Results

By type

          2021-05-02 04:05:31,815 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-05-02 04:05:36,226 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-05-02 04:05:39.427  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-05-02 04:05:51.826 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-05-02 04:05:52.913  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-05-02 04:05:53.724  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-05-02 04:06:07.310  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 38.121 seconds (JVM running for 46.121)
2021-05-02 04:15:42.025  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-02 04:15:42.032 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-02 04:15:42.226 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-02 04:15:42.229 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-02 04:15:42.323  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-02 04:15:42.326  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-02 04:15:42.420  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-02 04:15:42.510  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-02 04:15:42.511  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-02 04:15:42.521  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-02 04:15:42.524  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-02 04:15:42.913  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-02 04:15:42.917  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-02 04:15:42.917  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-02 04:15:43.014  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-02 04:15:44.323  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-02 04:15:44.325  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-02 04:15:44.326 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-02 04:15:44.329 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-02 04:15:44.331  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1806
2021-05-02 04:15:44.331  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-02 04:15:44.335  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-02 04:15:44.336  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-02 04:15:44.340  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-02 04:15:44.341  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-02 04:15:44.342 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-02 04:15:44.342 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-02 04:15:44.409 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-02 04:15:44.421 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-02 04:15:44.421 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-02 04:15:44.422 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-02 04:15:44.517 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-02 04:15:44.713 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 710285845074702612362043446868851388788449206846
             IssuerDN: UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 02 03:59:34 UTC 2021
           Final Date: Fri May 02 03:59:34 UTC 2031
            SubjectDN: UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ed:73:76:95:01:e4:75:d6:ef:c3:c6:c8:bc:d3:17:df:7c:43:02:96]
            modulus: af9c4cf9973d6f7f53de82c19145aad7d9f1e8afcc86940b5956bebda8fc2328a90a462873342bcc9f4215ee5c6a551662ffce2e1b9147d2dc58131dcd541796fc6720b4ba8dcda0275ae6dbc4d52bb682b546f90857f2c981edeee69f3011dde67186d8c40f7a79ae1b0d80203fdebe06857daa1ed3295a590a54dcb97ede1fb9d28170bdc8425a151913233c5271237e0f13994ecb81d21706a3a6b89dd1ccee002d8ae249ec4a90d27e15ba7f79e8a5040c37a887a1d7517982dc517fc683c705d044ab4c43ce7cfefe3aa9a9c25648e2940f0d89e2f739867753119b950fa5a175da9674fe9bf6fa6b6557bfb74c10f205501029803fa19e80aa5b5ee5275c7fca8add7dda0449afbf114f421b151e446a506ee14ee07683331eca140b2348741d1221ecbd2faf76454ef1853fe5e515a052ab6d3b334af2b5fef82b8014a166fe157198e501c3b210ad0eb9022a96c64f107e450aa6066c966a9e8ab660145a357fc6686e74ee28a5b2dd20c86c61e10242c7c4e321e551b25511a70d4b
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1ba6b6f9e2c3df6011912ba0b31eb61da062be46
                       09941c106f756bf4726784d27b14105f16acecf2
                       bfcf0247db386ce37b1022a55c1f6fc73716e6a5
                       bc772ae299588f78540ccf7f1bb5f8fdb65fb0e6
                       19b92c31c23a28837210db3ef86f7929dca3e0a2
                       8cbf00dd7a01bea09395571eca8c7894834e27df
                       e067a85e652700e4799e07c890302065d39337f2
                       aa52e41677adeccae597bd26c0d93d4440a4060a
                       26877dd6cfcf6991f260d9d328aa2429fa3289d1
                       30e9ba0e46b28a3fe218f814c1947cacce1b28d8
                       a7426396f1b0d3df7ee941331dbc67334e6ab3dc
                       d2a6a1a3715c3d3d25a4f95b7f307b5eb4336e19
                       3e396be84736d29f9d9cb09ad49ee9a295cd7f4b
                       312fe3e1d0faae38f61d91584b8fb66fb4d008ba
                       f7f9eea4b096b8d0c8ef0c0db7e5bd3f094ef293
                       33a6329bde0951818ab0249ec84f87bd8f9bf870
                       1d3dbc87dac7c93459409cb69f79157bd91b1710
                       ea9b9f9e5932fd760f76d7dcdacbc7416e21221e
                       245ce8aba251bdb213a939254f1ed4f479a9d9bc
                       db0025dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [97:f1:04:98:fd:1a:51:26:d2:bf:9c:b8:fc:07:16:f5:7c:f4:27:5f]
            modulus: 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
    public exponent: 10001

