Results

By type

          2021-05-05 04:17:53,890 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-05-05 04:17:57,587 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-05-05 04:18:00.292  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-05-05 04:18:11.211 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-05-05 04:18:12.301  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-05-05 04:18:13.002  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-05-05 04:18:25.007  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 33.303 seconds (JVM running for 39.69)
2021-05-05 04:24:57.404  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 04:24:57.492 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 04:24:57.701 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-05 04:24:57.704 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 04:24:57.801  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-05 04:24:57.804  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 04:24:57.890  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 04:24:57.891  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 04:24:57.891  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 04:24:57.898  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 04:24:57.901  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 04:24:58.093  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 04:24:58.100  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 04:24:58.100  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 04:24:58.189  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 04:24:59.574  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 04:24:59.577  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 04:24:59.578 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 04:24:59.583 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 04:24:59.584  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1239
2021-05-05 04:24:59.585  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 04:24:59.588  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 04:24:59.588  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 04:24:59.595  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 04:24:59.595  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 04:24:59.596 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 04:24:59.597 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 04:24:59.597 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 04:24:59.609 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 04:24:59.609 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 04:24:59.610 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 04:24:59.690 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 04:24:59.795 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 446972477392075330337351376307171464653546616871
             IssuerDN: UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 04:14:46 UTC 2021
           Final Date: Mon May 05 04:14:46 UTC 2031
            SubjectDN: UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f8:45:f9:6c:f3:31:fe:91:ea:b2:91:bd:07:21:f5:d5:7d:f8:22:ed]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 60977c6153dc346fe4cb4bfeb3b132f264b5dd65
                       339191413286b60cf9426dc01920a3ddf041a176
                       6c5c2d1cb33b9287ea006ca35a4e6055729e8eb3
                       934214e593cce7a2f6ddbeafe303ae9d90613c75
                       709120c0e2c18114cd80a147c377a04a4620a3ab
                       652e6bdad82dcdcd78eaa97856ee64c42ed775cc
                       b127f0c525e91c9d057fba1f93ed95ca842b389b
                       98dc0e6888f1e5ce4980e0b3b5a1f261ae45dd41
                       3d075dbb26b3797ece112159d2b5ccecaa80a41e
                       401ec7bbb8be6d029603cec83d6dd3f075bd0e06
                       a973284f4e85a60e5b9deaa2953b687378d5456b
                       5e51c4a6e648f6d9d97c53c2372f9a6c27adfa04
                       f92e109e85fd5cec16c0a00f9dcc100b46826125
                       ce6a2c327104290acd7932e38a2e2062f94fe59d
                       612df788936b2db7b42ec371b29144fefedff42d
                       c35a8a3e47797927e13f3b4e529c5352ee3c25e5
                       6fde2ab00d8ecce5cc4c09ce297d5ab85b5dab07
                       280e9452ec9d5cbe3681a5f59b3a0bac8831f51b
                       e5371b0947a951d4ec5203298c1947b04fbc16d2
                       28f2856b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9a:2e:fe:48:9b:e4:48:8f:11:17:f3:e4:cf:ea:9e:45:cd:b1:a8:14]
            modulus: 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
    public exponent: 10001

