Results

By type

          2021-05-30 23:21:57,317 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-05-30 23:22:00,709 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-05-30 23:22:03.508  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-05-30 23:22:13.816 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-05-30 23:22:14.925  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-05-30 23:22:15.718  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-05-30 23:22:28.512  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 33.396 seconds (JVM running for 40.418)
2021-05-30 23:25:44.020  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-30 23:25:44.113 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-30 23:25:44.312 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-30 23:25:44.316 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-30 23:25:44.413  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-30 23:25:44.416  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-30 23:25:44.421  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-30 23:25:44.421  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 23:25:44.422  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-30 23:25:44.429  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-30 23:25:44.507  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-30 23:25:44.614  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-30 23:25:44.619  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 23:25:44.620  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 23:25:44.713  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-30 23:25:46.219  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-30 23:25:46.222  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-30 23:25:46.223 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-30 23:25:46.307 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-30 23:25:46.308  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1996
2021-05-30 23:25:46.309  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-30 23:25:46.313  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-30 23:25:46.314  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-30 23:25:46.320  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-30 23:25:46.320  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-30 23:25:46.321 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 23:25:46.322 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 23:25:46.322 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 23:25:46.414 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 23:25:46.415 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 23:25:46.415 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 23:25:46.422 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-30 23:25:46.529 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 115904390998612887829638467990041699156788322695
             IssuerDN: UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 30 23:18:05 UTC 2021
           Final Date: Fri May 30 23:18:05 UTC 2031
            SubjectDN: UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [34:1c:d1:f6:1b:35:33:7c:6d:80:d8:18:97:77:20:54:14:3f:fb:cc]
            modulus: dcff0ba8f12c89eaf3f8fd10c7770a4e0cf207211a907256a883530af24b2e5fd5d332f8c67b2c7e74280f614655895899a72eb7a84d48915dfebf93931c3260953b3c03b80c4c7220af58e464e8a0bb4799500acea4a3875d2254757ceba7ae0248e490050f3d127ddd328cb0acc37300fda6b15f1ede2ff0aa6b0d5cf1eae19f40c1277e9a57f1258f695d64101aff46edf04e83e9996744729db577421e424565ff6d1b2785d2bc3ed6a25c75e833a7a835f07fbcf6f149af9b7fcf1dd2de7f6ffbaefb20c2b084dd1eade429cfa571146d29da682722355ce138deda37f482ea51c71b1e1cbb3cec967c32105208ad2feee484c8e2b509b5e8e5965dfe7373004ed4b7e56d4e6688f8fa8887860b9ada3e7e17e8120decad51b145ecd6172f10531af67a68415880c0d94d3f37d4d2b8fbb8e2a3cb924a7290a60f7f64faa65ab3a90f6a530be2f9a8c4bc333098c220501ecf7acaadd1b13ab7db07f9317b9a7e734cc161b286031f6557ca62ffb909f91a3701457c52361529117f9ee5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3abbff900bfc28c4116a6b7bc2b9feac46fa354a
                       0f5b5eec2157a3d1beb9325d49f789245d253539
                       409d6339dfd56bff16eb6217548045b227732dec
                       02f7a4dce5d620c927ce1f2d46632478fcba668d
                       01208de2e18014ec923bacb7cbba42662429f40b
                       36031b4bcee93caf34525a7e7bb2ea14795e61eb
                       baaae0940711804e7a86977daf3dd76f57479711
                       2ebd9866af6794b7389ea6bbb020a740df8ab10f
                       2a998b9a2d5d5535b68313a3ac3d290beffef140
                       851cf1c09f3d94f908c04cfbda7f505d7ee0b9a7
                       d4e46fac12954ef56fb28e912ba04461fc3598d4
                       d096a611fbf1dfd6336b64be1382e4434196b39e
                       e58c650ea7726656bc194513a464154585b80659
                       22938baf77c866018b58d4aded3f60cd0a44e041
                       da70cb1cf02d04602fda107be07e84e8f62643e8
                       bd2fbee8d042deef9aeb7da2e2c3c87f94798351
                       ea2b946bc9479ec547ac3b16d3d4448ce8ceff79
                       2044af3e05eb38bb96dadd8b924f034fec4bd75e
                       a6f97c8533191c339d42b2f8639b5d50e2a4413f
                       87e52cdb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [91:00:e8:9b:48:c5:bc:2b:3c:a0:26:2a:51:07:9d:45:bb:0f:76:19]
            modulus: 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
    public exponent: 10001

