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 417c3c51b74b45abea570150ab72a3baceb70433
                       10930dcfb4f89f726a8d11245c49066eca12ec67
                       073c38287d5844f60b7b3230d400512cbb4bbdd4
                       28696098edd36e1a6ea72c6671dad8e7b31c7edf
                       6cbde56539860fc6adb9b4db2969fbd1c5b72980
                       b619bb40f8d1fc8546fdc13feb7024de99129ca7
                       c0c43fbb73e98aaa28c36e94695d76f868cd0e2e
                       556ee7601144b40df1c99384b1ca92c43e3f8c8a
                       48007a6794f111b9b6d912747c2c0cc12c2303a1
                       6b36683c434a256e7aded79a34b7e8b2a6a2a3e9
                       90a26151d7338348d172acc0ae42ca1b13bb5548
                       733fd64e64aef2ed0fc4426bcc6b27ebedb6cf11
                       4afe23f18eaa8e299ee1a7aa5f9766fcf9a37cd1
                       6774863ab556fe3824338591d8ec081b53388de4
                       e73b9fd43b30b813964d5c22437eac8d2b5aefc4
                       a8d92a5150316dee93f70ce7104293baeb6b835c
                       b25e7f7d7946f27caff7f81ee9048e18a93f8eaa
                       b7873036d88efb936eff32fc63c7b6cc2334e45b
                       2dc41e0b3602da04657a8f11e1b0cacc63792e73
                       2b21de0c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0e:c1:f0:e6:f7:c3:55:a6:68:38:bd:68:f0:a0:e1:f8:59:02:57:79]
            modulus: 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
    public exponent: 10001

] 
2021-05-18 00:44:12.610  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-18 00:44:12.668 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-18 00:44:12.669 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-18 00:44:12.670 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-18 00:44:12.670  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-18 00:44:12.671  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-18 00:44:12.671  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-18 00:44:12.672  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-18 00:44:12.672  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-18 00:44:12.676  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-18 00:44:12.677  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-18 00:44:12.677  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-18 00:44:12.678  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-18 00:44:12.778  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-18 00:44:12.779  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-18 00:44:12.779 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-18 00:44:12.780 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-18 00:44:12.780  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1775
2021-05-18 00:44:12.780  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-18 00:44:12.781  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-18 00:44:12.782  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-18 00:44:12.782  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-18 00:44:12.782  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-18 00:44:12.782 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-18 00:44:12.783 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-18 00:44:12.783 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-18 00:44:12.783 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-18 00:44:12.783 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-18 00:44:12.784 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-18 00:44:12.784 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-18 00:44:12.871 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 120934503834391777467864222183749369454841416502
             IssuerDN: UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 17 23:29:13 UTC 2021
           Final Date: Sat May 17 23:29:13 UTC 2031
            SubjectDN: UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [68:51:21:4f:e8:24:a2:a9:36:fd:98:ce:ce:ca:19:16:08:53:2d:c6]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 417c3c51b74b45abea570150ab72a3baceb70433
                       10930dcfb4f89f726a8d11245c49066eca12ec67
                       073c38287d5844f60b7b3230d400512cbb4bbdd4
                       28696098edd36e1a6ea72c6671dad8e7b31c7edf
                       6cbde56539860fc6adb9b4db2969fbd1c5b72980
                       b619bb40f8d1fc8546fdc13feb7024de99129ca7
                       c0c43fbb73e98aaa28c36e94695d76f868cd0e2e
                       556ee7601144b40df1c99384b1ca92c43e3f8c8a
                       48007a6794f111b9b6d912747c2c0cc12c2303a1
                       6b36683c434a256e7aded79a34b7e8b2a6a2a3e9
                       90a26151d7338348d172acc0ae42ca1b13bb5548
                       733fd64e64aef2ed0fc4426bcc6b27ebedb6cf11
                       4afe23f18eaa8e299ee1a7aa5f9766fcf9a37cd1
                       6774863ab556fe3824338591d8ec081b53388de4
                       e73b9fd43b30b813964d5c22437eac8d2b5aefc4
                       a8d92a5150316dee93f70ce7104293baeb6b835c
                       b25e7f7d7946f27caff7f81ee9048e18a93f8eaa
                       b7873036d88efb936eff32fc63c7b6cc2334e45b
                       2dc41e0b3602da04657a8f11e1b0cacc63792e73
                       2b21de0c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ab:ac:80:29:b2:cd:7c:a0:7f:d5:fa:45:88:77:89:06:7e:c2:69:79]
            modulus: 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
    public exponent: 10001

] 
