Results

By type

          2021-06-10 23:28:45,324 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-06-10 23:28:49,508 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-06-10 23:28:52.811  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-06-10 23:29:05.614 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-06-10 23:29:06.629  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-06-10 23:29:07.424  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-06-10 23:29:22.413  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 39.591 seconds (JVM running for 47.08)
2021-06-10 23:39:15.417  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-10 23:39:15.516 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-10 23:39:15.617 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-06-10 23:39:15.624 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-10 23:39:15.722  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-06-10 23:39:15.810  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-10 23:39:15.817  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-10 23:39:15.818  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-10 23:39:15.819  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-10 23:39:15.828  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-10 23:39:15.831  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-10 23:39:16.021  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-10 23:39:16.028  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-10 23:39:16.107  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-10 23:39:16.127  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-10 23:39:17.424  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-10 23:39:17.427  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-10 23:39:17.428 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-10 23:39:17.511 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-10 23:39:17.514  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1790
2021-06-10 23:39:17.515  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-10 23:39:17.521  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-10 23:39:17.522  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-10 23:39:17.608  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-10 23:39:17.610  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-10 23:39:17.611 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-10 23:39:17.611 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-10 23:39:17.612 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-10 23:39:17.624 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-10 23:39:17.625 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-10 23:39:17.625 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-10 23:39:17.718 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-10 23:39:17.825 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 43196641378737765190877743851558611857862293666
             IssuerDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 10 23:22:58 UTC 2021
           Final Date: Tue Jun 10 23:22:58 UTC 2031
            SubjectDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:5e:69:11:31:25:61:00:bb:6b:c0:12:1e:ff:47:fc:11:15:f7:bf]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8e7bad8bf469fe94368fc2421fdba622fa01c696
                       d150f02af14251214c92b91d9a3ee1b03b847672
                       4703a843d9ac0848bf84cc5ae5f899853f5028d7
                       92f983fa1215408c9da510ea69e507fe8fe97963
                       41b741bd5cafbb5af3004a53326757fc9f2e40bc
                       f353bf3563bdc32f8c78f944c7282a8652b2f6f3
                       73b2f97dae962f8acbdafb7b2a9d574845ca01c3
                       c385067c88591e7dfbfff9a450ae88665708f481
                       6a733d1cc426c96eddbe70e63435363dd83a577a
                       3d76951a682d870efa1ee98ba9377a2067bb1101
                       fb55531558ef9535d703e29f0cf21398262cfb5d
                       c713257eb05513e39d1a92c628b2e637b5ee4957
                       968c80f67c938ff7ac4f3fe86d986b5f62b544d3
                       1da93e391dc5a1a46a94475d4f48dabc5ab4ce79
                       7034efdc8e6414e6e0db734bc0d692c6b33838c2
                       a42ebaeea6826f019b8f546b82f7bd676376f1dc
                       c055e264e973189c1c6f0ccc4cc996b4095c7c39
                       d25565e5fe495e8754e7e7e877c80c2903f442c1
                       cf1ee16a0d1346a0962f00adc0f93b8fb3e489df
                       f4c5aa88
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d7:fb:40:66:3b:7f:9c:4d:ee:2a:96:82:be:f6:3a:54:d2:4a:00:de]
            modulus: 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
    public exponent: 10001

] 
2021-06-11 01:13:23.175  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-11 01:13:23.182 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-11 01:13:23.209 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-11 01:13:23.214 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-11 01:13:23.215  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-11 01:13:23.216  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-11 01:13:23.217  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-11 01:13:23.224  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-11 01:13:23.227  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-11 01:13:23.311  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-11 01:13:23.313  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 01:13:23.313  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 01:13:23.318  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-11 01:13:23.508  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-11 01:13:23.509  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-11 01:13:23.510 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-11 01:13:23.515 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-11 01:13:23.516  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1790
2021-06-11 01:13:23.517  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-11 01:13:23.523  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-11 01:13:23.524  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-11 01:13:23.524  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-11 01:13:23.525  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-11 01:13:23.525 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 01:13:23.525 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 01:13:23.526 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 01:13:23.527 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 01:13:23.527 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 01:13:23.528 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 01:13:23.609 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-11 01:13:23.615 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 43196641378737765190877743851558611857862293666
             IssuerDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 10 23:22:58 UTC 2021
           Final Date: Tue Jun 10 23:22:58 UTC 2031
            SubjectDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:5e:69:11:31:25:61:00:bb:6b:c0:12:1e:ff:47:fc:11:15:f7:bf]
            modulus: a020c5878580146f517e7fd7523c0a1102a3d8ad9e90d7dfcbda3d12794ca253761a09fff538d251aa9fef7afdfa6be33f0e0ccd1a274a28f20e4160f1421c220d4bb09a00e8276e662ae4ad6908e1fc327846fe9dd214aadc4a37c5a927df5b32e3c45ca54a4c2e65d4a1d271d5c6ed09cf88d9431799ec8ec7bed6353ff2c1f7fe53b6c961bbd65b4fda599963cca2b16c6ffa82b6ef6bf7ec40dab71f4a9b2a189926bbcf48a4dc3b98ea19f57a3aa8c41fcb63ea2dda4a8a185c14423b1b09be59992cdffee4bb940668e567dcb29cf257858308810792a19a0a6132c17b945a9fc536d420a8653a2f175060a9bc521c07ff6de82e6a70797d8273533d3089ca4b252c0d24eb2f29da0b6bf4d39869bd6a36cd68085aaf63eb1a925726d528b81bfef360de2bb7e4bcdbb65b9b220ea543131adbc84145b9081578ff82e2e67ef9846d48c96eec9fe24f7168e2432ce4fe228130a9a16b4b81cadd7415a99fb21fc7de10eb8c6c2aa1c23a31333317e077faecec99b40c57124439bb6c09
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8e7bad8bf469fe94368fc2421fdba622fa01c696
                       d150f02af14251214c92b91d9a3ee1b03b847672
                       4703a843d9ac0848bf84cc5ae5f899853f5028d7
                       92f983fa1215408c9da510ea69e507fe8fe97963
                       41b741bd5cafbb5af3004a53326757fc9f2e40bc
                       f353bf3563bdc32f8c78f944c7282a8652b2f6f3
                       73b2f97dae962f8acbdafb7b2a9d574845ca01c3
                       c385067c88591e7dfbfff9a450ae88665708f481
                       6a733d1cc426c96eddbe70e63435363dd83a577a
                       3d76951a682d870efa1ee98ba9377a2067bb1101
                       fb55531558ef9535d703e29f0cf21398262cfb5d
                       c713257eb05513e39d1a92c628b2e637b5ee4957
                       968c80f67c938ff7ac4f3fe86d986b5f62b544d3
                       1da93e391dc5a1a46a94475d4f48dabc5ab4ce79
                       7034efdc8e6414e6e0db734bc0d692c6b33838c2
                       a42ebaeea6826f019b8f546b82f7bd676376f1dc
                       c055e264e973189c1c6f0ccc4cc996b4095c7c39
                       d25565e5fe495e8754e7e7e877c80c2903f442c1
                       cf1ee16a0d1346a0962f00adc0f93b8fb3e489df
                       f4c5aa88
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [11:8e:ca:a3:7a:bb:16:45:64:c8:eb:48:2e:27:ac:70:9a:60:3b:ab]
            modulus: 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
    public exponent: 10001