] 
2021-05-05 05:38:09.225  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 05:38:09.227 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 05:38:09.228 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-05 05:38:09.229 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 05:38:09.230  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-05 05:38:09.231  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 05:38:09.231  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 05:38:09.231  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 05:38:09.232  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 05:38:09.241  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 05:38:09.241  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 05:38:09.242  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 05:38:09.245  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 05:38:09.401  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 05:38:09.402  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 05:38:09.402 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 05:38:09.405 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 05:38:09.406  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1239
2021-05-05 05:38:09.406  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 05:38:09.409  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 05:38:09.410  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 05:38:09.410  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 05:38:09.410  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 05:38:09.411 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 05:38:09.411 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 05:38:09.411 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 05:38:09.412 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 05:38:09.413 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 05:38:09.413 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 05:38:09.487 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 05:38:09.492 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 446972477392075330337351376307171464653546616871
             IssuerDN: UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 04:14:46 UTC 2021
           Final Date: Mon May 05 04:14:46 UTC 2031
            SubjectDN: UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f8:45:f9:6c:f3:31:fe:91:ea:b2:91:bd:07:21:f5:d5:7d:f8:22:ed]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 60977c6153dc346fe4cb4bfeb3b132f264b5dd65
                       339191413286b60cf9426dc01920a3ddf041a176
                       6c5c2d1cb33b9287ea006ca35a4e6055729e8eb3
                       934214e593cce7a2f6ddbeafe303ae9d90613c75
                       709120c0e2c18114cd80a147c377a04a4620a3ab
                       652e6bdad82dcdcd78eaa97856ee64c42ed775cc
                       b127f0c525e91c9d057fba1f93ed95ca842b389b
                       98dc0e6888f1e5ce4980e0b3b5a1f261ae45dd41
                       3d075dbb26b3797ece112159d2b5ccecaa80a41e
                       401ec7bbb8be6d029603cec83d6dd3f075bd0e06
                       a973284f4e85a60e5b9deaa2953b687378d5456b
                       5e51c4a6e648f6d9d97c53c2372f9a6c27adfa04
                       f92e109e85fd5cec16c0a00f9dcc100b46826125
                       ce6a2c327104290acd7932e38a2e2062f94fe59d
                       612df788936b2db7b42ec371b29144fefedff42d
                       c35a8a3e47797927e13f3b4e529c5352ee3c25e5
                       6fde2ab00d8ecce5cc4c09ce297d5ab85b5dab07
                       280e9452ec9d5cbe3681a5f59b3a0bac8831f51b
                       e5371b0947a951d4ec5203298c1947b04fbc16d2
                       28f2856b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d4:fe:d3:06:08:98:04:dd:d7:cf:17:ae:e0:4d:1f:79:f6:b6:e8:2a]
            modulus: be662217343174a030dd483d0e65c4571d861ec918e9a29dfdfb0b1131f74bbcd0acd56451627b6e9458ce983bd85cb0853dfbd208753cac1ab412ba791ac479b3d5ac75c482d0c057e94b165325555f59ca73e849ffb6bcaac9b50fb23f484eea2cdb93c94f169f1cbacc429aebedd204b84f560aefa2ca129c39c5c344b138478f382d834fcf8e7c2224be3b4ad85921cad8946bfef37751938c6d9101b1fadfd6cec0b66fcd7e83fa22079b33a4cb60369cba1d34a90cc5c18f40e2df8f50c5234ca08c98f8b051a84bcdcc5220254d11b8eb4ef0cae29856feaf0f6656e62a33bb6253ea525701c6d5df0f33f9d04db85109d32e5fec99227fbbb277aa2d
    public exponent: 10001

] 
2021-05-05 05:39:17.811  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 05:39:17.812 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 05:39:17.813 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-05 05:39:17.813 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 05:39:17.814  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-05 05:39:17.814  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 05:39:17.815  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 05:39:17.815  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 05:39:17.815  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 05:39:17.820  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 05:39:17.820  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 05:39:17.820  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 05:39:17.823  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 05:39:18.000  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 05:39:18.000  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 05:39:18.001 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 05:39:18.003 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 05:39:18.004  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1239
2021-05-05 05:39:18.004  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 05:39:18.006  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 05:39:18.006  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 05:39:18.007  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 05:39:18.007  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 05:39:18.008 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 05:39:18.008 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 05:39:18.009 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 05:39:18.009 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 05:39:18.010 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 05:39:18.010 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 05:39:18.011 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 05:39:18.014 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 446972477392075330337351376307171464653546616871
             IssuerDN: UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 04:14:46 UTC 2021
           Final Date: Mon May 05 04:14:46 UTC 2031
            SubjectDN: UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f8:45:f9:6c:f3:31:fe:91:ea:b2:91:bd:07:21:f5:d5:7d:f8:22:ed]
            modulus: 89d9c0dd04c9afc38a767562127dc25dd105b5dfcdd513c5c2104d7a9477058f5ae924eb6e8781fe4246bf799ceda362a5305b9efdd0dd0b9def02747c05a39708cb17a529f07839579b4e255a58d3bbe27307d2732b9f8fb80b605978df30d8077539c23c73310b3832b9c3942f2e6f1973b221699f0c964c6d015488e0a79143523d575333edefb0a37690a54a1ac5f414fdc89ea52f03602063947b2f80b4333fa6ea965b2e4600fea0d72f85f4a99165fbe89be5386ec2d01e363f01e206e8c6031e0d29e65d5091dfcce4e9677308cd1016e1bf5cd68e208679444aa533be4abc0e09fcbe8fb4969e9ddf50ffe974387cac91d0391f5bf531352ad29fb60c6e6a0e9240ed010d7939fe8f2fac9f113db7733fe44de709bbb706e91a224a62444452031e0fc7916031fe0a7eb5a0a430f6c593bc00c0453b0f461ba7139948af84a796194837e5cfb52594f0035c8d294bfe6a5abf5a7269c52805355d59604867d6411ca3de45ef66e5acaca66754f7a375be16efdd07cc6961017c834d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 60977c6153dc346fe4cb4bfeb3b132f264b5dd65
                       339191413286b60cf9426dc01920a3ddf041a176
                       6c5c2d1cb33b9287ea006ca35a4e6055729e8eb3
                       934214e593cce7a2f6ddbeafe303ae9d90613c75
                       709120c0e2c18114cd80a147c377a04a4620a3ab
                       652e6bdad82dcdcd78eaa97856ee64c42ed775cc
                       b127f0c525e91c9d057fba1f93ed95ca842b389b
                       98dc0e6888f1e5ce4980e0b3b5a1f261ae45dd41
                       3d075dbb26b3797ece112159d2b5ccecaa80a41e
                       401ec7bbb8be6d029603cec83d6dd3f075bd0e06
                       a973284f4e85a60e5b9deaa2953b687378d5456b
                       5e51c4a6e648f6d9d97c53c2372f9a6c27adfa04
                       f92e109e85fd5cec16c0a00f9dcc100b46826125
                       ce6a2c327104290acd7932e38a2e2062f94fe59d
                       612df788936b2db7b42ec371b29144fefedff42d
                       c35a8a3e47797927e13f3b4e529c5352ee3c25e5
                       6fde2ab00d8ecce5cc4c09ce297d5ab85b5dab07
                       280e9452ec9d5cbe3681a5f59b3a0bac8831f51b
                       e5371b0947a951d4ec5203298c1947b04fbc16d2
                       28f2856b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d0:22:f7:a8:29:2d:98:07:9f:bd:54:14:84:13:d4:42:00:96:31:cc]
            modulus: 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
    public exponent: 10001

