Results

By type

          2021-06-06 23:16:47,507 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-06-06 23:16:51,624 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-06-06 23:16:54.616  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-06-06 23:17:07.513 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-06-06 23:17:08.807  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-06-06 23:17:09.515  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-06-06 23:17:23.617  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 38.797 seconds (JVM running for 46.44)
2021-06-06 23:25:22.111  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-06 23:25:22.200 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-06 23:25:22.328 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-06-06 23:25:22.331 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-06 23:25:22.407  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-06-06 23:25:22.412  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-06 23:25:22.417  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-06 23:25:22.418  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-06 23:25:22.418  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-06 23:25:22.502  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-06 23:25:22.506  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-06 23:25:22.713  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-06 23:25:22.800  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-06 23:25:22.802  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-06 23:25:22.905  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-06 23:25:24.315  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-06 23:25:24.401  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-06 23:25:24.402 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-06 23:25:24.407 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-06 23:25:24.408  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1166
2021-06-06 23:25:24.409  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-06 23:25:24.499  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-06 23:25:24.501  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-06 23:25:24.507  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-06 23:25:24.508  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-06 23:25:24.509 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-06 23:25:24.509 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-06 23:25:24.510 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-06 23:25:24.608 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-06 23:25:24.608 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-06 23:25:24.609 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-06 23:25:24.616 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-06 23:25:25.010 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 182173638595080361481182345773442292530320055016
             IssuerDN: UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 06 23:06:41 UTC 2021
           Final Date: Fri Jun 06 23:06:41 UTC 2031
            SubjectDN: UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:a4:5f:2a:68:ca:5c:c5:44:c9:f8:54:5d:d4:08:16:1b:98:97:0a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 78d0add3d073b569ce74ad3123660dc9ecc49e47
                       29836e55e3f6bb42dce42671280dcfb9e006affd
                       df2fd29abe94225e1a7393c1640ab543866b22cc
                       d4957746cc82c6dc963365f979aa3a4801bc6b6e
                       3a1956e0cdd102dffe05f793f8c178fd1684c868
                       72d245d35f73bcbf080270ada18db8a08b132bbc
                       981a813440709a5ef314b91a815f08bb3f8d8a9d
                       17f9cbf7aab5cbdfda2ab9762aa446e4500fbde6
                       1c96a316da514cb766e729d44ff66cccbf281077
                       229a0d78ad3a59f3e12ebb8fc706d2d0e469595f
                       6bb54caccf1abf89fec91bcdab425f5b2da0b492
                       6056b3d3d9279246b9dc47a1f7fd234fba2355a9
                       096a14dc9143c4a04667e7ae99e46cf63e384a4c
                       e2bc7f9ede6b0ea02ece8d023668969013fd3139
                       5f8ea9b4a66d3215de77ade67694f7354133b527
                       2ed43c863ffea7e195a0f2c47ab6e8631cc4b42c
                       9deeeb22cb36988fa213f9d0ec008f2de6f1e1ac
                       2162ee6220ddfecbdaa82190b8802a9d7a48866f
                       bb07b3cb209e37f9343ae6104ea9453b43f1f89d
                       2cb20df3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0c:48:02:81:25:1b:83:ff:dc:97:7a:59:1e:c4:20:d5:90:fb:30:8e]
            modulus: 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
    public exponent: 10001

] 
2021-06-07 00:30:46.834  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-07 00:30:46.837 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-07 00:30:46.839 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-07 00:30:46.840 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-07 00:30:46.840  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-07 00:30:46.841  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-07 00:30:46.841  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-07 00:30:46.842  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-07 00:30:46.842  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-07 00:30:46.906  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-07 00:30:46.907  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-07 00:30:46.907  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-07 00:30:46.910  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-07 00:30:47.200  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-07 00:30:47.202  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-07 00:30:47.202 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-07 00:30:47.207 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-07 00:30:47.217  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1166
2021-06-07 00:30:47.217  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-07 00:30:47.300  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-07 00:30:47.301  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-07 00:30:47.302  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-07 00:30:47.302  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-07 00:30:47.303 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-07 00:30:47.303 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-07 00:30:47.303 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-07 00:30:47.304 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-07 00:30:47.304 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-07 00:30:47.305 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-07 00:30:47.306 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-07 00:30:47.309 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 182173638595080361481182345773442292530320055016
             IssuerDN: UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 06 23:06:41 UTC 2021
           Final Date: Fri Jun 06 23:06:41 UTC 2031
            SubjectDN: UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:a4:5f:2a:68:ca:5c:c5:44:c9:f8:54:5d:d4:08:16:1b:98:97:0a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 78d0add3d073b569ce74ad3123660dc9ecc49e47
                       29836e55e3f6bb42dce42671280dcfb9e006affd
                       df2fd29abe94225e1a7393c1640ab543866b22cc
                       d4957746cc82c6dc963365f979aa3a4801bc6b6e
                       3a1956e0cdd102dffe05f793f8c178fd1684c868
                       72d245d35f73bcbf080270ada18db8a08b132bbc
                       981a813440709a5ef314b91a815f08bb3f8d8a9d
                       17f9cbf7aab5cbdfda2ab9762aa446e4500fbde6
                       1c96a316da514cb766e729d44ff66cccbf281077
                       229a0d78ad3a59f3e12ebb8fc706d2d0e469595f
                       6bb54caccf1abf89fec91bcdab425f5b2da0b492
                       6056b3d3d9279246b9dc47a1f7fd234fba2355a9
                       096a14dc9143c4a04667e7ae99e46cf63e384a4c
                       e2bc7f9ede6b0ea02ece8d023668969013fd3139
                       5f8ea9b4a66d3215de77ade67694f7354133b527
                       2ed43c863ffea7e195a0f2c47ab6e8631cc4b42c
                       9deeeb22cb36988fa213f9d0ec008f2de6f1e1ac
                       2162ee6220ddfecbdaa82190b8802a9d7a48866f
                       bb07b3cb209e37f9343ae6104ea9453b43f1f89d
                       2cb20df3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f1:64:ec:b3:34:20:76:b0:a1:8d:b2:0f:c4:50:d7:59:ac:e7:59:d0]
            modulus: 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
    public exponent: 10001