] 
2021-06-11 01:15:10.013  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-11 01:15:10.014 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-11 01:15:10.015 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-06-11 01:15:10.015 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-11 01:15:10.016  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-06-11 01:15:10.016  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-11 01:15:10.017  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-11 01:15:10.017  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-11 01:15:10.018  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-11 01:15:10.022  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-11 01:15:10.023  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 01:15:10.023  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 01:15:10.024  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-11 01:15:10.127  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-11 01:15:10.128  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-11 01:15:10.128 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-11 01:15:10.131 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-11 01:15:10.132  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1790
2021-06-11 01:15:10.132  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-11 01:15:10.135  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-11 01:15:10.136  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-11 01:15:10.137  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-11 01:15:10.137  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-11 01:15:10.138 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 01:15:10.138 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 01:15:10.139 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 01:15:10.208 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 01:15:10.209 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 01:15:10.209 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 01:15:10.210 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-11 01:15:10.214 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 43196641378737765190877743851558611857862293666
             IssuerDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 10 23:22:58 UTC 2021
           Final Date: Tue Jun 10 23:22:58 UTC 2031
            SubjectDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:5e:69:11:31:25:61:00:bb:6b:c0:12:1e:ff:47:fc:11:15:f7:bf]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8e7bad8bf469fe94368fc2421fdba622fa01c696
                       d150f02af14251214c92b91d9a3ee1b03b847672
                       4703a843d9ac0848bf84cc5ae5f899853f5028d7
                       92f983fa1215408c9da510ea69e507fe8fe97963
                       41b741bd5cafbb5af3004a53326757fc9f2e40bc
                       f353bf3563bdc32f8c78f944c7282a8652b2f6f3
                       73b2f97dae962f8acbdafb7b2a9d574845ca01c3
                       c385067c88591e7dfbfff9a450ae88665708f481
                       6a733d1cc426c96eddbe70e63435363dd83a577a
                       3d76951a682d870efa1ee98ba9377a2067bb1101
                       fb55531558ef9535d703e29f0cf21398262cfb5d
                       c713257eb05513e39d1a92c628b2e637b5ee4957
                       968c80f67c938ff7ac4f3fe86d986b5f62b544d3
                       1da93e391dc5a1a46a94475d4f48dabc5ab4ce79
                       7034efdc8e6414e6e0db734bc0d692c6b33838c2
                       a42ebaeea6826f019b8f546b82f7bd676376f1dc
                       c055e264e973189c1c6f0ccc4cc996b4095c7c39
                       d25565e5fe495e8754e7e7e877c80c2903f442c1
                       cf1ee16a0d1346a0962f00adc0f93b8fb3e489df
                       f4c5aa88
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3e:15:de:6a:69:fd:9f:d7:a1:d4:8f:56:e3:16:e7:a1:f0:36:63:e3]
            modulus: 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
    public exponent: 10001