] 
2021-05-02 05:11:11.292  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-02 05:11:11.293 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-02 05:11:11.295 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-02 05:11:11.296 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-02 05:11:11.296  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-02 05:11:11.297  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-02 05:11:11.297  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-02 05:11:11.297  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-02 05:11:11.298  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-02 05:11:11.305  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-02 05:11:11.305  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-02 05:11:11.306  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-02 05:11:11.310  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-02 05:11:11.416  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-02 05:11:11.417  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-02 05:11:11.418 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-02 05:11:11.423 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-02 05:11:11.424  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1806
2021-05-02 05:11:11.425  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-02 05:11:11.427  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-02 05:11:11.427  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-02 05:11:11.427  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-02 05:11:11.428  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-02 05:11:11.428 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-02 05:11:11.428 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-02 05:11:11.429 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-02 05:11:11.429 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-02 05:11:11.430 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-02 05:11:11.430 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-02 05:11:11.512 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-02 05:11:11.519 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 710285845074702612362043446868851388788449206846
             IssuerDN: UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 02 03:59:34 UTC 2021
           Final Date: Fri May 02 03:59:34 UTC 2031
            SubjectDN: UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ed:73:76:95:01:e4:75:d6:ef:c3:c6:c8:bc:d3:17:df:7c:43:02:96]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1ba6b6f9e2c3df6011912ba0b31eb61da062be46
                       09941c106f756bf4726784d27b14105f16acecf2
                       bfcf0247db386ce37b1022a55c1f6fc73716e6a5
                       bc772ae299588f78540ccf7f1bb5f8fdb65fb0e6
                       19b92c31c23a28837210db3ef86f7929dca3e0a2
                       8cbf00dd7a01bea09395571eca8c7894834e27df
                       e067a85e652700e4799e07c890302065d39337f2
                       aa52e41677adeccae597bd26c0d93d4440a4060a
                       26877dd6cfcf6991f260d9d328aa2429fa3289d1
                       30e9ba0e46b28a3fe218f814c1947cacce1b28d8
                       a7426396f1b0d3df7ee941331dbc67334e6ab3dc
                       d2a6a1a3715c3d3d25a4f95b7f307b5eb4336e19
                       3e396be84736d29f9d9cb09ad49ee9a295cd7f4b
                       312fe3e1d0faae38f61d91584b8fb66fb4d008ba
                       f7f9eea4b096b8d0c8ef0c0db7e5bd3f094ef293
                       33a6329bde0951818ab0249ec84f87bd8f9bf870
                       1d3dbc87dac7c93459409cb69f79157bd91b1710
                       ea9b9f9e5932fd760f76d7dcdacbc7416e21221e
                       245ce8aba251bdb213a939254f1ed4f479a9d9bc
                       db0025dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2f:5d:37:1e:de:b8:cc:bf:67:52:2f:de:6c:e0:b8:f9:3a:0e:be:0e]
            modulus: 8950c8ed24ffd1cf3bdd730a44c3f66e9940bd78cf4e7f438c5e3085c3f37aebffa514c9ca9ea1f5aea75a5f35091ec98664e89b12666b7d9f4ac9042cd1f59206f4e78b0369bcd827d6e9e378dff2d9b9ed0953589a3e267d3eafb2e9f4f1d476f7fe91d79026d43a27740f4a88b8fef12913b2d515f0ecdaebee3e65a01ef893671ae37d8122f705f0011cc9c8abcb0001443168913bd698409fd441e0c2ce4033cb2246d9ce3456cfd43b7304dc7073417f00ec5653ff79ed27f46f6a11c1d9d227c0d4be232bb3b73e31bbd742c136ee6b9a37f10e9b1442e2d5b170d14083132877baf607660a2daace664e1e577c7428d4e40bfc4c1d1cc6c8484bcd27
    public exponent: 10001

] 
2021-05-02 05:12:22.996  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-02 05:12:22.997 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-02 05:12:22.998 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-02 05:12:22.999 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-02 05:12:22.999  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-02 05:12:23.000  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-02 05:12:23.000  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-02 05:12:23.000  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-02 05:12:23.001  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-02 05:12:23.004  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-02 05:12:23.005  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-02 05:12:23.005  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-02 05:12:23.007  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-02 05:12:23.086  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-02 05:12:23.087  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-02 05:12:23.088 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-02 05:12:23.110 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-02 05:12:23.111  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1806
2021-05-02 05:12:23.111  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-02 05:12:23.113  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-02 05:12:23.114  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-02 05:12:23.115  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-02 05:12:23.115  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-02 05:12:23.116 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-02 05:12:23.116 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-02 05:12:23.117 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-02 05:12:23.117 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-02 05:12:23.118 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-02 05:12:23.118 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-02 05:12:23.119 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-02 05:12:23.121 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 710285845074702612362043446868851388788449206846
             IssuerDN: UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 02 03:59:34 UTC 2021
           Final Date: Fri May 02 03:59:34 UTC 2031
            SubjectDN: UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ed:73:76:95:01:e4:75:d6:ef:c3:c6:c8:bc:d3:17:df:7c:43:02:96]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1ba6b6f9e2c3df6011912ba0b31eb61da062be46
                       09941c106f756bf4726784d27b14105f16acecf2
                       bfcf0247db386ce37b1022a55c1f6fc73716e6a5
                       bc772ae299588f78540ccf7f1bb5f8fdb65fb0e6
                       19b92c31c23a28837210db3ef86f7929dca3e0a2
                       8cbf00dd7a01bea09395571eca8c7894834e27df
                       e067a85e652700e4799e07c890302065d39337f2
                       aa52e41677adeccae597bd26c0d93d4440a4060a
                       26877dd6cfcf6991f260d9d328aa2429fa3289d1
                       30e9ba0e46b28a3fe218f814c1947cacce1b28d8
                       a7426396f1b0d3df7ee941331dbc67334e6ab3dc
                       d2a6a1a3715c3d3d25a4f95b7f307b5eb4336e19
                       3e396be84736d29f9d9cb09ad49ee9a295cd7f4b
                       312fe3e1d0faae38f61d91584b8fb66fb4d008ba
                       f7f9eea4b096b8d0c8ef0c0db7e5bd3f094ef293
                       33a6329bde0951818ab0249ec84f87bd8f9bf870
                       1d3dbc87dac7c93459409cb69f79157bd91b1710
                       ea9b9f9e5932fd760f76d7dcdacbc7416e21221e
                       245ce8aba251bdb213a939254f1ed4f479a9d9bc
                       db0025dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3e:36:d8:8a:ae:08:37:e7:0a:5c:07:68:10:27:ea:56:7a:e2:fa:1c]
            modulus: 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
    public exponent: 10001