] 
2021-06-07 00:32:15.823  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-07 00:32:15.825 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-07 00:32:15.827 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-06-07 00:32:15.828 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-07 00:32:15.828  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-06-07 00:32:15.830  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-07 00:32:15.830  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-07 00:32:15.831  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-07 00:32:15.831  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-07 00:32:15.836  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-07 00:32:15.900  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-07 00:32:15.900  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-07 00:32:15.904  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-07 00:32:16.053  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-07 00:32:16.054  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-07 00:32:16.055 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-07 00:32:16.101 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-07 00:32:16.102  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1166
2021-06-07 00:32:16.103  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-07 00:32:16.107  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-07 00:32:16.107  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-07 00:32:16.108  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-07 00:32:16.108  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-07 00:32:16.108 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-07 00:32:16.109 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-07 00:32:16.109 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-07 00:32:16.110 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-07 00:32:16.110 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-07 00:32:16.110 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-07 00:32:16.111 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-07 00:32:16.114 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 182173638595080361481182345773442292530320055016
             IssuerDN: UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 06 23:06:41 UTC 2021
           Final Date: Fri Jun 06 23:06:41 UTC 2031
            SubjectDN: UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:a4:5f:2a:68:ca:5c:c5:44:c9:f8:54:5d:d4:08:16:1b:98:97:0a]
            modulus: b5832cef4355b8f16d9c66b012a03ed3210b041c289ff733e86fe8f72d761e7560e586b1b225962d2f6a89c8202d864aa24960a1d65bf889eaf89b6f3b47b1c905d1168b339ed62acf7dde4ed6fb04617920e5747f4c853454c0b1e1bcd25040b0a920707cac90c24c041b8c8c79fed2ae482e95a2820362f0b7e8b4551a91fe7059a5cfb2da8c66a4ba71c1172d53eb39b5dccfa3ec9b88266928f4114865e82d80b6aaa43ad9b6ca5c9dc8d01fa4a27bc49def1ba00fc59c47e7e6bb98214aafee10fc853fd3393978e55e6645772aa59859d5620e133bfd8d0614e9ac0cd46eb5a8ad2d83691f5433f10289eb7151a3ebd4bd800e623b487bffac8eead6ec8bdf408b5faa911586c26caa9a626c4187e81be60a20c5ddd5888cc552df9421d9df743f2cd9022c57c90eef054492cc8a80a836d66362c36a52de8ea6319020e7068aa8f93c2cf4fb8cc8189ce5d2d48fea7f0893f9c506fa058a24ab772bad38711ec7e9330dbf69dc70b56918b9ba98d8d1aec557b99c5a8b66035c8003bd
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 78d0add3d073b569ce74ad3123660dc9ecc49e47
                       29836e55e3f6bb42dce42671280dcfb9e006affd
                       df2fd29abe94225e1a7393c1640ab543866b22cc
                       d4957746cc82c6dc963365f979aa3a4801bc6b6e
                       3a1956e0cdd102dffe05f793f8c178fd1684c868
                       72d245d35f73bcbf080270ada18db8a08b132bbc
                       981a813440709a5ef314b91a815f08bb3f8d8a9d
                       17f9cbf7aab5cbdfda2ab9762aa446e4500fbde6
                       1c96a316da514cb766e729d44ff66cccbf281077
                       229a0d78ad3a59f3e12ebb8fc706d2d0e469595f
                       6bb54caccf1abf89fec91bcdab425f5b2da0b492
                       6056b3d3d9279246b9dc47a1f7fd234fba2355a9
                       096a14dc9143c4a04667e7ae99e46cf63e384a4c
                       e2bc7f9ede6b0ea02ece8d023668969013fd3139
                       5f8ea9b4a66d3215de77ade67694f7354133b527
                       2ed43c863ffea7e195a0f2c47ab6e8631cc4b42c
                       9deeeb22cb36988fa213f9d0ec008f2de6f1e1ac
                       2162ee6220ddfecbdaa82190b8802a9d7a48866f
                       bb07b3cb209e37f9343ae6104ea9453b43f1f89d
                       2cb20df3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [26:4b:b9:24:b9:c6:a2:02:b2:93:f1:a4:12:d8:f1:f8:c3:10:82:d8]
            modulus: e4c06df3d4ab550ddc55ac4ae546843d2ab704022e178ffc0fb4955802ddf6e1f7ba2d6549243f7c05802f531e2a252fe886e6f1dde03f69e5082da18af7ca24162e73d4261e5d5d36d5f8494bd7b459743b772f687cbc9d1a8b444cacfa6edd05eb4167f0987bdd6a56b3fa4218ef20eb4642c2ae2bf8ec3424f35030fb97c11becdae620881af487a4d33648c87cc8f4e8ce0fb1ebea55e3244887b2552f44bc0aaa470d9ccfd4af870bd04408f69fae9ed7ee16385e3a182103efa7160b772e9cab1c9b21e34f97c0a0f0f9bfef8344b5877faee88f0c5b337e45d7ffaf881b7d5457e6be49b784c314f83fd86cdaa589ef7667fac89042ab6d89c52b0def
    public exponent: 10001