] 
2021-06-11 01:18:34.069  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-11 01:18:34.071 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-11 01:18:34.072 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-06-11 01:18:34.073 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-11 01:18:34.073  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-06-11 01:18:34.074  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-11 01:18:34.074  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-11 01:18:34.074  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-11 01:18:34.075  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-11 01:18:34.083  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-11 01:18:34.084  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 01:18:34.108  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 01:18:34.110  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-11 01:18:34.199  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-11 01:18:34.208  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-11 01:18:34.208 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-11 01:18:34.215 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-11 01:18:34.216  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1790
2021-06-11 01:18:34.216  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-11 01:18:34.217  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-11 01:18:34.218  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-11 01:18:34.218  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-11 01:18:34.218  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-11 01:18:34.219 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 01:18:34.219 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 01:18:34.219 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 01:18:34.220 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 01:18:34.220 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 01:18:34.220 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 01:18:34.221 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-11 01:18:34.224 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 43196641378737765190877743851558611857862293666
             IssuerDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 10 23:22:58 UTC 2021
           Final Date: Tue Jun 10 23:22:58 UTC 2031
            SubjectDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:5e:69:11:31:25:61:00:bb:6b:c0:12:1e:ff:47:fc:11:15:f7:bf]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8e7bad8bf469fe94368fc2421fdba622fa01c696
                       d150f02af14251214c92b91d9a3ee1b03b847672
                       4703a843d9ac0848bf84cc5ae5f899853f5028d7
                       92f983fa1215408c9da510ea69e507fe8fe97963
                       41b741bd5cafbb5af3004a53326757fc9f2e40bc
                       f353bf3563bdc32f8c78f944c7282a8652b2f6f3
                       73b2f97dae962f8acbdafb7b2a9d574845ca01c3
                       c385067c88591e7dfbfff9a450ae88665708f481
                       6a733d1cc426c96eddbe70e63435363dd83a577a
                       3d76951a682d870efa1ee98ba9377a2067bb1101
                       fb55531558ef9535d703e29f0cf21398262cfb5d
                       c713257eb05513e39d1a92c628b2e637b5ee4957
                       968c80f67c938ff7ac4f3fe86d986b5f62b544d3
                       1da93e391dc5a1a46a94475d4f48dabc5ab4ce79
                       7034efdc8e6414e6e0db734bc0d692c6b33838c2
                       a42ebaeea6826f019b8f546b82f7bd676376f1dc
                       c055e264e973189c1c6f0ccc4cc996b4095c7c39
                       d25565e5fe495e8754e7e7e877c80c2903f442c1
                       cf1ee16a0d1346a0962f00adc0f93b8fb3e489df
                       f4c5aa88
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d5:77:15:bc:10:11:50:7b:c6:e9:6b:57:f5:f9:0a:6b:ad:52:ce:83]
            modulus: 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
    public exponent: 10001

] 
2021-06-11 01:18:44.731  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-11 01:18:44.732 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-11 01:18:44.734 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-11 01:18:44.734 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-11 01:18:44.734  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-11 01:18:44.735  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-11 01:18:44.735  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-11 01:18:44.736  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-11 01:18:44.736  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-11 01:18:44.740  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-11 01:18:44.740  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 01:18:44.741  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 01:18:44.742  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-11 01:18:44.897  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-11 01:18:44.898  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-11 01:18:44.898 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-11 01:18:44.900 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-11 01:18:44.909  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1790
2021-06-11 01:18:44.910  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-11 01:18:44.911  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-11 01:18:44.912  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-11 01:18:44.912  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-11 01:18:44.912  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-11 01:18:44.913 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 01:18:44.913 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 01:18:44.913 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 01:18:44.914 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 01:18:44.914 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 01:18:44.914 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 01:18:44.915 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-11 01:18:44.918 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 43196641378737765190877743851558611857862293666
             IssuerDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 10 23:22:58 UTC 2021
           Final Date: Tue Jun 10 23:22:58 UTC 2031
            SubjectDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:5e:69:11:31:25:61:00:bb:6b:c0:12:1e:ff:47:fc:11:15:f7:bf]
            modulus: a020c5878580146f517e7fd7523c0a1102a3d8ad9e90d7dfcbda3d12794ca253761a09fff538d251aa9fef7afdfa6be33f0e0ccd1a274a28f20e4160f1421c220d4bb09a00e8276e662ae4ad6908e1fc327846fe9dd214aadc4a37c5a927df5b32e3c45ca54a4c2e65d4a1d271d5c6ed09cf88d9431799ec8ec7bed6353ff2c1f7fe53b6c961bbd65b4fda599963cca2b16c6ffa82b6ef6bf7ec40dab71f4a9b2a189926bbcf48a4dc3b98ea19f57a3aa8c41fcb63ea2dda4a8a185c14423b1b09be59992cdffee4bb940668e567dcb29cf257858308810792a19a0a6132c17b945a9fc536d420a8653a2f175060a9bc521c07ff6de82e6a70797d8273533d3089ca4b252c0d24eb2f29da0b6bf4d39869bd6a36cd68085aaf63eb1a925726d528b81bfef360de2bb7e4bcdbb65b9b220ea543131adbc84145b9081578ff82e2e67ef9846d48c96eec9fe24f7168e2432ce4fe228130a9a16b4b81cadd7415a99fb21fc7de10eb8c6c2aa1c23a31333317e077faecec99b40c57124439bb6c09
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8e7bad8bf469fe94368fc2421fdba622fa01c696
                       d150f02af14251214c92b91d9a3ee1b03b847672
                       4703a843d9ac0848bf84cc5ae5f899853f5028d7
                       92f983fa1215408c9da510ea69e507fe8fe97963
                       41b741bd5cafbb5af3004a53326757fc9f2e40bc
                       f353bf3563bdc32f8c78f944c7282a8652b2f6f3
                       73b2f97dae962f8acbdafb7b2a9d574845ca01c3
                       c385067c88591e7dfbfff9a450ae88665708f481
                       6a733d1cc426c96eddbe70e63435363dd83a577a
                       3d76951a682d870efa1ee98ba9377a2067bb1101
                       fb55531558ef9535d703e29f0cf21398262cfb5d
                       c713257eb05513e39d1a92c628b2e637b5ee4957
                       968c80f67c938ff7ac4f3fe86d986b5f62b544d3
                       1da93e391dc5a1a46a94475d4f48dabc5ab4ce79
                       7034efdc8e6414e6e0db734bc0d692c6b33838c2
                       a42ebaeea6826f019b8f546b82f7bd676376f1dc
                       c055e264e973189c1c6f0ccc4cc996b4095c7c39
                       d25565e5fe495e8754e7e7e877c80c2903f442c1
                       cf1ee16a0d1346a0962f00adc0f93b8fb3e489df
                       f4c5aa88
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2f:e5:69:13:65:c6:be:7f:c6:d2:17:93:b4:b4:03:87:b3:ea:e8:fa]
            modulus: 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
    public exponent: 10001