] 
2021-05-02 05:15:17.021  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-02 05:15:17.023 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-02 05:15:17.025 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-02 05:15:17.026 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-02 05:15:17.027  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-02 05:15:17.028  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-02 05:15:17.028  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-02 05:15:17.028  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-02 05:15:17.029  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-02 05:15:17.034  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-02 05:15:17.035  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-02 05:15:17.035  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-02 05:15:17.036  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-02 05:15:17.242  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-02 05:15:17.242  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-02 05:15:17.243 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-02 05:15:17.245 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-02 05:15:17.246  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1806
2021-05-02 05:15:17.247  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-02 05:15:17.248  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-02 05:15:17.248  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-02 05:15:17.249  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-02 05:15:17.249  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-02 05:15:17.249 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-02 05:15:17.249 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-02 05:15:17.250 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-02 05:15:17.250 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-02 05:15:17.251 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-02 05:15:17.251 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-02 05:15:17.252 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-02 05:15:17.254 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 710285845074702612362043446868851388788449206846
             IssuerDN: UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 02 03:59:34 UTC 2021
           Final Date: Fri May 02 03:59:34 UTC 2031
            SubjectDN: UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ed:73:76:95:01:e4:75:d6:ef:c3:c6:c8:bc:d3:17:df:7c:43:02:96]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1ba6b6f9e2c3df6011912ba0b31eb61da062be46
                       09941c106f756bf4726784d27b14105f16acecf2
                       bfcf0247db386ce37b1022a55c1f6fc73716e6a5
                       bc772ae299588f78540ccf7f1bb5f8fdb65fb0e6
                       19b92c31c23a28837210db3ef86f7929dca3e0a2
                       8cbf00dd7a01bea09395571eca8c7894834e27df
                       e067a85e652700e4799e07c890302065d39337f2
                       aa52e41677adeccae597bd26c0d93d4440a4060a
                       26877dd6cfcf6991f260d9d328aa2429fa3289d1
                       30e9ba0e46b28a3fe218f814c1947cacce1b28d8
                       a7426396f1b0d3df7ee941331dbc67334e6ab3dc
                       d2a6a1a3715c3d3d25a4f95b7f307b5eb4336e19
                       3e396be84736d29f9d9cb09ad49ee9a295cd7f4b
                       312fe3e1d0faae38f61d91584b8fb66fb4d008ba
                       f7f9eea4b096b8d0c8ef0c0db7e5bd3f094ef293
                       33a6329bde0951818ab0249ec84f87bd8f9bf870
                       1d3dbc87dac7c93459409cb69f79157bd91b1710
                       ea9b9f9e5932fd760f76d7dcdacbc7416e21221e
                       245ce8aba251bdb213a939254f1ed4f479a9d9bc
                       db0025dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a3:50:9f:51:b9:84:9e:7a:0e:63:dd:4a:37:e8:54:57:9d:c1:a2:8f]
            modulus: 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
    public exponent: 10001

] 
2021-05-02 05:15:19.692  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-02 05:15:19.693 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-02 05:15:19.694 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-02 05:15:19.695 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-02 05:15:19.695  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-02 05:15:19.696  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-02 05:15:19.696  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-02 05:15:19.697  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-02 05:15:19.697  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-02 05:15:19.701  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-02 05:15:19.702  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-02 05:15:19.702  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-02 05:15:19.704  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-02 05:15:19.761  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-02 05:15:19.761  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-02 05:15:19.762 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-02 05:15:19.764 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-02 05:15:19.765  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1806
2021-05-02 05:15:19.766  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-02 05:15:19.768  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-02 05:15:19.768  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-02 05:15:19.769  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-02 05:15:19.769  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-02 05:15:19.769 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-02 05:15:19.770 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-02 05:15:19.770 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-02 05:15:19.810 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-02 05:15:19.811 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-02 05:15:19.812 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-02 05:15:19.813 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-02 05:15:19.817 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 710285845074702612362043446868851388788449206846
             IssuerDN: UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 02 03:59:34 UTC 2021
           Final Date: Fri May 02 03:59:34 UTC 2031
            SubjectDN: UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ed:73:76:95:01:e4:75:d6:ef:c3:c6:c8:bc:d3:17:df:7c:43:02:96]
            modulus: af9c4cf9973d6f7f53de82c19145aad7d9f1e8afcc86940b5956bebda8fc2328a90a462873342bcc9f4215ee5c6a551662ffce2e1b9147d2dc58131dcd541796fc6720b4ba8dcda0275ae6dbc4d52bb682b546f90857f2c981edeee69f3011dde67186d8c40f7a79ae1b0d80203fdebe06857daa1ed3295a590a54dcb97ede1fb9d28170bdc8425a151913233c5271237e0f13994ecb81d21706a3a6b89dd1ccee002d8ae249ec4a90d27e15ba7f79e8a5040c37a887a1d7517982dc517fc683c705d044ab4c43ce7cfefe3aa9a9c25648e2940f0d89e2f739867753119b950fa5a175da9674fe9bf6fa6b6557bfb74c10f205501029803fa19e80aa5b5ee5275c7fca8add7dda0449afbf114f421b151e446a506ee14ee07683331eca140b2348741d1221ecbd2faf76454ef1853fe5e515a052ab6d3b334af2b5fef82b8014a166fe157198e501c3b210ad0eb9022a96c64f107e450aa6066c966a9e8ab660145a357fc6686e74ee28a5b2dd20c86c61e10242c7c4e321e551b25511a70d4b
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1ba6b6f9e2c3df6011912ba0b31eb61da062be46
                       09941c106f756bf4726784d27b14105f16acecf2
                       bfcf0247db386ce37b1022a55c1f6fc73716e6a5
                       bc772ae299588f78540ccf7f1bb5f8fdb65fb0e6
                       19b92c31c23a28837210db3ef86f7929dca3e0a2
                       8cbf00dd7a01bea09395571eca8c7894834e27df
                       e067a85e652700e4799e07c890302065d39337f2
                       aa52e41677adeccae597bd26c0d93d4440a4060a
                       26877dd6cfcf6991f260d9d328aa2429fa3289d1
                       30e9ba0e46b28a3fe218f814c1947cacce1b28d8
                       a7426396f1b0d3df7ee941331dbc67334e6ab3dc
                       d2a6a1a3715c3d3d25a4f95b7f307b5eb4336e19
                       3e396be84736d29f9d9cb09ad49ee9a295cd7f4b
                       312fe3e1d0faae38f61d91584b8fb66fb4d008ba
                       f7f9eea4b096b8d0c8ef0c0db7e5bd3f094ef293
                       33a6329bde0951818ab0249ec84f87bd8f9bf870
                       1d3dbc87dac7c93459409cb69f79157bd91b1710
                       ea9b9f9e5932fd760f76d7dcdacbc7416e21221e
                       245ce8aba251bdb213a939254f1ed4f479a9d9bc
                       db0025dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [50:01:bf:42:92:09:d3:3c:40:24:d3:4c:68:0c:04:33:91:21:b6:81]
            modulus: 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
    public exponent: 10001