] 
2021-06-07 00:35:33.866  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-07 00:35:33.867 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-07 00:35:33.869 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-07 00:35:33.870 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-07 00:35:33.871  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-07 00:35:33.871  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-07 00:35:33.871  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-07 00:35:33.872  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-07 00:35:33.872  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-07 00:35:33.880  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-07 00:35:33.881  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-07 00:35:33.881  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-07 00:35:33.882  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-07 00:35:34.049  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-07 00:35:34.050  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-07 00:35:34.050 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-07 00:35:34.102 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-07 00:35:34.103  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1166
2021-06-07 00:35:34.104  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-07 00:35:34.106  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-07 00:35:34.106  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-07 00:35:34.107  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-07 00:35:34.107  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-07 00:35:34.108 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-07 00:35:34.108 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-07 00:35:34.109 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-07 00:35:34.110 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-07 00:35:34.111 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-07 00:35:34.112 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-07 00:35:34.113 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-07 00:35:34.117 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 182173638595080361481182345773442292530320055016
             IssuerDN: UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 06 23:06:41 UTC 2021
           Final Date: Fri Jun 06 23:06:41 UTC 2031
            SubjectDN: UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:a4:5f:2a:68:ca:5c:c5:44:c9:f8:54:5d:d4:08:16:1b:98:97:0a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 78d0add3d073b569ce74ad3123660dc9ecc49e47
                       29836e55e3f6bb42dce42671280dcfb9e006affd
                       df2fd29abe94225e1a7393c1640ab543866b22cc
                       d4957746cc82c6dc963365f979aa3a4801bc6b6e
                       3a1956e0cdd102dffe05f793f8c178fd1684c868
                       72d245d35f73bcbf080270ada18db8a08b132bbc
                       981a813440709a5ef314b91a815f08bb3f8d8a9d
                       17f9cbf7aab5cbdfda2ab9762aa446e4500fbde6
                       1c96a316da514cb766e729d44ff66cccbf281077
                       229a0d78ad3a59f3e12ebb8fc706d2d0e469595f
                       6bb54caccf1abf89fec91bcdab425f5b2da0b492
                       6056b3d3d9279246b9dc47a1f7fd234fba2355a9
                       096a14dc9143c4a04667e7ae99e46cf63e384a4c
                       e2bc7f9ede6b0ea02ece8d023668969013fd3139
                       5f8ea9b4a66d3215de77ade67694f7354133b527
                       2ed43c863ffea7e195a0f2c47ab6e8631cc4b42c
                       9deeeb22cb36988fa213f9d0ec008f2de6f1e1ac
                       2162ee6220ddfecbdaa82190b8802a9d7a48866f
                       bb07b3cb209e37f9343ae6104ea9453b43f1f89d
                       2cb20df3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [75:41:e5:b5:fb:96:80:d4:03:c6:f6:75:4b:f5:cf:36:79:64:37:ca]
            modulus: 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
    public exponent: 10001

] 
2021-06-07 00:36:10.903  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-07 00:36:10.904 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-07 00:36:10.905 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-07 00:36:10.906 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-07 00:36:10.906  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-07 00:36:10.907  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-07 00:36:10.907  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-07 00:36:10.907  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-07 00:36:10.908  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-07 00:36:10.912  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-07 00:36:10.913  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-07 00:36:10.913  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-07 00:36:10.914  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-07 00:36:11.056  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-07 00:36:11.056  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-07 00:36:11.057 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-07 00:36:11.058 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-07 00:36:11.058  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1166
2021-06-07 00:36:11.059  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-07 00:36:11.060  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-07 00:36:11.060  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-07 00:36:11.060  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-07 00:36:11.100  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-07 00:36:11.101 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-07 00:36:11.101 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-07 00:36:11.102 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-07 00:36:11.103 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-07 00:36:11.103 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-07 00:36:11.104 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-07 00:36:11.105 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-07 00:36:11.109 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 182173638595080361481182345773442292530320055016
             IssuerDN: UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 06 23:06:41 UTC 2021
           Final Date: Fri Jun 06 23:06:41 UTC 2031
            SubjectDN: UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:a4:5f:2a:68:ca:5c:c5:44:c9:f8:54:5d:d4:08:16:1b:98:97:0a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 78d0add3d073b569ce74ad3123660dc9ecc49e47
                       29836e55e3f6bb42dce42671280dcfb9e006affd
                       df2fd29abe94225e1a7393c1640ab543866b22cc
                       d4957746cc82c6dc963365f979aa3a4801bc6b6e
                       3a1956e0cdd102dffe05f793f8c178fd1684c868
                       72d245d35f73bcbf080270ada18db8a08b132bbc
                       981a813440709a5ef314b91a815f08bb3f8d8a9d
                       17f9cbf7aab5cbdfda2ab9762aa446e4500fbde6
                       1c96a316da514cb766e729d44ff66cccbf281077
                       229a0d78ad3a59f3e12ebb8fc706d2d0e469595f
                       6bb54caccf1abf89fec91bcdab425f5b2da0b492
                       6056b3d3d9279246b9dc47a1f7fd234fba2355a9
                       096a14dc9143c4a04667e7ae99e46cf63e384a4c
                       e2bc7f9ede6b0ea02ece8d023668969013fd3139
                       5f8ea9b4a66d3215de77ade67694f7354133b527
                       2ed43c863ffea7e195a0f2c47ab6e8631cc4b42c
                       9deeeb22cb36988fa213f9d0ec008f2de6f1e1ac
                       2162ee6220ddfecbdaa82190b8802a9d7a48866f
                       bb07b3cb209e37f9343ae6104ea9453b43f1f89d
                       2cb20df3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f7:75:c0:c4:3c:3f:67:a9:f5:61:ef:be:0e:df:28:8e:76:7c:c5:fe]
            modulus: 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
    public exponent: 10001