] 
2021-06-11 01:19:01.878  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-11 01:19:01.879 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-11 01:19:01.880 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-11 01:19:01.881 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-11 01:19:01.881  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-11 01:19:01.882  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-11 01:19:01.882  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-11 01:19:01.883  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-11 01:19:01.883  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-11 01:19:01.888  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-11 01:19:01.888  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 01:19:01.888  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 01:19:01.890  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-11 01:19:01.970  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-11 01:19:01.971  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-11 01:19:01.971 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-11 01:19:02.008 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-11 01:19:02.009  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1790
2021-06-11 01:19:02.010  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-11 01:19:02.011  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-11 01:19:02.012  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-11 01:19:02.012  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-11 01:19:02.013  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-11 01:19:02.013 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 01:19:02.013 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 01:19:02.014 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 01:19:02.014 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 01:19:02.015 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 01:19:02.015 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 01:19:02.016 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-11 01:19:02.020 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 43196641378737765190877743851558611857862293666
             IssuerDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 10 23:22:58 UTC 2021
           Final Date: Tue Jun 10 23:22:58 UTC 2031
            SubjectDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:5e:69:11:31:25:61:00:bb:6b:c0:12:1e:ff:47:fc:11:15:f7:bf]
            modulus: a020c5878580146f517e7fd7523c0a1102a3d8ad9e90d7dfcbda3d12794ca253761a09fff538d251aa9fef7afdfa6be33f0e0ccd1a274a28f20e4160f1421c220d4bb09a00e8276e662ae4ad6908e1fc327846fe9dd214aadc4a37c5a927df5b32e3c45ca54a4c2e65d4a1d271d5c6ed09cf88d9431799ec8ec7bed6353ff2c1f7fe53b6c961bbd65b4fda599963cca2b16c6ffa82b6ef6bf7ec40dab71f4a9b2a189926bbcf48a4dc3b98ea19f57a3aa8c41fcb63ea2dda4a8a185c14423b1b09be59992cdffee4bb940668e567dcb29cf257858308810792a19a0a6132c17b945a9fc536d420a8653a2f175060a9bc521c07ff6de82e6a70797d8273533d3089ca4b252c0d24eb2f29da0b6bf4d39869bd6a36cd68085aaf63eb1a925726d528b81bfef360de2bb7e4bcdbb65b9b220ea543131adbc84145b9081578ff82e2e67ef9846d48c96eec9fe24f7168e2432ce4fe228130a9a16b4b81cadd7415a99fb21fc7de10eb8c6c2aa1c23a31333317e077faecec99b40c57124439bb6c09
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8e7bad8bf469fe94368fc2421fdba622fa01c696
                       d150f02af14251214c92b91d9a3ee1b03b847672
                       4703a843d9ac0848bf84cc5ae5f899853f5028d7
                       92f983fa1215408c9da510ea69e507fe8fe97963
                       41b741bd5cafbb5af3004a53326757fc9f2e40bc
                       f353bf3563bdc32f8c78f944c7282a8652b2f6f3
                       73b2f97dae962f8acbdafb7b2a9d574845ca01c3
                       c385067c88591e7dfbfff9a450ae88665708f481
                       6a733d1cc426c96eddbe70e63435363dd83a577a
                       3d76951a682d870efa1ee98ba9377a2067bb1101
                       fb55531558ef9535d703e29f0cf21398262cfb5d
                       c713257eb05513e39d1a92c628b2e637b5ee4957
                       968c80f67c938ff7ac4f3fe86d986b5f62b544d3
                       1da93e391dc5a1a46a94475d4f48dabc5ab4ce79
                       7034efdc8e6414e6e0db734bc0d692c6b33838c2
                       a42ebaeea6826f019b8f546b82f7bd676376f1dc
                       c055e264e973189c1c6f0ccc4cc996b4095c7c39
                       d25565e5fe495e8754e7e7e877c80c2903f442c1
                       cf1ee16a0d1346a0962f00adc0f93b8fb3e489df
                       f4c5aa88
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5e:fc:77:ba:e0:d4:30:f7:81:9b:0d:74:70:bd:9a:d2:7a:b2:9b:b9]
            modulus: 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
    public exponent: 10001

] 
2021-06-11 01:19:06.636  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-11 01:19:06.638 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-11 01:19:06.639 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-06-11 01:19:06.640 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-11 01:19:06.640  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-06-11 01:19:06.641  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-11 01:19:06.641  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-11 01:19:06.641  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-11 01:19:06.642  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-11 01:19:06.646  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-11 01:19:06.646  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 01:19:06.646  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 01:19:06.648  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-11 01:19:06.808  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-11 01:19:06.809  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-11 01:19:06.809 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-11 01:19:06.811 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-11 01:19:06.812  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1790
2021-06-11 01:19:06.812  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-11 01:19:06.815  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-11 01:19:06.815  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-11 01:19:06.815  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-11 01:19:06.816  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-11 01:19:06.816 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 01:19:06.816 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 01:19:06.816 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 01:19:06.817 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 01:19:06.817 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 01:19:06.818 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 01:19:06.818 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-11 01:19:06.820 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 43196641378737765190877743851558611857862293666
             IssuerDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 10 23:22:58 UTC 2021
           Final Date: Tue Jun 10 23:22:58 UTC 2031
            SubjectDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:5e:69:11:31:25:61:00:bb:6b:c0:12:1e:ff:47:fc:11:15:f7:bf]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8e7bad8bf469fe94368fc2421fdba622fa01c696
                       d150f02af14251214c92b91d9a3ee1b03b847672
                       4703a843d9ac0848bf84cc5ae5f899853f5028d7
                       92f983fa1215408c9da510ea69e507fe8fe97963
                       41b741bd5cafbb5af3004a53326757fc9f2e40bc
                       f353bf3563bdc32f8c78f944c7282a8652b2f6f3
                       73b2f97dae962f8acbdafb7b2a9d574845ca01c3
                       c385067c88591e7dfbfff9a450ae88665708f481
                       6a733d1cc426c96eddbe70e63435363dd83a577a
                       3d76951a682d870efa1ee98ba9377a2067bb1101
                       fb55531558ef9535d703e29f0cf21398262cfb5d
                       c713257eb05513e39d1a92c628b2e637b5ee4957
                       968c80f67c938ff7ac4f3fe86d986b5f62b544d3
                       1da93e391dc5a1a46a94475d4f48dabc5ab4ce79
                       7034efdc8e6414e6e0db734bc0d692c6b33838c2
                       a42ebaeea6826f019b8f546b82f7bd676376f1dc
                       c055e264e973189c1c6f0ccc4cc996b4095c7c39
                       d25565e5fe495e8754e7e7e877c80c2903f442c1
                       cf1ee16a0d1346a0962f00adc0f93b8fb3e489df
                       f4c5aa88
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9a:38:39:b2:37:a6:d0:a1:74:75:50:46:79:47:de:ea:3c:0a:67:73]
            modulus: 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
    public exponent: 10001