] 
2021-05-02 05:15:50.890  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-02 05:15:50.892 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-02 05:15:50.893 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-02 05:15:50.893 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-02 05:15:50.894  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-02 05:15:50.894  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-02 05:15:50.895  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-02 05:15:50.895  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-02 05:15:50.895  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-02 05:15:50.901  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-02 05:15:50.902  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-02 05:15:50.902  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-02 05:15:50.903  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-02 05:15:50.977  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-02 05:15:50.978  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-02 05:15:50.978 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-02 05:15:50.980 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-02 05:15:50.980  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1806
2021-05-02 05:15:50.980  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-02 05:15:50.981  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-02 05:15:50.982  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-02 05:15:50.982  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-02 05:15:50.982  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-02 05:15:50.983 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-02 05:15:50.983 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-02 05:15:50.983 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-02 05:15:50.984 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-02 05:15:50.984 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-02 05:15:50.984 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-02 05:15:50.985 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-02 05:15:51.010 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 710285845074702612362043446868851388788449206846
             IssuerDN: UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 02 03:59:34 UTC 2021
           Final Date: Fri May 02 03:59:34 UTC 2031
            SubjectDN: UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ed:73:76:95:01:e4:75:d6:ef:c3:c6:c8:bc:d3:17:df:7c:43:02:96]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1ba6b6f9e2c3df6011912ba0b31eb61da062be46
                       09941c106f756bf4726784d27b14105f16acecf2
                       bfcf0247db386ce37b1022a55c1f6fc73716e6a5
                       bc772ae299588f78540ccf7f1bb5f8fdb65fb0e6
                       19b92c31c23a28837210db3ef86f7929dca3e0a2
                       8cbf00dd7a01bea09395571eca8c7894834e27df
                       e067a85e652700e4799e07c890302065d39337f2
                       aa52e41677adeccae597bd26c0d93d4440a4060a
                       26877dd6cfcf6991f260d9d328aa2429fa3289d1
                       30e9ba0e46b28a3fe218f814c1947cacce1b28d8
                       a7426396f1b0d3df7ee941331dbc67334e6ab3dc
                       d2a6a1a3715c3d3d25a4f95b7f307b5eb4336e19
                       3e396be84736d29f9d9cb09ad49ee9a295cd7f4b
                       312fe3e1d0faae38f61d91584b8fb66fb4d008ba
                       f7f9eea4b096b8d0c8ef0c0db7e5bd3f094ef293
                       33a6329bde0951818ab0249ec84f87bd8f9bf870
                       1d3dbc87dac7c93459409cb69f79157bd91b1710
                       ea9b9f9e5932fd760f76d7dcdacbc7416e21221e
                       245ce8aba251bdb213a939254f1ed4f479a9d9bc
                       db0025dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [59:34:b3:61:11:54:6a:dd:5f:49:21:d1:b7:e7:7e:6c:e0:4e:ce:6d]
            modulus: a61c0e82e8bc8555b23e6aa32666a9c845eacbed1df3958da3c4e337e54e81db93176f30a5a0e25fb957520667c85fa2e2c9abe0880546b11f73fb92f73dd27c765cff74009bbf51dbd43ada5714e0fe8edbb65ab74683540b84e731fe4a7f0525ead2790a90f4f5dc7bd31630ef18c06ffe1dab557443ac2f6d348ff927a30678d44c7e9edfec0871ac69bf599267e6d4f6b2015908c68ad318b8b0929deef392b9a18187365cc8fefec4d36277351b07b0b3be99b3034d7bcf6307278754f8b119291767f0d446bf90879a1bf92c681a4b4a8beea2f99c13157d7aa043677ec3cf5a94faa2ac0217f7dad68a618852c70931a575cd79fed1a41ef53806ddbf
    public exponent: 10001