] 
2021-05-31 01:26:26.783  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-31 01:26:26.785 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-31 01:26:26.787 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-31 01:26:26.787 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-31 01:26:26.788  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-31 01:26:26.789  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-31 01:26:26.790  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-31 01:26:26.790  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-31 01:26:26.791  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-31 01:26:26.797  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-31 01:26:26.804  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 01:26:26.805  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 01:26:26.808  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-31 01:26:26.922  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-31 01:26:26.923  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-31 01:26:26.923 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-31 01:26:26.926 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-31 01:26:26.927  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1996
2021-05-31 01:26:26.927  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-31 01:26:26.930  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-31 01:26:26.930  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-31 01:26:26.931  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-31 01:26:26.931  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-31 01:26:26.931 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 01:26:26.932 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 01:26:26.932 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 01:26:26.933 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 01:26:26.934 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 01:26:26.934 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 01:26:27.004 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-31 01:26:27.011 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 115904390998612887829638467990041699156788322695
             IssuerDN: UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 30 23:18:05 UTC 2021
           Final Date: Fri May 30 23:18:05 UTC 2031
            SubjectDN: UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [34:1c:d1:f6:1b:35:33:7c:6d:80:d8:18:97:77:20:54:14:3f:fb:cc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3abbff900bfc28c4116a6b7bc2b9feac46fa354a
                       0f5b5eec2157a3d1beb9325d49f789245d253539
                       409d6339dfd56bff16eb6217548045b227732dec
                       02f7a4dce5d620c927ce1f2d46632478fcba668d
                       01208de2e18014ec923bacb7cbba42662429f40b
                       36031b4bcee93caf34525a7e7bb2ea14795e61eb
                       baaae0940711804e7a86977daf3dd76f57479711
                       2ebd9866af6794b7389ea6bbb020a740df8ab10f
                       2a998b9a2d5d5535b68313a3ac3d290beffef140
                       851cf1c09f3d94f908c04cfbda7f505d7ee0b9a7
                       d4e46fac12954ef56fb28e912ba04461fc3598d4
                       d096a611fbf1dfd6336b64be1382e4434196b39e
                       e58c650ea7726656bc194513a464154585b80659
                       22938baf77c866018b58d4aded3f60cd0a44e041
                       da70cb1cf02d04602fda107be07e84e8f62643e8
                       bd2fbee8d042deef9aeb7da2e2c3c87f94798351
                       ea2b946bc9479ec547ac3b16d3d4448ce8ceff79
                       2044af3e05eb38bb96dadd8b924f034fec4bd75e
                       a6f97c8533191c339d42b2f8639b5d50e2a4413f
                       87e52cdb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ea:7d:c3:c0:9c:17:16:36:36:34:2b:89:56:5a:a6:38:25:b5:14:c7]
            modulus: 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
    public exponent: 10001

] 
2021-05-31 01:27:48.452  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-31 01:27:48.453 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-31 01:27:48.454 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-31 01:27:48.455 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-31 01:27:48.456  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-31 01:27:48.456  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-31 01:27:48.457  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-31 01:27:48.457  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-31 01:27:48.457  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-31 01:27:48.467  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-31 01:27:48.467  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 01:27:48.467  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 01:27:48.505  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-31 01:27:48.592  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-31 01:27:48.604  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-31 01:27:48.605 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-31 01:27:48.607 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-31 01:27:48.607  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1996
2021-05-31 01:27:48.608  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-31 01:27:48.611  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-31 01:27:48.611  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-31 01:27:48.612  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-31 01:27:48.612  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-31 01:27:48.613 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 01:27:48.613 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 01:27:48.613 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 01:27:48.614 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 01:27:48.614 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 01:27:48.615 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 01:27:48.616 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-31 01:27:48.621 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 115904390998612887829638467990041699156788322695
             IssuerDN: UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 30 23:18:05 UTC 2021
           Final Date: Fri May 30 23:18:05 UTC 2031
            SubjectDN: UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [34:1c:d1:f6:1b:35:33:7c:6d:80:d8:18:97:77:20:54:14:3f:fb:cc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3abbff900bfc28c4116a6b7bc2b9feac46fa354a
                       0f5b5eec2157a3d1beb9325d49f789245d253539
                       409d6339dfd56bff16eb6217548045b227732dec
                       02f7a4dce5d620c927ce1f2d46632478fcba668d
                       01208de2e18014ec923bacb7cbba42662429f40b
                       36031b4bcee93caf34525a7e7bb2ea14795e61eb
                       baaae0940711804e7a86977daf3dd76f57479711
                       2ebd9866af6794b7389ea6bbb020a740df8ab10f
                       2a998b9a2d5d5535b68313a3ac3d290beffef140
                       851cf1c09f3d94f908c04cfbda7f505d7ee0b9a7
                       d4e46fac12954ef56fb28e912ba04461fc3598d4
                       d096a611fbf1dfd6336b64be1382e4434196b39e
                       e58c650ea7726656bc194513a464154585b80659
                       22938baf77c866018b58d4aded3f60cd0a44e041
                       da70cb1cf02d04602fda107be07e84e8f62643e8
                       bd2fbee8d042deef9aeb7da2e2c3c87f94798351
                       ea2b946bc9479ec547ac3b16d3d4448ce8ceff79
                       2044af3e05eb38bb96dadd8b924f034fec4bd75e
                       a6f97c8533191c339d42b2f8639b5d50e2a4413f
                       87e52cdb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [28:09:f5:69:b2:f5:c8:50:3e:72:6c:7e:73:60:f9:9c:e8:e2:fd:23]
            modulus: 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
    public exponent: 10001