] 
2021-06-07 00:36:54.244  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-07 00:36:54.301 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-07 00:36:54.303 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-06-07 00:36:54.304 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-07 00:36:54.304  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-06-07 00:36:54.305  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-07 00:36:54.305  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-07 00:36:54.305  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-07 00:36:54.306  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-07 00:36:54.313  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-07 00:36:54.313  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-07 00:36:54.314  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-07 00:36:54.315  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-07 00:36:54.506  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-07 00:36:54.506  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-07 00:36:54.507 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-07 00:36:54.508 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-07 00:36:54.509  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1166
2021-06-07 00:36:54.509  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-07 00:36:54.510  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-07 00:36:54.511  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-07 00:36:54.511  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-07 00:36:54.512  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-07 00:36:54.512 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-07 00:36:54.512 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-07 00:36:54.513 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-07 00:36:54.514 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-07 00:36:54.514 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-07 00:36:54.515 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-07 00:36:54.516 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-07 00:36:54.519 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 182173638595080361481182345773442292530320055016
             IssuerDN: UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 06 23:06:41 UTC 2021
           Final Date: Fri Jun 06 23:06:41 UTC 2031
            SubjectDN: UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:a4:5f:2a:68:ca:5c:c5:44:c9:f8:54:5d:d4:08:16:1b:98:97:0a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 78d0add3d073b569ce74ad3123660dc9ecc49e47
                       29836e55e3f6bb42dce42671280dcfb9e006affd
                       df2fd29abe94225e1a7393c1640ab543866b22cc
                       d4957746cc82c6dc963365f979aa3a4801bc6b6e
                       3a1956e0cdd102dffe05f793f8c178fd1684c868
                       72d245d35f73bcbf080270ada18db8a08b132bbc
                       981a813440709a5ef314b91a815f08bb3f8d8a9d
                       17f9cbf7aab5cbdfda2ab9762aa446e4500fbde6
                       1c96a316da514cb766e729d44ff66cccbf281077
                       229a0d78ad3a59f3e12ebb8fc706d2d0e469595f
                       6bb54caccf1abf89fec91bcdab425f5b2da0b492
                       6056b3d3d9279246b9dc47a1f7fd234fba2355a9
                       096a14dc9143c4a04667e7ae99e46cf63e384a4c
                       e2bc7f9ede6b0ea02ece8d023668969013fd3139
                       5f8ea9b4a66d3215de77ade67694f7354133b527
                       2ed43c863ffea7e195a0f2c47ab6e8631cc4b42c
                       9deeeb22cb36988fa213f9d0ec008f2de6f1e1ac
                       2162ee6220ddfecbdaa82190b8802a9d7a48866f
                       bb07b3cb209e37f9343ae6104ea9453b43f1f89d
                       2cb20df3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a0:17:d6:b8:85:e2:b4:7b:f6:0c:ea:f2:c5:6b:fb:70:c6:a7:dd:76]
            modulus: 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
    public exponent: 10001

] 
2021-06-07 00:37:39.277  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-07 00:37:39.279 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-07 00:37:39.281 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-06-07 00:37:39.281 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-07 00:37:39.282  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-06-07 00:37:39.282  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-07 00:37:39.283  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-07 00:37:39.283  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-07 00:37:39.284  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-07 00:37:39.288  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-07 00:37:39.289  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-07 00:37:39.289  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-07 00:37:39.290  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-07 00:37:39.379  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-07 00:37:39.379  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-07 00:37:39.380 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-07 00:37:39.400 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-07 00:37:39.401  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1166
2021-06-07 00:37:39.401  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-07 00:37:39.403  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-07 00:37:39.403  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-07 00:37:39.404  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-07 00:37:39.404  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-07 00:37:39.404 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-07 00:37:39.405 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-07 00:37:39.405 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-07 00:37:39.406 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-07 00:37:39.406 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-07 00:37:39.407 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-07 00:37:39.407 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-07 00:37:39.411 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 182173638595080361481182345773442292530320055016
             IssuerDN: UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 06 23:06:41 UTC 2021
           Final Date: Fri Jun 06 23:06:41 UTC 2031
            SubjectDN: UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:a4:5f:2a:68:ca:5c:c5:44:c9:f8:54:5d:d4:08:16:1b:98:97:0a]
            modulus: b5832cef4355b8f16d9c66b012a03ed3210b041c289ff733e86fe8f72d761e7560e586b1b225962d2f6a89c8202d864aa24960a1d65bf889eaf89b6f3b47b1c905d1168b339ed62acf7dde4ed6fb04617920e5747f4c853454c0b1e1bcd25040b0a920707cac90c24c041b8c8c79fed2ae482e95a2820362f0b7e8b4551a91fe7059a5cfb2da8c66a4ba71c1172d53eb39b5dccfa3ec9b88266928f4114865e82d80b6aaa43ad9b6ca5c9dc8d01fa4a27bc49def1ba00fc59c47e7e6bb98214aafee10fc853fd3393978e55e6645772aa59859d5620e133bfd8d0614e9ac0cd46eb5a8ad2d83691f5433f10289eb7151a3ebd4bd800e623b487bffac8eead6ec8bdf408b5faa911586c26caa9a626c4187e81be60a20c5ddd5888cc552df9421d9df743f2cd9022c57c90eef054492cc8a80a836d66362c36a52de8ea6319020e7068aa8f93c2cf4fb8cc8189ce5d2d48fea7f0893f9c506fa058a24ab772bad38711ec7e9330dbf69dc70b56918b9ba98d8d1aec557b99c5a8b66035c8003bd
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 78d0add3d073b569ce74ad3123660dc9ecc49e47
                       29836e55e3f6bb42dce42671280dcfb9e006affd
                       df2fd29abe94225e1a7393c1640ab543866b22cc
                       d4957746cc82c6dc963365f979aa3a4801bc6b6e
                       3a1956e0cdd102dffe05f793f8c178fd1684c868
                       72d245d35f73bcbf080270ada18db8a08b132bbc
                       981a813440709a5ef314b91a815f08bb3f8d8a9d
                       17f9cbf7aab5cbdfda2ab9762aa446e4500fbde6
                       1c96a316da514cb766e729d44ff66cccbf281077
                       229a0d78ad3a59f3e12ebb8fc706d2d0e469595f
                       6bb54caccf1abf89fec91bcdab425f5b2da0b492
                       6056b3d3d9279246b9dc47a1f7fd234fba2355a9
                       096a14dc9143c4a04667e7ae99e46cf63e384a4c
                       e2bc7f9ede6b0ea02ece8d023668969013fd3139
                       5f8ea9b4a66d3215de77ade67694f7354133b527
                       2ed43c863ffea7e195a0f2c47ab6e8631cc4b42c
                       9deeeb22cb36988fa213f9d0ec008f2de6f1e1ac
                       2162ee6220ddfecbdaa82190b8802a9d7a48866f
                       bb07b3cb209e37f9343ae6104ea9453b43f1f89d
                       2cb20df3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e5:0c:fa:08:8c:02:ed:79:15:b2:af:dd:bd:08:c4:9b:30:f2:8d:a3]
            modulus: 840eea5f5235f1372acbaad3ba93d31c6ae29f6acf57717f4010e9f436cfc38d6b267c8e48f74615130bd27860b57282afade2a4a26ed9c36fe01b106876da36fb3165e0efa1f83d9cbe279684e4b7301634cc439ca1bbaa7ccab0bab4dbcedeaf1dc5fee7c628f92075dfe35bdc8d7c25b92e08208f48eedd7be5c1a2a6903df1a8883af8ccfbb3be84404afb65e80ca3e356bb12c57c45f2399322aea89b8e8b04f249f88a5d299ab11fcc0a1e7aa932c2e8d48a3639e6839856dfcdd6fef60d020b5ce3d4110a82cc1056bf7436c27bd3766fbb9827d3f3fef0ff04142af0191b614590f585243777d86e6d0848530ee89cf2eea44995641e0337ef05671f
    public exponent: 10001