] 
2021-06-11 01:20:53.637  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-11 01:20:53.638 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-11 01:20:53.639 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-06-11 01:20:53.640 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-11 01:20:53.640  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-06-11 01:20:53.641  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-11 01:20:53.642  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-11 01:20:53.642  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-11 01:20:53.642  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-11 01:20:53.647  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-11 01:20:53.647  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 01:20:53.647  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 01:20:53.649  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-11 01:20:53.731  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-11 01:20:53.732  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-11 01:20:53.732 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-11 01:20:53.734 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-11 01:20:53.735  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1790
2021-06-11 01:20:53.735  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-11 01:20:53.737  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-11 01:20:53.738  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-11 01:20:53.739  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-11 01:20:53.739  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-11 01:20:53.740 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 01:20:53.740 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 01:20:53.740 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 01:20:53.741 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 01:20:53.741 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 01:20:53.742 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 01:20:53.742 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-11 01:20:53.746 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 43196641378737765190877743851558611857862293666
             IssuerDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 10 23:22:58 UTC 2021
           Final Date: Tue Jun 10 23:22:58 UTC 2031
            SubjectDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:5e:69:11:31:25:61:00:bb:6b:c0:12:1e:ff:47:fc:11:15:f7:bf]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8e7bad8bf469fe94368fc2421fdba622fa01c696
                       d150f02af14251214c92b91d9a3ee1b03b847672
                       4703a843d9ac0848bf84cc5ae5f899853f5028d7
                       92f983fa1215408c9da510ea69e507fe8fe97963
                       41b741bd5cafbb5af3004a53326757fc9f2e40bc
                       f353bf3563bdc32f8c78f944c7282a8652b2f6f3
                       73b2f97dae962f8acbdafb7b2a9d574845ca01c3
                       c385067c88591e7dfbfff9a450ae88665708f481
                       6a733d1cc426c96eddbe70e63435363dd83a577a
                       3d76951a682d870efa1ee98ba9377a2067bb1101
                       fb55531558ef9535d703e29f0cf21398262cfb5d
                       c713257eb05513e39d1a92c628b2e637b5ee4957
                       968c80f67c938ff7ac4f3fe86d986b5f62b544d3
                       1da93e391dc5a1a46a94475d4f48dabc5ab4ce79
                       7034efdc8e6414e6e0db734bc0d692c6b33838c2
                       a42ebaeea6826f019b8f546b82f7bd676376f1dc
                       c055e264e973189c1c6f0ccc4cc996b4095c7c39
                       d25565e5fe495e8754e7e7e877c80c2903f442c1
                       cf1ee16a0d1346a0962f00adc0f93b8fb3e489df
                       f4c5aa88
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7e:f4:62:6c:e0:b6:2e:ba:24:70:bb:92:a4:49:d2:df:67:cb:2d:09]
            modulus: 841c69e07d7527dffcf0577fd8653da463e80b189121b8127daa4683125f09bb3dd972958a525b73ac330875965caff3654dc98a05083a2d56b03662e81a147f2994a2021f5dc7d4b1eabc7d563a42d4fd6c51832cf417eae2af8650c0a3e406a9ae6fedbd844555fe0ae58829f14afd15b84d3781f21ec179f2fad5143e20b4f615c0be1993bec574b86e5fc47c3808f6d7af55d3dfdf4210c182cf7cfcd3c3efda73b166cc02724a70576ce166112d8f6c333b21e3e8d1fbec7627c07bc9a827bb720d57df4b0092575a6d96b4f2ad3261db61cf7e1ca1db37cc695711e9802902581f11b7c57d4b22995ec17db04a2aa945247cd9f84dfeda91d7c9fd19a3
    public exponent: 10001