] 
2021-05-31 01:30:55.316  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-31 01:30:55.318 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-31 01:30:55.319 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-31 01:30:55.320 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-31 01:30:55.320  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-31 01:30:55.321  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-31 01:30:55.321  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-31 01:30:55.322  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-31 01:30:55.322  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-31 01:30:55.329  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-31 01:30:55.330  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 01:30:55.330  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 01:30:55.332  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-31 01:30:55.412  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-31 01:30:55.412  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-31 01:30:55.413 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-31 01:30:55.414 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-31 01:30:55.415  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1996
2021-05-31 01:30:55.415  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-31 01:30:55.417  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-31 01:30:55.417  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-31 01:30:55.418  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-31 01:30:55.418  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-31 01:30:55.419 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 01:30:55.419 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 01:30:55.420 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 01:30:55.420 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 01:30:55.421 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 01:30:55.421 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 01:30:55.422 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-31 01:30:55.505 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 115904390998612887829638467990041699156788322695
             IssuerDN: UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 30 23:18:05 UTC 2021
           Final Date: Fri May 30 23:18:05 UTC 2031
            SubjectDN: UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [34:1c:d1:f6:1b:35:33:7c:6d:80:d8:18:97:77:20:54:14:3f:fb:cc]
            modulus: dcff0ba8f12c89eaf3f8fd10c7770a4e0cf207211a907256a883530af24b2e5fd5d332f8c67b2c7e74280f614655895899a72eb7a84d48915dfebf93931c3260953b3c03b80c4c7220af58e464e8a0bb4799500acea4a3875d2254757ceba7ae0248e490050f3d127ddd328cb0acc37300fda6b15f1ede2ff0aa6b0d5cf1eae19f40c1277e9a57f1258f695d64101aff46edf04e83e9996744729db577421e424565ff6d1b2785d2bc3ed6a25c75e833a7a835f07fbcf6f149af9b7fcf1dd2de7f6ffbaefb20c2b084dd1eade429cfa571146d29da682722355ce138deda37f482ea51c71b1e1cbb3cec967c32105208ad2feee484c8e2b509b5e8e5965dfe7373004ed4b7e56d4e6688f8fa8887860b9ada3e7e17e8120decad51b145ecd6172f10531af67a68415880c0d94d3f37d4d2b8fbb8e2a3cb924a7290a60f7f64faa65ab3a90f6a530be2f9a8c4bc333098c220501ecf7acaadd1b13ab7db07f9317b9a7e734cc161b286031f6557ca62ffb909f91a3701457c52361529117f9ee5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3abbff900bfc28c4116a6b7bc2b9feac46fa354a
                       0f5b5eec2157a3d1beb9325d49f789245d253539
                       409d6339dfd56bff16eb6217548045b227732dec
                       02f7a4dce5d620c927ce1f2d46632478fcba668d
                       01208de2e18014ec923bacb7cbba42662429f40b
                       36031b4bcee93caf34525a7e7bb2ea14795e61eb
                       baaae0940711804e7a86977daf3dd76f57479711
                       2ebd9866af6794b7389ea6bbb020a740df8ab10f
                       2a998b9a2d5d5535b68313a3ac3d290beffef140
                       851cf1c09f3d94f908c04cfbda7f505d7ee0b9a7
                       d4e46fac12954ef56fb28e912ba04461fc3598d4
                       d096a611fbf1dfd6336b64be1382e4434196b39e
                       e58c650ea7726656bc194513a464154585b80659
                       22938baf77c866018b58d4aded3f60cd0a44e041
                       da70cb1cf02d04602fda107be07e84e8f62643e8
                       bd2fbee8d042deef9aeb7da2e2c3c87f94798351
                       ea2b946bc9479ec547ac3b16d3d4448ce8ceff79
                       2044af3e05eb38bb96dadd8b924f034fec4bd75e
                       a6f97c8533191c339d42b2f8639b5d50e2a4413f
                       87e52cdb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b5:52:1e:8f:02:08:f8:91:14:37:e8:98:23:97:cb:13:76:7b:66:bb]
            modulus: c312bc27d7adafc71bf018db4be692e7e5b5521f7a7a4acb8581d6682dc7914ec85f4020c630dcdc065a66d3600f21554b346af15ee1880cac475c0c29f82a37d2a03f01793b8ca47ce3c2c008b230f3a17eb7af9900ef65150572ec019cbf37b9b72dad48ba13c5aaf921d3bec8e77c5938664f1669b3d08dcbb8cfe369542482f07a09942d8d8fcba9aac37da78ab02764dff8e3ee04a1d8487f20269ab801de11823443698a2b658c825a55de2ec2979d3dfb7bcc7fec20c09494a0909e1af2b5da0597f71f132c532eea77a9e357396fdba715ece1f092b758fad29969e4f18f948326d1d58526eab81d9c8541322cb24e11fe3d2a1d8594f7c32c8bb54f
    public exponent: 10001

] 
2021-05-31 01:31:19.662  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-31 01:31:19.663 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-31 01:31:19.664 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-31 01:31:19.665 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-31 01:31:19.665  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-31 01:31:19.666  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-31 01:31:19.666  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-31 01:31:19.666  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-31 01:31:19.666  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-31 01:31:19.670  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-31 01:31:19.671  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 01:31:19.671  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 01:31:19.672  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-31 01:31:19.768  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-31 01:31:19.768  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-31 01:31:19.769 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-31 01:31:19.770 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-31 01:31:19.770  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1996
2021-05-31 01:31:19.770  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-31 01:31:19.772  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-31 01:31:19.772  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-31 01:31:19.772  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-31 01:31:19.773  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-31 01:31:19.773 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 01:31:19.773 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 01:31:19.773 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 01:31:19.774 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 01:31:19.774 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 01:31:19.775 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 01:31:19.775 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-31 01:31:19.805 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 115904390998612887829638467990041699156788322695
             IssuerDN: UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 30 23:18:05 UTC 2021
           Final Date: Fri May 30 23:18:05 UTC 2031
            SubjectDN: UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [34:1c:d1:f6:1b:35:33:7c:6d:80:d8:18:97:77:20:54:14:3f:fb:cc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3abbff900bfc28c4116a6b7bc2b9feac46fa354a
                       0f5b5eec2157a3d1beb9325d49f789245d253539
                       409d6339dfd56bff16eb6217548045b227732dec
                       02f7a4dce5d620c927ce1f2d46632478fcba668d
                       01208de2e18014ec923bacb7cbba42662429f40b
                       36031b4bcee93caf34525a7e7bb2ea14795e61eb
                       baaae0940711804e7a86977daf3dd76f57479711
                       2ebd9866af6794b7389ea6bbb020a740df8ab10f
                       2a998b9a2d5d5535b68313a3ac3d290beffef140
                       851cf1c09f3d94f908c04cfbda7f505d7ee0b9a7
                       d4e46fac12954ef56fb28e912ba04461fc3598d4
                       d096a611fbf1dfd6336b64be1382e4434196b39e
                       e58c650ea7726656bc194513a464154585b80659
                       22938baf77c866018b58d4aded3f60cd0a44e041
                       da70cb1cf02d04602fda107be07e84e8f62643e8
                       bd2fbee8d042deef9aeb7da2e2c3c87f94798351
                       ea2b946bc9479ec547ac3b16d3d4448ce8ceff79
                       2044af3e05eb38bb96dadd8b924f034fec4bd75e
                       a6f97c8533191c339d42b2f8639b5d50e2a4413f
                       87e52cdb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e2:05:43:11:d3:55:6b:e1:75:a7:06:08:bc:1c:e3:eb:fe:71:ad:3c]
            modulus: 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
    public exponent: 10001