2021-05-18 00:48:16.107  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-18 00:48:16.109 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-18 00:48:16.111 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-18 00:48:16.112 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-18 00:48:16.112  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-18 00:48:16.113  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-18 00:48:16.113  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-18 00:48:16.114  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-18 00:48:16.114  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-18 00:48:16.120  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-18 00:48:16.121  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-18 00:48:16.122  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-18 00:48:16.123  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-18 00:48:16.237  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-18 00:48:16.238  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-18 00:48:16.268 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-18 00:48:16.271 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-18 00:48:16.272  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1775
2021-05-18 00:48:16.272  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-18 00:48:16.275  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-18 00:48:16.276  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-18 00:48:16.276  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-18 00:48:16.277  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-18 00:48:16.277 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-18 00:48:16.277 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-18 00:48:16.278 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-18 00:48:16.278 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-18 00:48:16.278 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-18 00:48:16.279 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-18 00:48:16.279 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-18 00:48:16.282 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 120934503834391777467864222183749369454841416502
             IssuerDN: UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 17 23:29:13 UTC 2021
           Final Date: Sat May 17 23:29:13 UTC 2031
            SubjectDN: UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [68:51:21:4f:e8:24:a2:a9:36:fd:98:ce:ce:ca:19:16:08:53:2d:c6]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 417c3c51b74b45abea570150ab72a3baceb70433
                       10930dcfb4f89f726a8d11245c49066eca12ec67
                       073c38287d5844f60b7b3230d400512cbb4bbdd4
                       28696098edd36e1a6ea72c6671dad8e7b31c7edf
                       6cbde56539860fc6adb9b4db2969fbd1c5b72980
                       b619bb40f8d1fc8546fdc13feb7024de99129ca7
                       c0c43fbb73e98aaa28c36e94695d76f868cd0e2e
                       556ee7601144b40df1c99384b1ca92c43e3f8c8a
                       48007a6794f111b9b6d912747c2c0cc12c2303a1
                       6b36683c434a256e7aded79a34b7e8b2a6a2a3e9
                       90a26151d7338348d172acc0ae42ca1b13bb5548
                       733fd64e64aef2ed0fc4426bcc6b27ebedb6cf11
                       4afe23f18eaa8e299ee1a7aa5f9766fcf9a37cd1
                       6774863ab556fe3824338591d8ec081b53388de4
                       e73b9fd43b30b813964d5c22437eac8d2b5aefc4
                       a8d92a5150316dee93f70ce7104293baeb6b835c
                       b25e7f7d7946f27caff7f81ee9048e18a93f8eaa
                       b7873036d88efb936eff32fc63c7b6cc2334e45b
                       2dc41e0b3602da04657a8f11e1b0cacc63792e73
                       2b21de0c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cd:cd:dc:fb:23:b9:8d:48:c3:91:28:3d:da:ef:b8:c6:57:cc:cf:8a]
            modulus: 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
    public exponent: 10001

] 
2021-05-18 00:51:14.464  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-18 00:51:14.465 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-18 00:51:14.467 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-18 00:51:14.467 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-18 00:51:14.468  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-18 00:51:14.468  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-18 00:51:14.469  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-18 00:51:14.469  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-18 00:51:14.469  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-18 00:51:14.478  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-18 00:51:14.478  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-18 00:51:14.479  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-18 00:51:14.480  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-18 00:51:14.575  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-18 00:51:14.576  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-18 00:51:14.576 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-18 00:51:14.579 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-18 00:51:14.579  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1775