] 
2021-05-02 05:16:40.912  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-02 05:16:40.914 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-02 05:16:40.916 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-02 05:16:40.917 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-02 05:16:40.917  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-02 05:16:40.919  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-02 05:16:40.919  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-02 05:16:40.920  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-02 05:16:40.920  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-02 05:16:40.925  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-02 05:16:40.925  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-02 05:16:40.925  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-02 05:16:40.926  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-02 05:16:41.077  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-02 05:16:41.080  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-02 05:16:41.080 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-02 05:16:41.081 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-02 05:16:41.082  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1806
2021-05-02 05:16:41.082  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-02 05:16:41.083  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-02 05:16:41.083  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-02 05:16:41.084  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-02 05:16:41.084  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-02 05:16:41.084 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-02 05:16:41.085 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-02 05:16:41.085 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-02 05:16:41.085 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-02 05:16:41.085 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-02 05:16:41.086 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-02 05:16:41.086 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-02 05:16:41.088 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 710285845074702612362043446868851388788449206846
             IssuerDN: UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 02 03:59:34 UTC 2021
           Final Date: Fri May 02 03:59:34 UTC 2031
            SubjectDN: UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ed:73:76:95:01:e4:75:d6:ef:c3:c6:c8:bc:d3:17:df:7c:43:02:96]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1ba6b6f9e2c3df6011912ba0b31eb61da062be46
                       09941c106f756bf4726784d27b14105f16acecf2
                       bfcf0247db386ce37b1022a55c1f6fc73716e6a5
                       bc772ae299588f78540ccf7f1bb5f8fdb65fb0e6
                       19b92c31c23a28837210db3ef86f7929dca3e0a2
                       8cbf00dd7a01bea09395571eca8c7894834e27df
                       e067a85e652700e4799e07c890302065d39337f2
                       aa52e41677adeccae597bd26c0d93d4440a4060a
                       26877dd6cfcf6991f260d9d328aa2429fa3289d1
                       30e9ba0e46b28a3fe218f814c1947cacce1b28d8
                       a7426396f1b0d3df7ee941331dbc67334e6ab3dc
                       d2a6a1a3715c3d3d25a4f95b7f307b5eb4336e19
                       3e396be84736d29f9d9cb09ad49ee9a295cd7f4b
                       312fe3e1d0faae38f61d91584b8fb66fb4d008ba
                       f7f9eea4b096b8d0c8ef0c0db7e5bd3f094ef293
                       33a6329bde0951818ab0249ec84f87bd8f9bf870
                       1d3dbc87dac7c93459409cb69f79157bd91b1710
                       ea9b9f9e5932fd760f76d7dcdacbc7416e21221e
                       245ce8aba251bdb213a939254f1ed4f479a9d9bc
                       db0025dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [28:43:0c:a5:fb:15:9b:fa:ee:00:09:e9:84:57:da:47:0c:e9:aa:6f]
            modulus: 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
    public exponent: 10001

] 
2021-05-02 05:17:30.119  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-02 05:17:30.120 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-02 05:17:30.121 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-02 05:17:30.121 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-02 05:17:30.122  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-02 05:17:30.122  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-02 05:17:30.122  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-02 05:17:30.122  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-02 05:17:30.122  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-02 05:17:30.126  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-02 05:17:30.126  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-02 05:17:30.127  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-02 05:17:30.128  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-02 05:17:30.216  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-02 05:17:30.217  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-02 05:17:30.217 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-02 05:17:30.220 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-02 05:17:30.221  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1806
2021-05-02 05:17:30.221  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-02 05:17:30.224  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-02 05:17:30.225  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-02 05:17:30.225  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-02 05:17:30.225  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-02 05:17:30.226 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-02 05:17:30.226 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-02 05:17:30.227 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-02 05:17:30.227 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-02 05:17:30.228 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-02 05:17:30.228 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-02 05:17:30.229 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-02 05:17:30.232 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 710285845074702612362043446868851388788449206846
             IssuerDN: UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 02 03:59:34 UTC 2021
           Final Date: Fri May 02 03:59:34 UTC 2031
            SubjectDN: UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ed:73:76:95:01:e4:75:d6:ef:c3:c6:c8:bc:d3:17:df:7c:43:02:96]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1ba6b6f9e2c3df6011912ba0b31eb61da062be46
                       09941c106f756bf4726784d27b14105f16acecf2
                       bfcf0247db386ce37b1022a55c1f6fc73716e6a5
                       bc772ae299588f78540ccf7f1bb5f8fdb65fb0e6
                       19b92c31c23a28837210db3ef86f7929dca3e0a2
                       8cbf00dd7a01bea09395571eca8c7894834e27df
                       e067a85e652700e4799e07c890302065d39337f2
                       aa52e41677adeccae597bd26c0d93d4440a4060a
                       26877dd6cfcf6991f260d9d328aa2429fa3289d1
                       30e9ba0e46b28a3fe218f814c1947cacce1b28d8
                       a7426396f1b0d3df7ee941331dbc67334e6ab3dc
                       d2a6a1a3715c3d3d25a4f95b7f307b5eb4336e19
                       3e396be84736d29f9d9cb09ad49ee9a295cd7f4b
                       312fe3e1d0faae38f61d91584b8fb66fb4d008ba
                       f7f9eea4b096b8d0c8ef0c0db7e5bd3f094ef293
                       33a6329bde0951818ab0249ec84f87bd8f9bf870
                       1d3dbc87dac7c93459409cb69f79157bd91b1710
                       ea9b9f9e5932fd760f76d7dcdacbc7416e21221e
                       245ce8aba251bdb213a939254f1ed4f479a9d9bc
                       db0025dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [64:2f:85:04:73:da:ee:23:ec:50:3f:bb:38:e7:88:a4:33:fd:ec:12]
            modulus: 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
    public exponent: 10001