] 
2021-05-31 01:32:08.927  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-31 01:32:08.928 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-31 01:32:08.929 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-31 01:32:08.930 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-31 01:32:08.930  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-31 01:32:08.931  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-31 01:32:08.931  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-31 01:32:08.932  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-31 01:32:08.932  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-31 01:32:08.937  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-31 01:32:08.937  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 01:32:08.937  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 01:32:08.939  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-31 01:32:09.026  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-31 01:32:09.027  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-31 01:32:09.027 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-31 01:32:09.028 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-31 01:32:09.029  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1996
2021-05-31 01:32:09.029  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-31 01:32:09.030  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-31 01:32:09.030  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-31 01:32:09.031  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-31 01:32:09.031  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-31 01:32:09.031 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 01:32:09.031 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 01:32:09.032 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 01:32:09.032 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 01:32:09.032 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 01:32:09.033 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 01:32:09.033 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-31 01:32:09.036 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 115904390998612887829638467990041699156788322695
             IssuerDN: UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 30 23:18:05 UTC 2021
           Final Date: Fri May 30 23:18:05 UTC 2031
            SubjectDN: UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [34:1c:d1:f6:1b:35:33:7c:6d:80:d8:18:97:77:20:54:14:3f:fb:cc]
            modulus: dcff0ba8f12c89eaf3f8fd10c7770a4e0cf207211a907256a883530af24b2e5fd5d332f8c67b2c7e74280f614655895899a72eb7a84d48915dfebf93931c3260953b3c03b80c4c7220af58e464e8a0bb4799500acea4a3875d2254757ceba7ae0248e490050f3d127ddd328cb0acc37300fda6b15f1ede2ff0aa6b0d5cf1eae19f40c1277e9a57f1258f695d64101aff46edf04e83e9996744729db577421e424565ff6d1b2785d2bc3ed6a25c75e833a7a835f07fbcf6f149af9b7fcf1dd2de7f6ffbaefb20c2b084dd1eade429cfa571146d29da682722355ce138deda37f482ea51c71b1e1cbb3cec967c32105208ad2feee484c8e2b509b5e8e5965dfe7373004ed4b7e56d4e6688f8fa8887860b9ada3e7e17e8120decad51b145ecd6172f10531af67a68415880c0d94d3f37d4d2b8fbb8e2a3cb924a7290a60f7f64faa65ab3a90f6a530be2f9a8c4bc333098c220501ecf7acaadd1b13ab7db07f9317b9a7e734cc161b286031f6557ca62ffb909f91a3701457c52361529117f9ee5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3abbff900bfc28c4116a6b7bc2b9feac46fa354a
                       0f5b5eec2157a3d1beb9325d49f789245d253539
                       409d6339dfd56bff16eb6217548045b227732dec
                       02f7a4dce5d620c927ce1f2d46632478fcba668d
                       01208de2e18014ec923bacb7cbba42662429f40b
                       36031b4bcee93caf34525a7e7bb2ea14795e61eb
                       baaae0940711804e7a86977daf3dd76f57479711
                       2ebd9866af6794b7389ea6bbb020a740df8ab10f
                       2a998b9a2d5d5535b68313a3ac3d290beffef140
                       851cf1c09f3d94f908c04cfbda7f505d7ee0b9a7
                       d4e46fac12954ef56fb28e912ba04461fc3598d4
                       d096a611fbf1dfd6336b64be1382e4434196b39e
                       e58c650ea7726656bc194513a464154585b80659
                       22938baf77c866018b58d4aded3f60cd0a44e041
                       da70cb1cf02d04602fda107be07e84e8f62643e8
                       bd2fbee8d042deef9aeb7da2e2c3c87f94798351
                       ea2b946bc9479ec547ac3b16d3d4448ce8ceff79
                       2044af3e05eb38bb96dadd8b924f034fec4bd75e
                       a6f97c8533191c339d42b2f8639b5d50e2a4413f
                       87e52cdb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bb:19:b0:c4:fc:09:b1:55:fd:b7:ca:8c:51:fc:87:ec:10:1b:b9:ca]
            modulus: 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
    public exponent: 10001