] 
2021-06-11 01:21:31.163  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-11 01:21:31.165 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-11 01:21:31.166 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-06-11 01:21:31.166 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-11 01:21:31.167  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-06-11 01:21:31.167  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-11 01:21:31.168  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-11 01:21:31.168  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-11 01:21:31.169  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-11 01:21:31.173  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-11 01:21:31.174  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 01:21:31.174  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 01:21:31.176  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-11 01:21:31.260  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-11 01:21:31.309  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-11 01:21:31.309 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-11 01:21:31.311 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-11 01:21:31.312  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1790
2021-06-11 01:21:31.312  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-11 01:21:31.314  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-11 01:21:31.315  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-11 01:21:31.315  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-11 01:21:31.316  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-11 01:21:31.316 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 01:21:31.316 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 01:21:31.317 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 01:21:31.317 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 01:21:31.317 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 01:21:31.318 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 01:21:31.318 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-11 01:21:31.321 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 43196641378737765190877743851558611857862293666
             IssuerDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 10 23:22:58 UTC 2021
           Final Date: Tue Jun 10 23:22:58 UTC 2031
            SubjectDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:5e:69:11:31:25:61:00:bb:6b:c0:12:1e:ff:47:fc:11:15:f7:bf]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8e7bad8bf469fe94368fc2421fdba622fa01c696
                       d150f02af14251214c92b91d9a3ee1b03b847672
                       4703a843d9ac0848bf84cc5ae5f899853f5028d7
                       92f983fa1215408c9da510ea69e507fe8fe97963
                       41b741bd5cafbb5af3004a53326757fc9f2e40bc
                       f353bf3563bdc32f8c78f944c7282a8652b2f6f3
                       73b2f97dae962f8acbdafb7b2a9d574845ca01c3
                       c385067c88591e7dfbfff9a450ae88665708f481
                       6a733d1cc426c96eddbe70e63435363dd83a577a
                       3d76951a682d870efa1ee98ba9377a2067bb1101
                       fb55531558ef9535d703e29f0cf21398262cfb5d
                       c713257eb05513e39d1a92c628b2e637b5ee4957
                       968c80f67c938ff7ac4f3fe86d986b5f62b544d3
                       1da93e391dc5a1a46a94475d4f48dabc5ab4ce79
                       7034efdc8e6414e6e0db734bc0d692c6b33838c2
                       a42ebaeea6826f019b8f546b82f7bd676376f1dc
                       c055e264e973189c1c6f0ccc4cc996b4095c7c39
                       d25565e5fe495e8754e7e7e877c80c2903f442c1
                       cf1ee16a0d1346a0962f00adc0f93b8fb3e489df
                       f4c5aa88
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [39:2d:74:72:05:23:b1:90:ad:8e:2f:b6:0e:2f:31:35:fd:82:b2:33]
            modulus: 83ef4b3ee5aa9bc8f77510be92f36601c633d85571ecc567f363d3062fa3733f52a6cde162f4098da81761d4a0ecbe4f511b92e17e05918de97ae2a34becd71b37e3a4a6ba0926fe067d3e9760926fee18802821610c5edd9bd09f1f3c347cf68a73fed5e912fdf4c5a16b2f903d77dca9db01274670167efc071f78c1cdd7562f4bbc44abe4c10a8676ba8e7e62c18ff199f02430c670ab7de86075f921bd64e9ae425f9745383b94b7a9996b4d12e3ca46cec8ef425b4027ff9ee1bc878e8221e6dd0933e35b8946d1bd6c5dcf7b0bc7bddda35036181e634506a1ed3af82def8b74f1351a7b5c432d66c58e64e6497802172212673e005b5e74dfb9a0f98f
    public exponent: 10001

] 
2021-06-11 01:26:15.847  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-11 01:26:15.849 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-11 01:26:15.850 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-11 01:26:15.850 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-11 01:26:15.851  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-11 01:26:15.851  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-11 01:26:15.851  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-11 01:26:15.852  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-11 01:26:15.852  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-11 01:26:15.858  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-11 01:26:15.858  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 01:26:15.858  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 01:26:15.860  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-11 01:26:16.008  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-11 01:26:16.009  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-11 01:26:16.009 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-11 01:26:16.010 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-11 01:26:16.011  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1790
2021-06-11 01:26:16.011  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-11 01:26:16.013  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-11 01:26:16.013  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-11 01:26:16.013  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-11 01:26:16.013  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-11 01:26:16.014 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 01:26:16.014 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 01:26:16.014 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 01:26:16.015 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 01:26:16.015 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 01:26:16.015 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 01:26:16.016 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-11 01:26:16.018 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 43196641378737765190877743851558611857862293666
             IssuerDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 10 23:22:58 UTC 2021
           Final Date: Tue Jun 10 23:22:58 UTC 2031
            SubjectDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:5e:69:11:31:25:61:00:bb:6b:c0:12:1e:ff:47:fc:11:15:f7:bf]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8e7bad8bf469fe94368fc2421fdba622fa01c696
                       d150f02af14251214c92b91d9a3ee1b03b847672
                       4703a843d9ac0848bf84cc5ae5f899853f5028d7
                       92f983fa1215408c9da510ea69e507fe8fe97963
                       41b741bd5cafbb5af3004a53326757fc9f2e40bc
                       f353bf3563bdc32f8c78f944c7282a8652b2f6f3
                       73b2f97dae962f8acbdafb7b2a9d574845ca01c3
                       c385067c88591e7dfbfff9a450ae88665708f481
                       6a733d1cc426c96eddbe70e63435363dd83a577a
                       3d76951a682d870efa1ee98ba9377a2067bb1101
                       fb55531558ef9535d703e29f0cf21398262cfb5d
                       c713257eb05513e39d1a92c628b2e637b5ee4957
                       968c80f67c938ff7ac4f3fe86d986b5f62b544d3
                       1da93e391dc5a1a46a94475d4f48dabc5ab4ce79
                       7034efdc8e6414e6e0db734bc0d692c6b33838c2
                       a42ebaeea6826f019b8f546b82f7bd676376f1dc
                       c055e264e973189c1c6f0ccc4cc996b4095c7c39
                       d25565e5fe495e8754e7e7e877c80c2903f442c1
                       cf1ee16a0d1346a0962f00adc0f93b8fb3e489df
                       f4c5aa88
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a4:b6:c2:ce:8c:7b:e5:35:4b:4d:bd:ba:0e:2e:d4:af:5d:22:e8:34]
            modulus: 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
    public exponent: 10001