] 
2021-06-07 00:38:23.721  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-07 00:38:23.722 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-07 00:38:23.723 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-06-07 00:38:23.723 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-07 00:38:23.723  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-06-07 00:38:23.724  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-07 00:38:23.724  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-07 00:38:23.724  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-07 00:38:23.724  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-07 00:38:23.728  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-07 00:38:23.728  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-07 00:38:23.728  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-07 00:38:23.729  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-07 00:38:23.816  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-07 00:38:23.817  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-07 00:38:23.817 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-07 00:38:23.819 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-07 00:38:23.820  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1166
2021-06-07 00:38:23.820  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-07 00:38:23.822  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-07 00:38:23.823  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-07 00:38:23.823  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-07 00:38:23.823  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-07 00:38:23.823 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-07 00:38:23.824 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-07 00:38:23.824 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-07 00:38:23.824 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-07 00:38:23.825 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-07 00:38:23.825 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-07 00:38:23.826 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-07 00:38:23.829 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 182173638595080361481182345773442292530320055016
             IssuerDN: UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 06 23:06:41 UTC 2021
           Final Date: Fri Jun 06 23:06:41 UTC 2031
            SubjectDN: UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:a4:5f:2a:68:ca:5c:c5:44:c9:f8:54:5d:d4:08:16:1b:98:97:0a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 78d0add3d073b569ce74ad3123660dc9ecc49e47
                       29836e55e3f6bb42dce42671280dcfb9e006affd
                       df2fd29abe94225e1a7393c1640ab543866b22cc
                       d4957746cc82c6dc963365f979aa3a4801bc6b6e
                       3a1956e0cdd102dffe05f793f8c178fd1684c868
                       72d245d35f73bcbf080270ada18db8a08b132bbc
                       981a813440709a5ef314b91a815f08bb3f8d8a9d
                       17f9cbf7aab5cbdfda2ab9762aa446e4500fbde6
                       1c96a316da514cb766e729d44ff66cccbf281077
                       229a0d78ad3a59f3e12ebb8fc706d2d0e469595f
                       6bb54caccf1abf89fec91bcdab425f5b2da0b492
                       6056b3d3d9279246b9dc47a1f7fd234fba2355a9
                       096a14dc9143c4a04667e7ae99e46cf63e384a4c
                       e2bc7f9ede6b0ea02ece8d023668969013fd3139
                       5f8ea9b4a66d3215de77ade67694f7354133b527
                       2ed43c863ffea7e195a0f2c47ab6e8631cc4b42c
                       9deeeb22cb36988fa213f9d0ec008f2de6f1e1ac
                       2162ee6220ddfecbdaa82190b8802a9d7a48866f
                       bb07b3cb209e37f9343ae6104ea9453b43f1f89d
                       2cb20df3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [98:f0:e2:19:c6:8a:6e:fe:84:fd:43:93:56:96:fa:da:e6:4a:82:1a]
            modulus: 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
    public exponent: 10001