] 
2021-05-02 05:18:08.581  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-02 05:18:08.582 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-02 05:18:08.583 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-02 05:18:08.583 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-02 05:18:08.583  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-02 05:18:08.584  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-02 05:18:08.584  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-02 05:18:08.584  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-02 05:18:08.585  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-02 05:18:08.589  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-02 05:18:08.589  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-02 05:18:08.589  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-02 05:18:08.590  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-02 05:18:08.657  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-02 05:18:08.658  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-02 05:18:08.658 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-02 05:18:08.659 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-02 05:18:08.660  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1806
2021-05-02 05:18:08.660  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-02 05:18:08.661  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-02 05:18:08.661  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-02 05:18:08.661  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-02 05:18:08.661  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-02 05:18:08.662 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-02 05:18:08.662 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-02 05:18:08.662 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-02 05:18:08.662 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-02 05:18:08.662 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-02 05:18:08.662 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-02 05:18:08.663 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-02 05:18:08.665 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 710285845074702612362043446868851388788449206846
             IssuerDN: UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 02 03:59:34 UTC 2021
           Final Date: Fri May 02 03:59:34 UTC 2031
            SubjectDN: UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ed:73:76:95:01:e4:75:d6:ef:c3:c6:c8:bc:d3:17:df:7c:43:02:96]
            modulus: af9c4cf9973d6f7f53de82c19145aad7d9f1e8afcc86940b5956bebda8fc2328a90a462873342bcc9f4215ee5c6a551662ffce2e1b9147d2dc58131dcd541796fc6720b4ba8dcda0275ae6dbc4d52bb682b546f90857f2c981edeee69f3011dde67186d8c40f7a79ae1b0d80203fdebe06857daa1ed3295a590a54dcb97ede1fb9d28170bdc8425a151913233c5271237e0f13994ecb81d21706a3a6b89dd1ccee002d8ae249ec4a90d27e15ba7f79e8a5040c37a887a1d7517982dc517fc683c705d044ab4c43ce7cfefe3aa9a9c25648e2940f0d89e2f739867753119b950fa5a175da9674fe9bf6fa6b6557bfb74c10f205501029803fa19e80aa5b5ee5275c7fca8add7dda0449afbf114f421b151e446a506ee14ee07683331eca140b2348741d1221ecbd2faf76454ef1853fe5e515a052ab6d3b334af2b5fef82b8014a166fe157198e501c3b210ad0eb9022a96c64f107e450aa6066c966a9e8ab660145a357fc6686e74ee28a5b2dd20c86c61e10242c7c4e321e551b25511a70d4b
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1ba6b6f9e2c3df6011912ba0b31eb61da062be46
                       09941c106f756bf4726784d27b14105f16acecf2
                       bfcf0247db386ce37b1022a55c1f6fc73716e6a5
                       bc772ae299588f78540ccf7f1bb5f8fdb65fb0e6
                       19b92c31c23a28837210db3ef86f7929dca3e0a2
                       8cbf00dd7a01bea09395571eca8c7894834e27df
                       e067a85e652700e4799e07c890302065d39337f2
                       aa52e41677adeccae597bd26c0d93d4440a4060a
                       26877dd6cfcf6991f260d9d328aa2429fa3289d1
                       30e9ba0e46b28a3fe218f814c1947cacce1b28d8
                       a7426396f1b0d3df7ee941331dbc67334e6ab3dc
                       d2a6a1a3715c3d3d25a4f95b7f307b5eb4336e19
                       3e396be84736d29f9d9cb09ad49ee9a295cd7f4b
                       312fe3e1d0faae38f61d91584b8fb66fb4d008ba
                       f7f9eea4b096b8d0c8ef0c0db7e5bd3f094ef293
                       33a6329bde0951818ab0249ec84f87bd8f9bf870
                       1d3dbc87dac7c93459409cb69f79157bd91b1710
                       ea9b9f9e5932fd760f76d7dcdacbc7416e21221e
                       245ce8aba251bdb213a939254f1ed4f479a9d9bc
                       db0025dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f2:19:cf:02:e4:93:f6:00:b8:09:69:19:b0:9e:14:e6:bc:12:c2:1d]
            modulus: 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
    public exponent: 10001

] 
2021-05-02 05:20:18.928  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-02 05:20:18.929 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-02 05:20:18.931 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-02 05:20:18.932 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-02 05:20:18.932  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-02 05:20:18.933  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-02 05:20:18.933  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-02 05:20:18.934  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-02 05:20:18.934  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-02 05:20:18.941  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-02 05:20:18.942  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-02 05:20:18.943  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-02 05:20:18.946  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-02 05:20:19.132  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-02 05:20:19.132  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-02 05:20:19.133 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-02 05:20:19.135 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-02 05:20:19.136  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1806
2021-05-02 05:20:19.136  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-02 05:20:19.139  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-02 05:20:19.140  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-02 05:20:19.141  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-02 05:20:19.141  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-02 05:20:19.141 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-02 05:20:19.141 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-02 05:20:19.141 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-02 05:20:19.142 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-02 05:20:19.142 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-02 05:20:19.142 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-02 05:20:19.142 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-02 05:20:19.145 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 710285845074702612362043446868851388788449206846
             IssuerDN: UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 02 03:59:34 UTC 2021
           Final Date: Fri May 02 03:59:34 UTC 2031
            SubjectDN: UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ed:73:76:95:01:e4:75:d6:ef:c3:c6:c8:bc:d3:17:df:7c:43:02:96]
            modulus: af9c4cf9973d6f7f53de82c19145aad7d9f1e8afcc86940b5956bebda8fc2328a90a462873342bcc9f4215ee5c6a551662ffce2e1b9147d2dc58131dcd541796fc6720b4ba8dcda0275ae6dbc4d52bb682b546f90857f2c981edeee69f3011dde67186d8c40f7a79ae1b0d80203fdebe06857daa1ed3295a590a54dcb97ede1fb9d28170bdc8425a151913233c5271237e0f13994ecb81d21706a3a6b89dd1ccee002d8ae249ec4a90d27e15ba7f79e8a5040c37a887a1d7517982dc517fc683c705d044ab4c43ce7cfefe3aa9a9c25648e2940f0d89e2f739867753119b950fa5a175da9674fe9bf6fa6b6557bfb74c10f205501029803fa19e80aa5b5ee5275c7fca8add7dda0449afbf114f421b151e446a506ee14ee07683331eca140b2348741d1221ecbd2faf76454ef1853fe5e515a052ab6d3b334af2b5fef82b8014a166fe157198e501c3b210ad0eb9022a96c64f107e450aa6066c966a9e8ab660145a357fc6686e74ee28a5b2dd20c86c61e10242c7c4e321e551b25511a70d4b
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1ba6b6f9e2c3df6011912ba0b31eb61da062be46
                       09941c106f756bf4726784d27b14105f16acecf2
                       bfcf0247db386ce37b1022a55c1f6fc73716e6a5
                       bc772ae299588f78540ccf7f1bb5f8fdb65fb0e6
                       19b92c31c23a28837210db3ef86f7929dca3e0a2
                       8cbf00dd7a01bea09395571eca8c7894834e27df
                       e067a85e652700e4799e07c890302065d39337f2
                       aa52e41677adeccae597bd26c0d93d4440a4060a
                       26877dd6cfcf6991f260d9d328aa2429fa3289d1
                       30e9ba0e46b28a3fe218f814c1947cacce1b28d8
                       a7426396f1b0d3df7ee941331dbc67334e6ab3dc
                       d2a6a1a3715c3d3d25a4f95b7f307b5eb4336e19
                       3e396be84736d29f9d9cb09ad49ee9a295cd7f4b
                       312fe3e1d0faae38f61d91584b8fb66fb4d008ba
                       f7f9eea4b096b8d0c8ef0c0db7e5bd3f094ef293
                       33a6329bde0951818ab0249ec84f87bd8f9bf870
                       1d3dbc87dac7c93459409cb69f79157bd91b1710
                       ea9b9f9e5932fd760f76d7dcdacbc7416e21221e
                       245ce8aba251bdb213a939254f1ed4f479a9d9bc
                       db0025dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [98:33:3d:3f:dc:0a:f8:9b:6d:3d:1c:28:4d:2a:6e:2b:b4:4e:fd:25]
            modulus: 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
    public exponent: 10001