] 
2021-06-11 01:28:52.473  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-11 01:28:52.473 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-11 01:28:52.474 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-11 01:28:52.475 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-11 01:28:52.475  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-11 01:28:52.476  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-11 01:28:52.476  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-11 01:28:52.476  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-11 01:28:52.477  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-11 01:28:52.481  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-11 01:28:52.482  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 01:28:52.483  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 01:28:52.484  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-11 01:28:52.564  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-11 01:28:52.565  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-11 01:28:52.565 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-11 01:28:52.566 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-11 01:28:52.566  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1790
2021-06-11 01:28:52.566  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-11 01:28:52.568  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-11 01:28:52.568  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-11 01:28:52.568  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-11 01:28:52.568  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-11 01:28:52.569 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 01:28:52.569 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 01:28:52.569 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 01:28:52.570 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 01:28:52.570 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 01:28:52.570 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 01:28:52.571 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-11 01:28:52.573 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 43196641378737765190877743851558611857862293666
             IssuerDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 10 23:22:58 UTC 2021
           Final Date: Tue Jun 10 23:22:58 UTC 2031
            SubjectDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:5e:69:11:31:25:61:00:bb:6b:c0:12:1e:ff:47:fc:11:15:f7:bf]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8e7bad8bf469fe94368fc2421fdba622fa01c696
                       d150f02af14251214c92b91d9a3ee1b03b847672
                       4703a843d9ac0848bf84cc5ae5f899853f5028d7
                       92f983fa1215408c9da510ea69e507fe8fe97963
                       41b741bd5cafbb5af3004a53326757fc9f2e40bc
                       f353bf3563bdc32f8c78f944c7282a8652b2f6f3
                       73b2f97dae962f8acbdafb7b2a9d574845ca01c3
                       c385067c88591e7dfbfff9a450ae88665708f481
                       6a733d1cc426c96eddbe70e63435363dd83a577a
                       3d76951a682d870efa1ee98ba9377a2067bb1101
                       fb55531558ef9535d703e29f0cf21398262cfb5d
                       c713257eb05513e39d1a92c628b2e637b5ee4957
                       968c80f67c938ff7ac4f3fe86d986b5f62b544d3
                       1da93e391dc5a1a46a94475d4f48dabc5ab4ce79
                       7034efdc8e6414e6e0db734bc0d692c6b33838c2
                       a42ebaeea6826f019b8f546b82f7bd676376f1dc
                       c055e264e973189c1c6f0ccc4cc996b4095c7c39
                       d25565e5fe495e8754e7e7e877c80c2903f442c1
                       cf1ee16a0d1346a0962f00adc0f93b8fb3e489df
                       f4c5aa88
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [23:ba:15:62:43:fd:b8:8d:83:9f:60:11:99:ba:da:f7:34:29:0a:d2]
            modulus: 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
    public exponent: 10001

] 
2021-06-11 01:30:59.381  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-11 01:30:59.382 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-11 01:30:59.384 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-11 01:30:59.385 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-11 01:30:59.385  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-11 01:30:59.386  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-11 01:30:59.386  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-11 01:30:59.386  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-11 01:30:59.387  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-11 01:30:59.392  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-11 01:30:59.393  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 01:30:59.393  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 01:30:59.394  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-11 01:30:59.482  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-11 01:30:59.483  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-11 01:30:59.483 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-11 01:30:59.485 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-11 01:30:59.485  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1790
2021-06-11 01:30:59.486  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-11 01:30:59.487  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-11 01:30:59.488  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-11 01:30:59.488  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-11 01:30:59.488  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-11 01:30:59.488 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 01:30:59.489 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 01:30:59.489 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 01:30:59.489 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 01:30:59.490 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 01:30:59.490 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 01:30:59.491 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-11 01:30:59.494 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 43196641378737765190877743851558611857862293666
             IssuerDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 10 23:22:58 UTC 2021
           Final Date: Tue Jun 10 23:22:58 UTC 2031
            SubjectDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:5e:69:11:31:25:61:00:bb:6b:c0:12:1e:ff:47:fc:11:15:f7:bf]
            modulus: a020c5878580146f517e7fd7523c0a1102a3d8ad9e90d7dfcbda3d12794ca253761a09fff538d251aa9fef7afdfa6be33f0e0ccd1a274a28f20e4160f1421c220d4bb09a00e8276e662ae4ad6908e1fc327846fe9dd214aadc4a37c5a927df5b32e3c45ca54a4c2e65d4a1d271d5c6ed09cf88d9431799ec8ec7bed6353ff2c1f7fe53b6c961bbd65b4fda599963cca2b16c6ffa82b6ef6bf7ec40dab71f4a9b2a189926bbcf48a4dc3b98ea19f57a3aa8c41fcb63ea2dda4a8a185c14423b1b09be59992cdffee4bb940668e567dcb29cf257858308810792a19a0a6132c17b945a9fc536d420a8653a2f175060a9bc521c07ff6de82e6a70797d8273533d3089ca4b252c0d24eb2f29da0b6bf4d39869bd6a36cd68085aaf63eb1a925726d528b81bfef360de2bb7e4bcdbb65b9b220ea543131adbc84145b9081578ff82e2e67ef9846d48c96eec9fe24f7168e2432ce4fe228130a9a16b4b81cadd7415a99fb21fc7de10eb8c6c2aa1c23a31333317e077faecec99b40c57124439bb6c09
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8e7bad8bf469fe94368fc2421fdba622fa01c696
                       d150f02af14251214c92b91d9a3ee1b03b847672
                       4703a843d9ac0848bf84cc5ae5f899853f5028d7
                       92f983fa1215408c9da510ea69e507fe8fe97963
                       41b741bd5cafbb5af3004a53326757fc9f2e40bc
                       f353bf3563bdc32f8c78f944c7282a8652b2f6f3
                       73b2f97dae962f8acbdafb7b2a9d574845ca01c3
                       c385067c88591e7dfbfff9a450ae88665708f481
                       6a733d1cc426c96eddbe70e63435363dd83a577a
                       3d76951a682d870efa1ee98ba9377a2067bb1101
                       fb55531558ef9535d703e29f0cf21398262cfb5d
                       c713257eb05513e39d1a92c628b2e637b5ee4957
                       968c80f67c938ff7ac4f3fe86d986b5f62b544d3
                       1da93e391dc5a1a46a94475d4f48dabc5ab4ce79
                       7034efdc8e6414e6e0db734bc0d692c6b33838c2
                       a42ebaeea6826f019b8f546b82f7bd676376f1dc
                       c055e264e973189c1c6f0ccc4cc996b4095c7c39
                       d25565e5fe495e8754e7e7e877c80c2903f442c1
                       cf1ee16a0d1346a0962f00adc0f93b8fb3e489df
                       f4c5aa88
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [89:16:8b:a2:df:83:5d:f2:37:6a:61:e8:46:3d:34:79:86:29:a4:74]
            modulus: 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
    public exponent: 10001