] 
2021-05-05 05:42:05.310  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 05:42:05.312 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 05:42:05.313 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-05 05:42:05.314 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 05:42:05.314  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-05 05:42:05.315  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 05:42:05.315  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 05:42:05.316  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 05:42:05.316  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 05:42:05.320  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 05:42:05.321  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 05:42:05.322  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 05:42:05.325  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 05:42:05.482  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 05:42:05.483  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 05:42:05.483 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 05:42:05.484 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 05:42:05.485  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1239
2021-05-05 05:42:05.487  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 05:42:05.489  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 05:42:05.489  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 05:42:05.490  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 05:42:05.490  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 05:42:05.490 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 05:42:05.491 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 05:42:05.491 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 05:42:05.491 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 05:42:05.492 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 05:42:05.492 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 05:42:05.493 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 05:42:05.496 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 446972477392075330337351376307171464653546616871
             IssuerDN: UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 04:14:46 UTC 2021
           Final Date: Mon May 05 04:14:46 UTC 2031
            SubjectDN: UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f8:45:f9:6c:f3:31:fe:91:ea:b2:91:bd:07:21:f5:d5:7d:f8:22:ed]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 60977c6153dc346fe4cb4bfeb3b132f264b5dd65
                       339191413286b60cf9426dc01920a3ddf041a176
                       6c5c2d1cb33b9287ea006ca35a4e6055729e8eb3
                       934214e593cce7a2f6ddbeafe303ae9d90613c75
                       709120c0e2c18114cd80a147c377a04a4620a3ab
                       652e6bdad82dcdcd78eaa97856ee64c42ed775cc
                       b127f0c525e91c9d057fba1f93ed95ca842b389b
                       98dc0e6888f1e5ce4980e0b3b5a1f261ae45dd41
                       3d075dbb26b3797ece112159d2b5ccecaa80a41e
                       401ec7bbb8be6d029603cec83d6dd3f075bd0e06
                       a973284f4e85a60e5b9deaa2953b687378d5456b
                       5e51c4a6e648f6d9d97c53c2372f9a6c27adfa04
                       f92e109e85fd5cec16c0a00f9dcc100b46826125
                       ce6a2c327104290acd7932e38a2e2062f94fe59d
                       612df788936b2db7b42ec371b29144fefedff42d
                       c35a8a3e47797927e13f3b4e529c5352ee3c25e5
                       6fde2ab00d8ecce5cc4c09ce297d5ab85b5dab07
                       280e9452ec9d5cbe3681a5f59b3a0bac8831f51b
                       e5371b0947a951d4ec5203298c1947b04fbc16d2
                       28f2856b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [80:e0:a2:66:ce:45:f4:7a:90:ce:45:78:4d:2b:c4:d2:61:fb:05:1d]
            modulus: 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
    public exponent: 10001