2021-05-18 00:51:14.580  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-18 00:51:14.582  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-18 00:51:14.582  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-18 00:51:14.583  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-18 00:51:14.583  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-18 00:51:14.583 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-18 00:51:14.583 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-18 00:51:14.584 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-18 00:51:14.585 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-18 00:51:14.585 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-18 00:51:14.585 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-18 00:51:14.586 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-18 00:51:14.590 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 120934503834391777467864222183749369454841416502
             IssuerDN: UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 17 23:29:13 UTC 2021
           Final Date: Sat May 17 23:29:13 UTC 2031
            SubjectDN: UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [68:51:21:4f:e8:24:a2:a9:36:fd:98:ce:ce:ca:19:16:08:53:2d:c6]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 417c3c51b74b45abea570150ab72a3baceb70433
                       10930dcfb4f89f726a8d11245c49066eca12ec67
                       073c38287d5844f60b7b3230d400512cbb4bbdd4
                       28696098edd36e1a6ea72c6671dad8e7b31c7edf
                       6cbde56539860fc6adb9b4db2969fbd1c5b72980
                       b619bb40f8d1fc8546fdc13feb7024de99129ca7
                       c0c43fbb73e98aaa28c36e94695d76f868cd0e2e
                       556ee7601144b40df1c99384b1ca92c43e3f8c8a
                       48007a6794f111b9b6d912747c2c0cc12c2303a1
                       6b36683c434a256e7aded79a34b7e8b2a6a2a3e9
                       90a26151d7338348d172acc0ae42ca1b13bb5548
                       733fd64e64aef2ed0fc4426bcc6b27ebedb6cf11
                       4afe23f18eaa8e299ee1a7aa5f9766fcf9a37cd1
                       6774863ab556fe3824338591d8ec081b53388de4
                       e73b9fd43b30b813964d5c22437eac8d2b5aefc4
                       a8d92a5150316dee93f70ce7104293baeb6b835c
                       b25e7f7d7946f27caff7f81ee9048e18a93f8eaa
                       b7873036d88efb936eff32fc63c7b6cc2334e45b
                       2dc41e0b3602da04657a8f11e1b0cacc63792e73
                       2b21de0c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ca:b9:82:ce:3b:a1:92:95:95:80:cd:e4:db:6b:0b:8f:be:db:ca:1e]
            modulus: 9fc8b2d15c7358ce40b01f9399b3cc1e6a930dbd1dfb98518b8c3345f04f285a1f45b7c6d3d78272f5e4d6f4d8d1361a80722bb8f3befa2a884735a656f9c4dbce339d721673410272cce7917f65071c51eaa5ed4c8b416f93bf9be9666bf74747c971909d605a073cc94b86ba6e4c8dc93c6d13c8a592de71332d671121fc85dcfe04afe2a69661cf7fa02ae82ce1aeeeca8c4f04783f5eb0b6fa148dc5bc82f4bc9b93c7d10b6c0d51e12a07fb4c2e0b45c10b9951b1cb6be964a97b81be8a6c3f6d7f810004912f87fae677b674c21b43d0047eb64310e169cc1b38830a89c8962337b86cbb968d623621c6ea94b97d5cac1a1f16bf9ece1e9d7df0bab149
    public exponent: 10001

] 
2021-05-18 00:53:14.139  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-18 00:53:14.141 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-18 00:53:14.144 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-18 00:53:14.145 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-18 00:53:14.145  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-18 00:53:14.146  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-18 00:53:14.146  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-18 00:53:14.146  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-18 00:53:14.147  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-18 00:53:14.169  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-18 00:53:14.170  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-18 00:53:14.170  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-18 00:53:14.173  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-18 00:53:14.248  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-18 00:53:14.248  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-18 00:53:14.249 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-18 00:53:14.267 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-18 00:53:14.269  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1775
2021-05-18 00:53:14.269  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-18 00:53:14.273  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-18 00:53:14.273  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-18 00:53:14.274  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-18 00:53:14.275  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-18 00:53:14.275 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-18 00:53:14.276 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-18 00:53:14.276 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-18 00:53:14.277 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-18 00:53:14.277 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-18 00:53:14.277 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-18 00:53:14.278 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-18 00:53:14.280 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 120934503834391777467864222183749369454841416502
             IssuerDN: UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 17 23:29:13 UTC 2021
           Final Date: Sat May 17 23:29:13 UTC 2031
            SubjectDN: UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [68:51:21:4f:e8:24:a2:a9:36:fd:98:ce:ce:ca:19:16:08:53:2d:c6]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 417c3c51b74b45abea570150ab72a3baceb70433