] 
2021-05-02 05:23:38.649  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-02 05:23:38.650 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-02 05:23:38.651 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-02 05:23:38.652 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-02 05:23:38.652  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-02 05:23:38.653  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-02 05:23:38.653  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-02 05:23:38.654  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-02 05:23:38.654  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-02 05:23:38.658  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-02 05:23:38.659  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-02 05:23:38.659  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-02 05:23:38.660  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-02 05:23:38.734  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-02 05:23:38.734  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-02 05:23:38.735 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-02 05:23:38.735 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-02 05:23:38.736  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1806
2021-05-02 05:23:38.736  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-02 05:23:38.737  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-02 05:23:38.737  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-02 05:23:38.737  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-02 05:23:38.737  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-02 05:23:38.737 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-02 05:23:38.738 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-02 05:23:38.738 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-02 05:23:38.738 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-02 05:23:38.739 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-02 05:23:38.739 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-02 05:23:38.739 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-02 05:23:38.741 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 710285845074702612362043446868851388788449206846
             IssuerDN: UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 02 03:59:34 UTC 2021
           Final Date: Fri May 02 03:59:34 UTC 2031
            SubjectDN: UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ed:73:76:95:01:e4:75:d6:ef:c3:c6:c8:bc:d3:17:df:7c:43:02:96]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1ba6b6f9e2c3df6011912ba0b31eb61da062be46
                       09941c106f756bf4726784d27b14105f16acecf2
                       bfcf0247db386ce37b1022a55c1f6fc73716e6a5
                       bc772ae299588f78540ccf7f1bb5f8fdb65fb0e6
                       19b92c31c23a28837210db3ef86f7929dca3e0a2
                       8cbf00dd7a01bea09395571eca8c7894834e27df
                       e067a85e652700e4799e07c890302065d39337f2
                       aa52e41677adeccae597bd26c0d93d4440a4060a
                       26877dd6cfcf6991f260d9d328aa2429fa3289d1
                       30e9ba0e46b28a3fe218f814c1947cacce1b28d8
                       a7426396f1b0d3df7ee941331dbc67334e6ab3dc
                       d2a6a1a3715c3d3d25a4f95b7f307b5eb4336e19
                       3e396be84736d29f9d9cb09ad49ee9a295cd7f4b
                       312fe3e1d0faae38f61d91584b8fb66fb4d008ba
                       f7f9eea4b096b8d0c8ef0c0db7e5bd3f094ef293
                       33a6329bde0951818ab0249ec84f87bd8f9bf870
                       1d3dbc87dac7c93459409cb69f79157bd91b1710
                       ea9b9f9e5932fd760f76d7dcdacbc7416e21221e
                       245ce8aba251bdb213a939254f1ed4f479a9d9bc
                       db0025dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ac:8c:61:23:1b:3d:84:1e:76:ed:c4:9e:a7:33:15:f7:7c:af:89:58]
            modulus: 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
    public exponent: 10001