] 
2021-05-31 01:32:24.799  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-31 01:32:24.800 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-31 01:32:24.801 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-31 01:32:24.801 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-31 01:32:24.801  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-31 01:32:24.802  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-31 01:32:24.802  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-31 01:32:24.802  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-31 01:32:24.803  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-31 01:32:24.807  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-31 01:32:24.807  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 01:32:24.807  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 01:32:24.809  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-31 01:32:24.875  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-31 01:32:24.875  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-31 01:32:24.875 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-31 01:32:24.876 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-31 01:32:24.877  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1996
2021-05-31 01:32:24.877  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-31 01:32:24.879  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-31 01:32:24.879  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-31 01:32:24.879  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-31 01:32:24.879  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-31 01:32:24.880 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 01:32:24.880 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 01:32:24.880 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 01:32:24.907 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 01:32:24.907 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 01:32:24.907 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 01:32:24.908 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-31 01:32:24.910 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 115904390998612887829638467990041699156788322695
             IssuerDN: UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 30 23:18:05 UTC 2021
           Final Date: Fri May 30 23:18:05 UTC 2031
            SubjectDN: UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [34:1c:d1:f6:1b:35:33:7c:6d:80:d8:18:97:77:20:54:14:3f:fb:cc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3abbff900bfc28c4116a6b7bc2b9feac46fa354a
                       0f5b5eec2157a3d1beb9325d49f789245d253539
                       409d6339dfd56bff16eb6217548045b227732dec
                       02f7a4dce5d620c927ce1f2d46632478fcba668d
                       01208de2e18014ec923bacb7cbba42662429f40b
                       36031b4bcee93caf34525a7e7bb2ea14795e61eb
                       baaae0940711804e7a86977daf3dd76f57479711
                       2ebd9866af6794b7389ea6bbb020a740df8ab10f
                       2a998b9a2d5d5535b68313a3ac3d290beffef140
                       851cf1c09f3d94f908c04cfbda7f505d7ee0b9a7
                       d4e46fac12954ef56fb28e912ba04461fc3598d4
                       d096a611fbf1dfd6336b64be1382e4434196b39e
                       e58c650ea7726656bc194513a464154585b80659
                       22938baf77c866018b58d4aded3f60cd0a44e041
                       da70cb1cf02d04602fda107be07e84e8f62643e8
                       bd2fbee8d042deef9aeb7da2e2c3c87f94798351
                       ea2b946bc9479ec547ac3b16d3d4448ce8ceff79
                       2044af3e05eb38bb96dadd8b924f034fec4bd75e
                       a6f97c8533191c339d42b2f8639b5d50e2a4413f
                       87e52cdb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [59:d0:00:a1:9c:b5:a0:af:a0:3b:f3:76:bb:df:6f:e5:3d:f7:a5:41]
            modulus: 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
    public exponent: 10001

] 
2021-05-31 01:32:58.196  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-31 01:32:58.197 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-31 01:32:58.199 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-31 01:32:58.199 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-31 01:32:58.200  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-31 01:32:58.200  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-31 01:32:58.200  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-31 01:32:58.201  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-31 01:32:58.201  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-31 01:32:58.205  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-31 01:32:58.205  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 01:32:58.206  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 01:32:58.207  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-31 01:32:58.308  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-31 01:32:58.309  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-31 01:32:58.309 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-31 01:32:58.310 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-31 01:32:58.310  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1996
2021-05-31 01:32:58.311  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-31 01:32:58.312  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-31 01:32:58.313  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-31 01:32:58.313  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-31 01:32:58.314  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-31 01:32:58.314 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 01:32:58.314 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 01:32:58.314 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 01:32:58.315 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 01:32:58.315 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 01:32:58.315 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 01:32:58.316 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-31 01:32:58.318 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 115904390998612887829638467990041699156788322695
             IssuerDN: UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 30 23:18:05 UTC 2021
           Final Date: Fri May 30 23:18:05 UTC 2031
            SubjectDN: UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [34:1c:d1:f6:1b:35:33:7c:6d:80:d8:18:97:77:20:54:14:3f:fb:cc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3abbff900bfc28c4116a6b7bc2b9feac46fa354a
                       0f5b5eec2157a3d1beb9325d49f789245d253539
                       409d6339dfd56bff16eb6217548045b227732dec
                       02f7a4dce5d620c927ce1f2d46632478fcba668d
                       01208de2e18014ec923bacb7cbba42662429f40b
                       36031b4bcee93caf34525a7e7bb2ea14795e61eb
                       baaae0940711804e7a86977daf3dd76f57479711
                       2ebd9866af6794b7389ea6bbb020a740df8ab10f
                       2a998b9a2d5d5535b68313a3ac3d290beffef140
                       851cf1c09f3d94f908c04cfbda7f505d7ee0b9a7
                       d4e46fac12954ef56fb28e912ba04461fc3598d4
                       d096a611fbf1dfd6336b64be1382e4434196b39e
                       e58c650ea7726656bc194513a464154585b80659
                       22938baf77c866018b58d4aded3f60cd0a44e041
                       da70cb1cf02d04602fda107be07e84e8f62643e8
                       bd2fbee8d042deef9aeb7da2e2c3c87f94798351
                       ea2b946bc9479ec547ac3b16d3d4448ce8ceff79
                       2044af3e05eb38bb96dadd8b924f034fec4bd75e
                       a6f97c8533191c339d42b2f8639b5d50e2a4413f
                       87e52cdb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [90:db:3a:af:ac:01:95:a4:8c:bd:c8:07:d7:4f:bc:3f:4e:f7:2f:61]
            modulus: 897fb36993459dfff1b88f498f30e339b4e41953bc2a8fca764b79ac2d087122a0a75c896d69b36e38bc38d6196fe5735fbea1ad38ddb0dba562f87ebaedac91f431a3e4bc620883b333d95dc9f19343debf06a7821bed9941fed7bf0dc02b3c2b26805de78927c81931159b14801a47e2937569c0d2aac3ae90f872e0d39b3e042e0037b11a5f87ce99e95ac0866d7fd97054d79abe8ea263bcfb021386c9735df075c057a5e5ad0d6ca0f7ac9da381b22eb4e26e4db04fed4df6a7f8c1a54588913a35b6a1ae08321c35e9c78ab4c57c5e7ac3b5fa5529af3e045e0cb109437c466a18a7c77a53b9123f8e7919431fee9be2b36af6aeeec072af489d7386cb
    public exponent: 10001