                       10930dcfb4f89f726a8d11245c49066eca12ec67
                       073c38287d5844f60b7b3230d400512cbb4bbdd4
                       28696098edd36e1a6ea72c6671dad8e7b31c7edf
                       6cbde56539860fc6adb9b4db2969fbd1c5b72980
                       b619bb40f8d1fc8546fdc13feb7024de99129ca7
                       c0c43fbb73e98aaa28c36e94695d76f868cd0e2e
                       556ee7601144b40df1c99384b1ca92c43e3f8c8a
                       48007a6794f111b9b6d912747c2c0cc12c2303a1
                       6b36683c434a256e7aded79a34b7e8b2a6a2a3e9
                       90a26151d7338348d172acc0ae42ca1b13bb5548
                       733fd64e64aef2ed0fc4426bcc6b27ebedb6cf11
                       4afe23f18eaa8e299ee1a7aa5f9766fcf9a37cd1
                       6774863ab556fe3824338591d8ec081b53388de4
                       e73b9fd43b30b813964d5c22437eac8d2b5aefc4
                       a8d92a5150316dee93f70ce7104293baeb6b835c
                       b25e7f7d7946f27caff7f81ee9048e18a93f8eaa
                       b7873036d88efb936eff32fc63c7b6cc2334e45b
                       2dc41e0b3602da04657a8f11e1b0cacc63792e73
                       2b21de0c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [43:6e:9f:a5:38:9b:1d:fb:50:68:4c:33:76:f2:a1:cd:e2:42:e0:c5]
            modulus: 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
    public exponent: 10001

] 
2021-05-18 00:54:40.198  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-18 00:54:40.199 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-18 00:54:40.201 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-18 00:54:40.202 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-18 00:54:40.202  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-18 00:54:40.203  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-18 00:54:40.203  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-18 00:54:40.203  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-18 00:54:40.204  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-18 00:54:40.209  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-18 00:54:40.210  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-18 00:54:40.210  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-18 00:54:40.211  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-18 00:54:40.303  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-18 00:54:40.304  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-18 00:54:40.304 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-18 00:54:40.306 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-18 00:54:40.307  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1775
2021-05-18 00:54:40.307  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-18 00:54:40.310  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-18 00:54:40.368  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-18 00:54:40.368  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-18 00:54:40.369  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-18 00:54:40.369 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-18 00:54:40.369 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-18 00:54:40.369 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-18 00:54:40.370 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-18 00:54:40.370 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-18 00:54:40.371 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-18 00:54:40.371 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-18 00:54:40.374 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 120934503834391777467864222183749369454841416502
             IssuerDN: UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 17 23:29:13 UTC 2021
           Final Date: Sat May 17 23:29:13 UTC 2031
            SubjectDN: UID=c-0885d129a06ae161c,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [68:51:21:4f:e8:24:a2:a9:36:fd:98:ce:ce:ca:19:16:08:53:2d:c6]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 417c3c51b74b45abea570150ab72a3baceb70433
                       10930dcfb4f89f726a8d11245c49066eca12ec67
                       073c38287d5844f60b7b3230d400512cbb4bbdd4
                       28696098edd36e1a6ea72c6671dad8e7b31c7edf
                       6cbde56539860fc6adb9b4db2969fbd1c5b72980
                       b619bb40f8d1fc8546fdc13feb7024de99129ca7
                       c0c43fbb73e98aaa28c36e94695d76f868cd0e2e
                       556ee7601144b40df1c99384b1ca92c43e3f8c8a
                       48007a6794f111b9b6d912747c2c0cc12c2303a1
                       6b36683c434a256e7aded79a34b7e8b2a6a2a3e9
                       90a26151d7338348d172acc0ae42ca1b13bb5548
                       733fd64e64aef2ed0fc4426bcc6b27ebedb6cf11
                       4afe23f18eaa8e299ee1a7aa5f9766fcf9a37cd1
                       6774863ab556fe3824338591d8ec081b53388de4
                       e73b9fd43b30b813964d5c22437eac8d2b5aefc4
                       a8d92a5150316dee93f70ce7104293baeb6b835c
                       b25e7f7d7946f27caff7f81ee9048e18a93f8eaa
                       b7873036d88efb936eff32fc63c7b6cc2334e45b
                       2dc41e0b3602da04657a8f11e1b0cacc63792e73
                       2b21de0c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5a:fb:f9:66:a6:30:03:79:ac:87:c9:de:2c:52:a1:ef:7d:21:d8:55]
            modulus: 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
    public exponent: 10001

]