] 
2021-05-02 05:25:17.318  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-02 05:25:17.319 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-02 05:25:17.321 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-02 05:25:17.322 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-02 05:25:17.322  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-02 05:25:17.323  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-02 05:25:17.324  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-02 05:25:17.324  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-02 05:25:17.324  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-02 05:25:17.328  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-02 05:25:17.328  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-02 05:25:17.329  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-02 05:25:17.330  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-02 05:25:17.461  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-02 05:25:17.462  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-02 05:25:17.462 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-02 05:25:17.463 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-02 05:25:17.463  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1806
2021-05-02 05:25:17.464  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-02 05:25:17.465  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-02 05:25:17.465  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-02 05:25:17.465  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-02 05:25:17.466  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-02 05:25:17.466 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-02 05:25:17.466 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-02 05:25:17.466 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-02 05:25:17.467 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-02 05:25:17.467 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-02 05:25:17.467 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-02 05:25:17.468 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-02 05:25:17.470 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 710285845074702612362043446868851388788449206846
             IssuerDN: UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 02 03:59:34 UTC 2021
           Final Date: Fri May 02 03:59:34 UTC 2031
            SubjectDN: UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ed:73:76:95:01:e4:75:d6:ef:c3:c6:c8:bc:d3:17:df:7c:43:02:96]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1ba6b6f9e2c3df6011912ba0b31eb61da062be46
                       09941c106f756bf4726784d27b14105f16acecf2
                       bfcf0247db386ce37b1022a55c1f6fc73716e6a5
                       bc772ae299588f78540ccf7f1bb5f8fdb65fb0e6
                       19b92c31c23a28837210db3ef86f7929dca3e0a2
                       8cbf00dd7a01bea09395571eca8c7894834e27df
                       e067a85e652700e4799e07c890302065d39337f2
                       aa52e41677adeccae597bd26c0d93d4440a4060a
                       26877dd6cfcf6991f260d9d328aa2429fa3289d1
                       30e9ba0e46b28a3fe218f814c1947cacce1b28d8
                       a7426396f1b0d3df7ee941331dbc67334e6ab3dc
                       d2a6a1a3715c3d3d25a4f95b7f307b5eb4336e19
                       3e396be84736d29f9d9cb09ad49ee9a295cd7f4b
                       312fe3e1d0faae38f61d91584b8fb66fb4d008ba
                       f7f9eea4b096b8d0c8ef0c0db7e5bd3f094ef293
                       33a6329bde0951818ab0249ec84f87bd8f9bf870
                       1d3dbc87dac7c93459409cb69f79157bd91b1710
                       ea9b9f9e5932fd760f76d7dcdacbc7416e21221e
                       245ce8aba251bdb213a939254f1ed4f479a9d9bc
                       db0025dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fa:1d:df:6a:bd:e8:85:11:fd:d3:a8:17:7f:ac:3e:9e:6a:9f:2b:4a]
            modulus: b123d60ef689c1debd50a33093e17bcfc9604fe4604b172f60ea5308df191508ac2b92a14a3e1fd54c2308bb0c1d7a912bf5f57a491b6433e4fd579e15285bb5816dfa1dcedc4344914bcab38f389ffb27187e860133456c0a400191b291575d35fd2ccf06aaa4db80a9c6311022639e29f31e05b78e4f1d93204cefe3a6b7fa422175495f957ab60f97834798676133f785e30c0003685ba28d416b431bf2416faa1174089bb9a7e57cdb28e9d639e90c72fb85e94e3134dec1335c95d910c11678da1c07d75698b042835a5b03f1e920bc0e8fa79439737f5adc349a152f47b7632329dcaec9d9c9e680b25b5fc8837d95e3dfee747da9d6ba093f089ad481
    public exponent: 10001

] 
2021-05-02 05:26:52.261  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-02 05:26:52.263 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-02 05:26:52.264 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-02 05:26:52.265 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-02 05:26:52.266  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-02 05:26:52.266  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-02 05:26:52.267  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-02 05:26:52.267  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-02 05:26:52.268  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-02 05:26:52.273  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-02 05:26:52.273  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-02 05:26:52.273  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-02 05:26:52.274  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-02 05:26:52.342  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-02 05:26:52.343  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-02 05:26:52.343 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-02 05:26:52.345 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-02 05:26:52.346  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1806
2021-05-02 05:26:52.347  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-02 05:26:52.410  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-02 05:26:52.411  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-02 05:26:52.411  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-02 05:26:52.412  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-02 05:26:52.412 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-02 05:26:52.412 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-02 05:26:52.412 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-02 05:26:52.413 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-02 05:26:52.413 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-02 05:26:52.414 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-02 05:26:52.414 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-02 05:26:52.418 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 710285845074702612362043446868851388788449206846
             IssuerDN: UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 02 03:59:34 UTC 2021
           Final Date: Fri May 02 03:59:34 UTC 2031
            SubjectDN: UID=c-0f6e30115b9bafcc7,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ed:73:76:95:01:e4:75:d6:ef:c3:c6:c8:bc:d3:17:df:7c:43:02:96]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1ba6b6f9e2c3df6011912ba0b31eb61da062be46
                       09941c106f756bf4726784d27b14105f16acecf2
                       bfcf0247db386ce37b1022a55c1f6fc73716e6a5
                       bc772ae299588f78540ccf7f1bb5f8fdb65fb0e6
                       19b92c31c23a28837210db3ef86f7929dca3e0a2
                       8cbf00dd7a01bea09395571eca8c7894834e27df
                       e067a85e652700e4799e07c890302065d39337f2
                       aa52e41677adeccae597bd26c0d93d4440a4060a
                       26877dd6cfcf6991f260d9d328aa2429fa3289d1
                       30e9ba0e46b28a3fe218f814c1947cacce1b28d8
                       a7426396f1b0d3df7ee941331dbc67334e6ab3dc
                       d2a6a1a3715c3d3d25a4f95b7f307b5eb4336e19
                       3e396be84736d29f9d9cb09ad49ee9a295cd7f4b
                       312fe3e1d0faae38f61d91584b8fb66fb4d008ba
                       f7f9eea4b096b8d0c8ef0c0db7e5bd3f094ef293
                       33a6329bde0951818ab0249ec84f87bd8f9bf870
                       1d3dbc87dac7c93459409cb69f79157bd91b1710
                       ea9b9f9e5932fd760f76d7dcdacbc7416e21221e
                       245ce8aba251bdb213a939254f1ed4f479a9d9bc
                       db0025dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [76:fe:ee:ee:60:3f:9b:38:72:d7:eb:88:89:08:e8:9f:89:89:83:6a]
            modulus: 8fc7e292a2279ba46dab229f4d967508e1be8e732bdffccf14eeb0695fd085dbef933fd6e5d401b83981cb5bc29b468f3b3e397ab2abfd78a46668412c77398e2cdce3cc484227643f8f3f9ab77439fbb1371c0253e8eb93764bbd77cc172361c4d2d138aafba9d3fd051cb7be581905f41f9cecc7e0ee725fed2cb4c5719422497c20fe001542b122557907a3b6e55012a4ca5bf0926c9245138171602e36ed4eb963699ae900923b184960195630095b92ee6412be67d00a9cd025fe8b33d18045aaab971fe5224a87c1973019265b483ecc5ec5ff6d0536857c6d69d681609c7cfb4e85a1194109e108b70cbff1b2216342456dd95d49e9254e4aae7d21cf
    public exponent: 10001

]