] 
2021-06-11 01:32:36.063  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-11 01:32:36.064 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-11 01:32:36.065 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-11 01:32:36.065 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-11 01:32:36.067  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-11 01:32:36.067  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-11 01:32:36.067  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-11 01:32:36.068  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-11 01:32:36.068  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-11 01:32:36.072  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-11 01:32:36.072  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 01:32:36.072  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 01:32:36.073  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-11 01:32:36.158  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-11 01:32:36.158  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-11 01:32:36.158 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-11 01:32:36.160 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-11 01:32:36.160  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1790
2021-06-11 01:32:36.161  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-11 01:32:36.162  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-11 01:32:36.163  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-11 01:32:36.163  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-11 01:32:36.164  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-11 01:32:36.164 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 01:32:36.164 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 01:32:36.164 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 01:32:36.165 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 01:32:36.165 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 01:32:36.165 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 01:32:36.167 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-11 01:32:36.170 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 43196641378737765190877743851558611857862293666
             IssuerDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 10 23:22:58 UTC 2021
           Final Date: Tue Jun 10 23:22:58 UTC 2031
            SubjectDN: UID=c-0552737ca8f570e01,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:5e:69:11:31:25:61:00:bb:6b:c0:12:1e:ff:47:fc:11:15:f7:bf]
            modulus: a020c5878580146f517e7fd7523c0a1102a3d8ad9e90d7dfcbda3d12794ca253761a09fff538d251aa9fef7afdfa6be33f0e0ccd1a274a28f20e4160f1421c220d4bb09a00e8276e662ae4ad6908e1fc327846fe9dd214aadc4a37c5a927df5b32e3c45ca54a4c2e65d4a1d271d5c6ed09cf88d9431799ec8ec7bed6353ff2c1f7fe53b6c961bbd65b4fda599963cca2b16c6ffa82b6ef6bf7ec40dab71f4a9b2a189926bbcf48a4dc3b98ea19f57a3aa8c41fcb63ea2dda4a8a185c14423b1b09be59992cdffee4bb940668e567dcb29cf257858308810792a19a0a6132c17b945a9fc536d420a8653a2f175060a9bc521c07ff6de82e6a70797d8273533d3089ca4b252c0d24eb2f29da0b6bf4d39869bd6a36cd68085aaf63eb1a925726d528b81bfef360de2bb7e4bcdbb65b9b220ea543131adbc84145b9081578ff82e2e67ef9846d48c96eec9fe24f7168e2432ce4fe228130a9a16b4b81cadd7415a99fb21fc7de10eb8c6c2aa1c23a31333317e077faecec99b40c57124439bb6c09
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8e7bad8bf469fe94368fc2421fdba622fa01c696
                       d150f02af14251214c92b91d9a3ee1b03b847672
                       4703a843d9ac0848bf84cc5ae5f899853f5028d7
                       92f983fa1215408c9da510ea69e507fe8fe97963
                       41b741bd5cafbb5af3004a53326757fc9f2e40bc
                       f353bf3563bdc32f8c78f944c7282a8652b2f6f3
                       73b2f97dae962f8acbdafb7b2a9d574845ca01c3
                       c385067c88591e7dfbfff9a450ae88665708f481
                       6a733d1cc426c96eddbe70e63435363dd83a577a
                       3d76951a682d870efa1ee98ba9377a2067bb1101
                       fb55531558ef9535d703e29f0cf21398262cfb5d
                       c713257eb05513e39d1a92c628b2e637b5ee4957
                       968c80f67c938ff7ac4f3fe86d986b5f62b544d3
                       1da93e391dc5a1a46a94475d4f48dabc5ab4ce79
                       7034efdc8e6414e6e0db734bc0d692c6b33838c2
                       a42ebaeea6826f019b8f546b82f7bd676376f1dc
                       c055e264e973189c1c6f0ccc4cc996b4095c7c39
                       d25565e5fe495e8754e7e7e877c80c2903f442c1
                       cf1ee16a0d1346a0962f00adc0f93b8fb3e489df
                       f4c5aa88
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [de:9f:f6:8d:ee:e4:b7:23:7b:12:bb:29:e8:35:84:f8:ef:21:04:8a]
            modulus: ba4fc52903d071015510dd59fdc7c90738cbecdc22c9bc6a3de33a22873146a8e96731fce0164f0c137bf932b2ff0d29a58a2e17cc758503edc712ce1873b520a70ba83b556691be6500d0d06ee61a1edae8dc4f68be25c1ff944c4ec3e56f03064e86f34c5cb28ab68c3be6e88ccdcc9f29f24a9b0aece0522de44f6c7c36a564095666b854fa41d9872af990ecefc4f7d0d5cd52e5f3e27c22c31a9e44f3a4cdc695852f460a4d5a4d9a60feeada0b3a155f49d6f8d98009ae1393ed6358532851c83c374bd5849f1007683af2449adb480f7bf9ffaefe16ae4969b5d7cf70467971b003a4da8aaf0d17446f143804b17b2cd537b56e74d8c655967315a4e3
    public exponent: 10001

]