] 
2021-05-31 01:34:41.613  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-31 01:34:41.615 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-31 01:34:41.616 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-31 01:34:41.616 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-31 01:34:41.617  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-31 01:34:41.617  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-31 01:34:41.617  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-31 01:34:41.621  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-31 01:34:41.622  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-31 01:34:41.626  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-31 01:34:41.626  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 01:34:41.626  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 01:34:41.628  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-31 01:34:41.719  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-31 01:34:41.720  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-31 01:34:41.720 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-31 01:34:41.721 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-31 01:34:41.722  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1996
2021-05-31 01:34:41.722  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-31 01:34:41.723  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-31 01:34:41.724  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-31 01:34:41.724  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-31 01:34:41.724  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-31 01:34:41.724 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 01:34:41.725 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 01:34:41.725 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 01:34:41.726 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 01:34:41.726 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 01:34:41.726 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 01:34:41.726 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-31 01:34:41.729 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 115904390998612887829638467990041699156788322695
             IssuerDN: UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 30 23:18:05 UTC 2021
           Final Date: Fri May 30 23:18:05 UTC 2031
            SubjectDN: UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [34:1c:d1:f6:1b:35:33:7c:6d:80:d8:18:97:77:20:54:14:3f:fb:cc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3abbff900bfc28c4116a6b7bc2b9feac46fa354a
                       0f5b5eec2157a3d1beb9325d49f789245d253539
                       409d6339dfd56bff16eb6217548045b227732dec
                       02f7a4dce5d620c927ce1f2d46632478fcba668d
                       01208de2e18014ec923bacb7cbba42662429f40b
                       36031b4bcee93caf34525a7e7bb2ea14795e61eb
                       baaae0940711804e7a86977daf3dd76f57479711
                       2ebd9866af6794b7389ea6bbb020a740df8ab10f
                       2a998b9a2d5d5535b68313a3ac3d290beffef140
                       851cf1c09f3d94f908c04cfbda7f505d7ee0b9a7
                       d4e46fac12954ef56fb28e912ba04461fc3598d4
                       d096a611fbf1dfd6336b64be1382e4434196b39e
                       e58c650ea7726656bc194513a464154585b80659
                       22938baf77c866018b58d4aded3f60cd0a44e041
                       da70cb1cf02d04602fda107be07e84e8f62643e8
                       bd2fbee8d042deef9aeb7da2e2c3c87f94798351
                       ea2b946bc9479ec547ac3b16d3d4448ce8ceff79
                       2044af3e05eb38bb96dadd8b924f034fec4bd75e
                       a6f97c8533191c339d42b2f8639b5d50e2a4413f
                       87e52cdb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d8:ca:4b:b4:aa:12:82:7c:53:b7:88:6a:e8:cf:0e:c4:4b:86:b0:83]
            modulus: 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
    public exponent: 10001

] 
2021-05-31 01:38:00.973  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-31 01:38:00.974 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-31 01:38:00.975 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-31 01:38:00.976 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-31 01:38:00.976  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-31 01:38:00.976  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-31 01:38:00.977  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-31 01:38:00.977  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-31 01:38:00.977  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-31 01:38:00.981  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-31 01:38:00.982  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 01:38:00.982  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 01:38:00.983  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-31 01:38:01.076  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-31 01:38:01.076  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-31 01:38:01.077 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-31 01:38:01.078 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-31 01:38:01.078  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1996
2021-05-31 01:38:01.078  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-31 01:38:01.080  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-31 01:38:01.080  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-31 01:38:01.080  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-31 01:38:01.080  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-31 01:38:01.081 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 01:38:01.081 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 01:38:01.081 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 01:38:01.082 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 01:38:01.082 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 01:38:01.082 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 01:38:01.083 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-31 01:38:01.085 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 115904390998612887829638467990041699156788322695
             IssuerDN: UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 30 23:18:05 UTC 2021
           Final Date: Fri May 30 23:18:05 UTC 2031
            SubjectDN: UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [34:1c:d1:f6:1b:35:33:7c:6d:80:d8:18:97:77:20:54:14:3f:fb:cc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3abbff900bfc28c4116a6b7bc2b9feac46fa354a
                       0f5b5eec2157a3d1beb9325d49f789245d253539
                       409d6339dfd56bff16eb6217548045b227732dec
                       02f7a4dce5d620c927ce1f2d46632478fcba668d
                       01208de2e18014ec923bacb7cbba42662429f40b
                       36031b4bcee93caf34525a7e7bb2ea14795e61eb
                       baaae0940711804e7a86977daf3dd76f57479711
                       2ebd9866af6794b7389ea6bbb020a740df8ab10f
                       2a998b9a2d5d5535b68313a3ac3d290beffef140
                       851cf1c09f3d94f908c04cfbda7f505d7ee0b9a7
                       d4e46fac12954ef56fb28e912ba04461fc3598d4
                       d096a611fbf1dfd6336b64be1382e4434196b39e
                       e58c650ea7726656bc194513a464154585b80659
                       22938baf77c866018b58d4aded3f60cd0a44e041
                       da70cb1cf02d04602fda107be07e84e8f62643e8
                       bd2fbee8d042deef9aeb7da2e2c3c87f94798351
                       ea2b946bc9479ec547ac3b16d3d4448ce8ceff79
                       2044af3e05eb38bb96dadd8b924f034fec4bd75e
                       a6f97c8533191c339d42b2f8639b5d50e2a4413f
                       87e52cdb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4a:2f:ec:9c:99:63:4d:65:29:ba:16:4a:a0:e0:dd:80:50:a1:9e:92]
            modulus: db901926c918d89b925eb3e81998b152df80d3410a6c6ba199828e563409114d936e213f52f42f91be2665c91324e5a0d8d3f3c6fb4ba85d579a835ccca624a5a88cf8846411e353a1384167cd81568b2b2529e7df46272ed1497621499fa7f1b77c518fab8242d2e19586b35fd609c7375ae23003c5e77935bb36e4cfc68e8b63ff3490050ad0ea5d9696b56565cd01dca5d49ba51528a5ba49945ac78d13b516d06b37dc62a9a673ecd710c7ab61a77077a1d220a1b68dcd20c8f86b7aafa578c455218f135067e1e912a67e7c735a9cdc5b2c54b87ae4cd03f74c092b12623ecef449a1492036418810c5ea31f281d8fdc64cf3058681161e1050ba948e2b
    public exponent: 10001