] 
2021-06-07 00:39:28.670  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-07 00:39:28.671 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-07 00:39:28.672 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-06-07 00:39:28.672 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-07 00:39:28.672  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-06-07 00:39:28.673  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-07 00:39:28.673  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-07 00:39:28.673  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-07 00:39:28.673  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-07 00:39:28.677  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-07 00:39:28.678  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-07 00:39:28.678  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-07 00:39:28.679  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-07 00:39:28.812  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-07 00:39:28.813  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-07 00:39:28.813 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-07 00:39:28.815 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-07 00:39:28.816  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1166
2021-06-07 00:39:28.816  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-07 00:39:28.818  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-07 00:39:28.819  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-07 00:39:28.820  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-07 00:39:28.820  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-07 00:39:28.821 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-07 00:39:28.821 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-07 00:39:28.821 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-07 00:39:28.822 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-07 00:39:28.823 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-07 00:39:28.823 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-07 00:39:28.824 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-07 00:39:28.826 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 182173638595080361481182345773442292530320055016
             IssuerDN: UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 06 23:06:41 UTC 2021
           Final Date: Fri Jun 06 23:06:41 UTC 2031
            SubjectDN: UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:a4:5f:2a:68:ca:5c:c5:44:c9:f8:54:5d:d4:08:16:1b:98:97:0a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 78d0add3d073b569ce74ad3123660dc9ecc49e47
                       29836e55e3f6bb42dce42671280dcfb9e006affd
                       df2fd29abe94225e1a7393c1640ab543866b22cc
                       d4957746cc82c6dc963365f979aa3a4801bc6b6e
                       3a1956e0cdd102dffe05f793f8c178fd1684c868
                       72d245d35f73bcbf080270ada18db8a08b132bbc
                       981a813440709a5ef314b91a815f08bb3f8d8a9d
                       17f9cbf7aab5cbdfda2ab9762aa446e4500fbde6
                       1c96a316da514cb766e729d44ff66cccbf281077
                       229a0d78ad3a59f3e12ebb8fc706d2d0e469595f
                       6bb54caccf1abf89fec91bcdab425f5b2da0b492
                       6056b3d3d9279246b9dc47a1f7fd234fba2355a9
                       096a14dc9143c4a04667e7ae99e46cf63e384a4c
                       e2bc7f9ede6b0ea02ece8d023668969013fd3139
                       5f8ea9b4a66d3215de77ade67694f7354133b527
                       2ed43c863ffea7e195a0f2c47ab6e8631cc4b42c
                       9deeeb22cb36988fa213f9d0ec008f2de6f1e1ac
                       2162ee6220ddfecbdaa82190b8802a9d7a48866f
                       bb07b3cb209e37f9343ae6104ea9453b43f1f89d
                       2cb20df3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [65:68:2f:6c:82:e3:d3:c2:df:fa:5f:4e:a2:80:7e:95:88:b3:b7:d2]
            modulus: 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
    public exponent: 10001

] 
2021-06-07 00:43:09.957  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-07 00:43:09.958 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-07 00:43:09.959 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-07 00:43:09.960 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-07 00:43:09.960  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-07 00:43:09.961  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-07 00:43:09.961  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-07 00:43:09.961  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-07 00:43:09.961  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-07 00:43:09.965  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-07 00:43:09.966  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-07 00:43:09.966  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-07 00:43:09.967  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-07 00:43:10.072  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-07 00:43:10.073  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-07 00:43:10.073 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-07 00:43:10.075 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-07 00:43:10.075  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1166
2021-06-07 00:43:10.076  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-07 00:43:10.077  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-07 00:43:10.077  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-07 00:43:10.078  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-07 00:43:10.078  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-07 00:43:10.078 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-07 00:43:10.079 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-07 00:43:10.079 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-07 00:43:10.080 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-07 00:43:10.080 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-07 00:43:10.080 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-07 00:43:10.081 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-07 00:43:10.084 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 182173638595080361481182345773442292530320055016
             IssuerDN: UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 06 23:06:41 UTC 2021
           Final Date: Fri Jun 06 23:06:41 UTC 2031
            SubjectDN: UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:a4:5f:2a:68:ca:5c:c5:44:c9:f8:54:5d:d4:08:16:1b:98:97:0a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 78d0add3d073b569ce74ad3123660dc9ecc49e47
                       29836e55e3f6bb42dce42671280dcfb9e006affd
                       df2fd29abe94225e1a7393c1640ab543866b22cc
                       d4957746cc82c6dc963365f979aa3a4801bc6b6e
                       3a1956e0cdd102dffe05f793f8c178fd1684c868
                       72d245d35f73bcbf080270ada18db8a08b132bbc
                       981a813440709a5ef314b91a815f08bb3f8d8a9d
                       17f9cbf7aab5cbdfda2ab9762aa446e4500fbde6
                       1c96a316da514cb766e729d44ff66cccbf281077
                       229a0d78ad3a59f3e12ebb8fc706d2d0e469595f
                       6bb54caccf1abf89fec91bcdab425f5b2da0b492
                       6056b3d3d9279246b9dc47a1f7fd234fba2355a9
                       096a14dc9143c4a04667e7ae99e46cf63e384a4c
                       e2bc7f9ede6b0ea02ece8d023668969013fd3139
                       5f8ea9b4a66d3215de77ade67694f7354133b527
                       2ed43c863ffea7e195a0f2c47ab6e8631cc4b42c
                       9deeeb22cb36988fa213f9d0ec008f2de6f1e1ac
                       2162ee6220ddfecbdaa82190b8802a9d7a48866f
                       bb07b3cb209e37f9343ae6104ea9453b43f1f89d
                       2cb20df3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4a:fd:99:6a:ca:40:21:ea:e9:ff:d5:3d:cc:90:86:16:12:b6:bb:08]
            modulus: 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
    public exponent: 10001