] 
2021-05-31 01:40:56.772  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-31 01:40:56.773 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-31 01:40:56.774 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-31 01:40:56.774 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-31 01:40:56.775  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-31 01:40:56.775  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-31 01:40:56.775  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-31 01:40:56.776  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-31 01:40:56.776  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-31 01:40:56.780  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-31 01:40:56.780  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 01:40:56.780  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 01:40:56.782  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-31 01:40:56.866  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-31 01:40:56.866  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-31 01:40:56.867 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-31 01:40:56.868 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-31 01:40:56.868  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1996
2021-05-31 01:40:56.869  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-31 01:40:56.870  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-31 01:40:56.870  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-31 01:40:56.871  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-31 01:40:56.871  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-31 01:40:56.871 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 01:40:56.872 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 01:40:56.872 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 01:40:56.873 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 01:40:56.873 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 01:40:56.873 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 01:40:56.874 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-31 01:40:56.877 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 115904390998612887829638467990041699156788322695
             IssuerDN: UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 30 23:18:05 UTC 2021
           Final Date: Fri May 30 23:18:05 UTC 2031
            SubjectDN: UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [34:1c:d1:f6:1b:35:33:7c:6d:80:d8:18:97:77:20:54:14:3f:fb:cc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3abbff900bfc28c4116a6b7bc2b9feac46fa354a
                       0f5b5eec2157a3d1beb9325d49f789245d253539
                       409d6339dfd56bff16eb6217548045b227732dec
                       02f7a4dce5d620c927ce1f2d46632478fcba668d
                       01208de2e18014ec923bacb7cbba42662429f40b
                       36031b4bcee93caf34525a7e7bb2ea14795e61eb
                       baaae0940711804e7a86977daf3dd76f57479711
                       2ebd9866af6794b7389ea6bbb020a740df8ab10f
                       2a998b9a2d5d5535b68313a3ac3d290beffef140
                       851cf1c09f3d94f908c04cfbda7f505d7ee0b9a7
                       d4e46fac12954ef56fb28e912ba04461fc3598d4
                       d096a611fbf1dfd6336b64be1382e4434196b39e
                       e58c650ea7726656bc194513a464154585b80659
                       22938baf77c866018b58d4aded3f60cd0a44e041
                       da70cb1cf02d04602fda107be07e84e8f62643e8
                       bd2fbee8d042deef9aeb7da2e2c3c87f94798351
                       ea2b946bc9479ec547ac3b16d3d4448ce8ceff79
                       2044af3e05eb38bb96dadd8b924f034fec4bd75e
                       a6f97c8533191c339d42b2f8639b5d50e2a4413f
                       87e52cdb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b8:dc:11:b5:67:8f:09:9d:0b:3d:82:c7:ea:dd:df:b3:14:74:25:d1]
            modulus: 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
    public exponent: 10001