] 
2021-06-07 00:46:07.106  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-07 00:46:07.107 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-07 00:46:07.108 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-07 00:46:07.108 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-07 00:46:07.108  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-07 00:46:07.109  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-07 00:46:07.109  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-07 00:46:07.110  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-07 00:46:07.110  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-07 00:46:07.116  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-07 00:46:07.117  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-07 00:46:07.117  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-07 00:46:07.118  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-07 00:46:07.299  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-07 00:46:07.299  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-07 00:46:07.300 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-07 00:46:07.301 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-07 00:46:07.301  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1166
2021-06-07 00:46:07.301  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-07 00:46:07.302  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-07 00:46:07.302  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-07 00:46:07.303  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-07 00:46:07.303  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-07 00:46:07.303 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-07 00:46:07.303 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-07 00:46:07.303 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-07 00:46:07.304 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-07 00:46:07.304 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-07 00:46:07.304 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-07 00:46:07.305 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-07 00:46:07.307 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 182173638595080361481182345773442292530320055016
             IssuerDN: UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 06 23:06:41 UTC 2021
           Final Date: Fri Jun 06 23:06:41 UTC 2031
            SubjectDN: UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:a4:5f:2a:68:ca:5c:c5:44:c9:f8:54:5d:d4:08:16:1b:98:97:0a]
            modulus: b5832cef4355b8f16d9c66b012a03ed3210b041c289ff733e86fe8f72d761e7560e586b1b225962d2f6a89c8202d864aa24960a1d65bf889eaf89b6f3b47b1c905d1168b339ed62acf7dde4ed6fb04617920e5747f4c853454c0b1e1bcd25040b0a920707cac90c24c041b8c8c79fed2ae482e95a2820362f0b7e8b4551a91fe7059a5cfb2da8c66a4ba71c1172d53eb39b5dccfa3ec9b88266928f4114865e82d80b6aaa43ad9b6ca5c9dc8d01fa4a27bc49def1ba00fc59c47e7e6bb98214aafee10fc853fd3393978e55e6645772aa59859d5620e133bfd8d0614e9ac0cd46eb5a8ad2d83691f5433f10289eb7151a3ebd4bd800e623b487bffac8eead6ec8bdf408b5faa911586c26caa9a626c4187e81be60a20c5ddd5888cc552df9421d9df743f2cd9022c57c90eef054492cc8a80a836d66362c36a52de8ea6319020e7068aa8f93c2cf4fb8cc8189ce5d2d48fea7f0893f9c506fa058a24ab772bad38711ec7e9330dbf69dc70b56918b9ba98d8d1aec557b99c5a8b66035c8003bd
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 78d0add3d073b569ce74ad3123660dc9ecc49e47
                       29836e55e3f6bb42dce42671280dcfb9e006affd
                       df2fd29abe94225e1a7393c1640ab543866b22cc
                       d4957746cc82c6dc963365f979aa3a4801bc6b6e
                       3a1956e0cdd102dffe05f793f8c178fd1684c868
                       72d245d35f73bcbf080270ada18db8a08b132bbc
                       981a813440709a5ef314b91a815f08bb3f8d8a9d
                       17f9cbf7aab5cbdfda2ab9762aa446e4500fbde6
                       1c96a316da514cb766e729d44ff66cccbf281077
                       229a0d78ad3a59f3e12ebb8fc706d2d0e469595f
                       6bb54caccf1abf89fec91bcdab425f5b2da0b492
                       6056b3d3d9279246b9dc47a1f7fd234fba2355a9
                       096a14dc9143c4a04667e7ae99e46cf63e384a4c
                       e2bc7f9ede6b0ea02ece8d023668969013fd3139
                       5f8ea9b4a66d3215de77ade67694f7354133b527
                       2ed43c863ffea7e195a0f2c47ab6e8631cc4b42c
                       9deeeb22cb36988fa213f9d0ec008f2de6f1e1ac
                       2162ee6220ddfecbdaa82190b8802a9d7a48866f
                       bb07b3cb209e37f9343ae6104ea9453b43f1f89d
                       2cb20df3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b2:d4:9e:23:1d:b8:14:af:99:67:bc:df:9d:a0:41:be:4d:17:ae:03]
            modulus: 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
    public exponent: 10001

] 
2021-06-07 00:48:03.434  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-07 00:48:03.435 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-07 00:48:03.437 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-07 00:48:03.437 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-07 00:48:03.438  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-07 00:48:03.438  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-07 00:48:03.438  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-07 00:48:03.439  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-07 00:48:03.439  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-07 00:48:03.442  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-07 00:48:03.443  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-07 00:48:03.443  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-07 00:48:03.443  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-07 00:48:03.562  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-07 00:48:03.562  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-07 00:48:03.562 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-07 00:48:03.563 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-07 00:48:03.564  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1166
2021-06-07 00:48:03.564  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-07 00:48:03.599  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-07 00:48:03.600  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-07 00:48:03.600  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-07 00:48:03.600  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-07 00:48:03.601 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-07 00:48:03.601 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-07 00:48:03.601 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-07 00:48:03.601 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-07 00:48:03.602 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-07 00:48:03.602 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-07 00:48:03.602 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-07 00:48:03.604 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 182173638595080361481182345773442292530320055016
             IssuerDN: UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 06 23:06:41 UTC 2021
           Final Date: Fri Jun 06 23:06:41 UTC 2031
            SubjectDN: UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:a4:5f:2a:68:ca:5c:c5:44:c9:f8:54:5d:d4:08:16:1b:98:97:0a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 78d0add3d073b569ce74ad3123660dc9ecc49e47
                       29836e55e3f6bb42dce42671280dcfb9e006affd
                       df2fd29abe94225e1a7393c1640ab543866b22cc
                       d4957746cc82c6dc963365f979aa3a4801bc6b6e
                       3a1956e0cdd102dffe05f793f8c178fd1684c868
                       72d245d35f73bcbf080270ada18db8a08b132bbc
                       981a813440709a5ef314b91a815f08bb3f8d8a9d
                       17f9cbf7aab5cbdfda2ab9762aa446e4500fbde6
                       1c96a316da514cb766e729d44ff66cccbf281077
                       229a0d78ad3a59f3e12ebb8fc706d2d0e469595f
                       6bb54caccf1abf89fec91bcdab425f5b2da0b492
                       6056b3d3d9279246b9dc47a1f7fd234fba2355a9
                       096a14dc9143c4a04667e7ae99e46cf63e384a4c
                       e2bc7f9ede6b0ea02ece8d023668969013fd3139
                       5f8ea9b4a66d3215de77ade67694f7354133b527
                       2ed43c863ffea7e195a0f2c47ab6e8631cc4b42c
                       9deeeb22cb36988fa213f9d0ec008f2de6f1e1ac
                       2162ee6220ddfecbdaa82190b8802a9d7a48866f
                       bb07b3cb209e37f9343ae6104ea9453b43f1f89d
                       2cb20df3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b2:0d:df:de:5f:ee:72:ad:df:ce:6d:25:e4:50:f2:e3:01:45:d4:fb]
            modulus: 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
    public exponent: 10001

] 
2021-06-07 00:49:30.229  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-07 00:49:30.230 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-07 00:49:30.232 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-07 00:49:30.232 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-07 00:49:30.233  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-07 00:49:30.233  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-07 00:49:30.233  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-07 00:49:30.234  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-07 00:49:30.234  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-07 00:49:30.239  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-07 00:49:30.240  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-07 00:49:30.240  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-07 00:49:30.240  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-07 00:49:30.351  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-07 00:49:30.351  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-07 00:49:30.351 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-07 00:49:30.352 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-07 00:49:30.353  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1166
2021-06-07 00:49:30.353  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-07 00:49:30.353  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-07 00:49:30.353  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-07 00:49:30.354  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-07 00:49:30.354  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-07 00:49:30.354 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-07 00:49:30.354 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-07 00:49:30.354 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-07 00:49:30.354 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-07 00:49:30.355 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-07 00:49:30.355 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-07 00:49:30.355 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-07 00:49:30.357 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 182173638595080361481182345773442292530320055016
             IssuerDN: UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 06 23:06:41 UTC 2021
           Final Date: Fri Jun 06 23:06:41 UTC 2031
            SubjectDN: UID=c-08bd63e5bb4446a55,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [59:a4:5f:2a:68:ca:5c:c5:44:c9:f8:54:5d:d4:08:16:1b:98:97:0a]
            modulus: b5832cef4355b8f16d9c66b012a03ed3210b041c289ff733e86fe8f72d761e7560e586b1b225962d2f6a89c8202d864aa24960a1d65bf889eaf89b6f3b47b1c905d1168b339ed62acf7dde4ed6fb04617920e5747f4c853454c0b1e1bcd25040b0a920707cac90c24c041b8c8c79fed2ae482e95a2820362f0b7e8b4551a91fe7059a5cfb2da8c66a4ba71c1172d53eb39b5dccfa3ec9b88266928f4114865e82d80b6aaa43ad9b6ca5c9dc8d01fa4a27bc49def1ba00fc59c47e7e6bb98214aafee10fc853fd3393978e55e6645772aa59859d5620e133bfd8d0614e9ac0cd46eb5a8ad2d83691f5433f10289eb7151a3ebd4bd800e623b487bffac8eead6ec8bdf408b5faa911586c26caa9a626c4187e81be60a20c5ddd5888cc552df9421d9df743f2cd9022c57c90eef054492cc8a80a836d66362c36a52de8ea6319020e7068aa8f93c2cf4fb8cc8189ce5d2d48fea7f0893f9c506fa058a24ab772bad38711ec7e9330dbf69dc70b56918b9ba98d8d1aec557b99c5a8b66035c8003bd
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 78d0add3d073b569ce74ad3123660dc9ecc49e47
                       29836e55e3f6bb42dce42671280dcfb9e006affd
                       df2fd29abe94225e1a7393c1640ab543866b22cc
                       d4957746cc82c6dc963365f979aa3a4801bc6b6e
                       3a1956e0cdd102dffe05f793f8c178fd1684c868
                       72d245d35f73bcbf080270ada18db8a08b132bbc
                       981a813440709a5ef314b91a815f08bb3f8d8a9d
                       17f9cbf7aab5cbdfda2ab9762aa446e4500fbde6
                       1c96a316da514cb766e729d44ff66cccbf281077
                       229a0d78ad3a59f3e12ebb8fc706d2d0e469595f
                       6bb54caccf1abf89fec91bcdab425f5b2da0b492
                       6056b3d3d9279246b9dc47a1f7fd234fba2355a9
                       096a14dc9143c4a04667e7ae99e46cf63e384a4c
                       e2bc7f9ede6b0ea02ece8d023668969013fd3139
                       5f8ea9b4a66d3215de77ade67694f7354133b527
                       2ed43c863ffea7e195a0f2c47ab6e8631cc4b42c
                       9deeeb22cb36988fa213f9d0ec008f2de6f1e1ac
                       2162ee6220ddfecbdaa82190b8802a9d7a48866f
                       bb07b3cb209e37f9343ae6104ea9453b43f1f89d
                       2cb20df3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cf:9f:0d:93:e2:68:41:26:30:2a:2b:f1:5f:00:1a:f2:d7:64:b3:38]
            modulus: 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
    public exponent: 10001

]