] 
2021-05-31 01:42:43.557  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-31 01:42:43.558 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-31 01:42:43.559 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-31 01:42:43.559 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-31 01:42:43.560  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-31 01:42:43.560  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-31 01:42:43.560  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-31 01:42:43.561  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-31 01:42:43.561  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-31 01:42:43.565  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-31 01:42:43.566  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 01:42:43.566  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 01:42:43.567  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-31 01:42:43.666  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-31 01:42:43.666  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-31 01:42:43.667 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-31 01:42:43.668 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-31 01:42:43.669  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1996
2021-05-31 01:42:43.669  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-31 01:42:43.671  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-31 01:42:43.671  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-31 01:42:43.671  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-31 01:42:43.672  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-31 01:42:43.704 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 01:42:43.705 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 01:42:43.705 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 01:42:43.706 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 01:42:43.706 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 01:42:43.707 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 01:42:43.707 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-31 01:42:43.710 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 115904390998612887829638467990041699156788322695
             IssuerDN: UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 30 23:18:05 UTC 2021
           Final Date: Fri May 30 23:18:05 UTC 2031
            SubjectDN: UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [34:1c:d1:f6:1b:35:33:7c:6d:80:d8:18:97:77:20:54:14:3f:fb:cc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3abbff900bfc28c4116a6b7bc2b9feac46fa354a
                       0f5b5eec2157a3d1beb9325d49f789245d253539
                       409d6339dfd56bff16eb6217548045b227732dec
                       02f7a4dce5d620c927ce1f2d46632478fcba668d
                       01208de2e18014ec923bacb7cbba42662429f40b
                       36031b4bcee93caf34525a7e7bb2ea14795e61eb
                       baaae0940711804e7a86977daf3dd76f57479711
                       2ebd9866af6794b7389ea6bbb020a740df8ab10f
                       2a998b9a2d5d5535b68313a3ac3d290beffef140
                       851cf1c09f3d94f908c04cfbda7f505d7ee0b9a7
                       d4e46fac12954ef56fb28e912ba04461fc3598d4
                       d096a611fbf1dfd6336b64be1382e4434196b39e
                       e58c650ea7726656bc194513a464154585b80659
                       22938baf77c866018b58d4aded3f60cd0a44e041
                       da70cb1cf02d04602fda107be07e84e8f62643e8
                       bd2fbee8d042deef9aeb7da2e2c3c87f94798351
                       ea2b946bc9479ec547ac3b16d3d4448ce8ceff79
                       2044af3e05eb38bb96dadd8b924f034fec4bd75e
                       a6f97c8533191c339d42b2f8639b5d50e2a4413f
                       87e52cdb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f6:8e:cd:04:7a:18:71:26:cc:f8:98:74:f7:55:ad:68:e9:b7:f2:39]
            modulus: eb4c8efc5cc43a6b91bbc73b24cf35f590a27d42b7263906cc4504b54a58ccdf07fc8702352774ba35bf8338551b7f7c3322340d81ebf5515aa667d77bdea08323173d36ec0dc2b2dcedf5625e223b799811dcaa93d10969b648057994a70b52bb0d7efacd7c40fc15d3293ad06ed84127b61ad449d94280ad6b17d4c9e39993779d17d0497c1fcb1ae475bb8c953a42477aa764d1e6aab4c4d61e5f73f50008e88f2810b1a4da0afdd58a68410eccf056a18dcc16093464a5a49b537ed04b0e4700ad595669390f2af07eff1a257bbd84af61a49e528360dac4feab4a354bc22d497751a3df701e4846d5f2f3dd628675f48b915ef6e9e32398db6789f88f25
    public exponent: 10001

] 
2021-05-31 01:44:12.551  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-31 01:44:12.552 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-31 01:44:12.553 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-31 01:44:12.554 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-31 01:44:12.554  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-31 01:44:12.555  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-31 01:44:12.555  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-31 01:44:12.555  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-31 01:44:12.555  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-31 01:44:12.561  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-31 01:44:12.562  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 01:44:12.562  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-31 01:44:12.564  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-31 01:44:12.665  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-31 01:44:12.665  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-31 01:44:12.666 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-31 01:44:12.667 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-31 01:44:12.667  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1996
2021-05-31 01:44:12.667  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-31 01:44:12.668  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-31 01:44:12.669  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-31 01:44:12.669  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-31 01:44:12.669  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-31 01:44:12.669 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 01:44:12.670 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 01:44:12.670 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 01:44:12.670 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-31 01:44:12.670 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-31 01:44:12.671 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-31 01:44:12.671 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-31 01:44:12.673 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 115904390998612887829638467990041699156788322695
             IssuerDN: UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 30 23:18:05 UTC 2021
           Final Date: Fri May 30 23:18:05 UTC 2031
            SubjectDN: UID=c-04c6a34198dbacfe7,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [34:1c:d1:f6:1b:35:33:7c:6d:80:d8:18:97:77:20:54:14:3f:fb:cc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3abbff900bfc28c4116a6b7bc2b9feac46fa354a
                       0f5b5eec2157a3d1beb9325d49f789245d253539
                       409d6339dfd56bff16eb6217548045b227732dec
                       02f7a4dce5d620c927ce1f2d46632478fcba668d
                       01208de2e18014ec923bacb7cbba42662429f40b
                       36031b4bcee93caf34525a7e7bb2ea14795e61eb
                       baaae0940711804e7a86977daf3dd76f57479711
                       2ebd9866af6794b7389ea6bbb020a740df8ab10f
                       2a998b9a2d5d5535b68313a3ac3d290beffef140
                       851cf1c09f3d94f908c04cfbda7f505d7ee0b9a7
                       d4e46fac12954ef56fb28e912ba04461fc3598d4
                       d096a611fbf1dfd6336b64be1382e4434196b39e
                       e58c650ea7726656bc194513a464154585b80659
                       22938baf77c866018b58d4aded3f60cd0a44e041
                       da70cb1cf02d04602fda107be07e84e8f62643e8
                       bd2fbee8d042deef9aeb7da2e2c3c87f94798351
                       ea2b946bc9479ec547ac3b16d3d4448ce8ceff79
                       2044af3e05eb38bb96dadd8b924f034fec4bd75e
                       a6f97c8533191c339d42b2f8639b5d50e2a4413f
                       87e52cdb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [aa:8a:0f:58:27:85:f6:20:5c:36:4e:07:0f:30:22:04:fa:11:c9:05]
            modulus: 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
    public exponent: 10001

]