] 
2021-05-05 05:42:59.898  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 05:42:59.899 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 05:42:59.899 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-05 05:42:59.900 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 05:42:59.900  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-05 05:42:59.901  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 05:42:59.901  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 05:42:59.901  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 05:42:59.902  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 05:42:59.906  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 05:42:59.906  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 05:42:59.906  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 05:42:59.908  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 05:43:00.013  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 05:43:00.013  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 05:43:00.013 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 05:43:00.015 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 05:43:00.015  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1239
2021-05-05 05:43:00.015  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 05:43:00.016  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 05:43:00.017  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 05:43:00.017  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 05:43:00.017  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 05:43:00.018 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 05:43:00.018 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 05:43:00.018 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 05:43:00.019 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 05:43:00.019 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 05:43:00.019 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 05:43:00.020 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 05:43:00.022 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 446972477392075330337351376307171464653546616871
             IssuerDN: UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 04:14:46 UTC 2021
           Final Date: Mon May 05 04:14:46 UTC 2031
            SubjectDN: UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f8:45:f9:6c:f3:31:fe:91:ea:b2:91:bd:07:21:f5:d5:7d:f8:22:ed]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 60977c6153dc346fe4cb4bfeb3b132f264b5dd65
                       339191413286b60cf9426dc01920a3ddf041a176
                       6c5c2d1cb33b9287ea006ca35a4e6055729e8eb3
                       934214e593cce7a2f6ddbeafe303ae9d90613c75
                       709120c0e2c18114cd80a147c377a04a4620a3ab
                       652e6bdad82dcdcd78eaa97856ee64c42ed775cc
                       b127f0c525e91c9d057fba1f93ed95ca842b389b
                       98dc0e6888f1e5ce4980e0b3b5a1f261ae45dd41
                       3d075dbb26b3797ece112159d2b5ccecaa80a41e
                       401ec7bbb8be6d029603cec83d6dd3f075bd0e06
                       a973284f4e85a60e5b9deaa2953b687378d5456b
                       5e51c4a6e648f6d9d97c53c2372f9a6c27adfa04
                       f92e109e85fd5cec16c0a00f9dcc100b46826125
                       ce6a2c327104290acd7932e38a2e2062f94fe59d
                       612df788936b2db7b42ec371b29144fefedff42d
                       c35a8a3e47797927e13f3b4e529c5352ee3c25e5
                       6fde2ab00d8ecce5cc4c09ce297d5ab85b5dab07
                       280e9452ec9d5cbe3681a5f59b3a0bac8831f51b
                       e5371b0947a951d4ec5203298c1947b04fbc16d2
                       28f2856b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [dd:6f:86:3b:5e:e6:4e:48:4a:b0:8f:b6:72:eb:93:8e:8b:34:65:4e]
            modulus: b6dc6c7b684375450b2a9cf7f99cb01c7f0d34a0f23265e6a82e15d181dc49b30e22119ab285d00ba05cde69791f30f942a217eb47dd48f783906c332d51f27790f5176bddbce9c396b0ab580fd4950c61cf46792f7873ff66f38985a1d592f0ff30312638fae6e1f8bccf05be1636183837a737adee0a201e492c292005cfd7c543d987270d302ac3813562d6704000ceea29401a25884d0c8a9ab6d11072815e71a635666a55b4daf086ab6ac48a550f81571f04368e06c8e814675b731f94b1a99b53b74ca09c9d2a121b48d4038d0238c252f6a6c0c88cd436513566a53bbb46bcf35dff2de4046f9e6006b3dcaa0d869646e1ee2bf5a989ae6be4e183c9
    public exponent: 10001

] 
2021-05-05 05:43:45.998  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 05:43:45.999 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 05:43:46.000 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-05 05:43:46.001 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 05:43:46.001  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-05 05:43:46.002  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 05:43:46.002  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 05:43:46.002  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 05:43:46.003  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 05:43:46.007  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 05:43:46.008  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 05:43:46.008  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 05:43:46.009  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 05:43:46.162  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 05:43:46.187  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 05:43:46.187 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 05:43:46.188 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 05:43:46.189  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1239
2021-05-05 05:43:46.189  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 05:43:46.191  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 05:43:46.191  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 05:43:46.192  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 05:43:46.192  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 05:43:46.193 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 05:43:46.193 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 05:43:46.194 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 05:43:46.194 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 05:43:46.195 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 05:43:46.195 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 05:43:46.196 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 05:43:46.198 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 446972477392075330337351376307171464653546616871
             IssuerDN: UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 04:14:46 UTC 2021
           Final Date: Mon May 05 04:14:46 UTC 2031
            SubjectDN: UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f8:45:f9:6c:f3:31:fe:91:ea:b2:91:bd:07:21:f5:d5:7d:f8:22:ed]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 60977c6153dc346fe4cb4bfeb3b132f264b5dd65
                       339191413286b60cf9426dc01920a3ddf041a176
                       6c5c2d1cb33b9287ea006ca35a4e6055729e8eb3
                       934214e593cce7a2f6ddbeafe303ae9d90613c75
                       709120c0e2c18114cd80a147c377a04a4620a3ab
                       652e6bdad82dcdcd78eaa97856ee64c42ed775cc
                       b127f0c525e91c9d057fba1f93ed95ca842b389b
                       98dc0e6888f1e5ce4980e0b3b5a1f261ae45dd41
                       3d075dbb26b3797ece112159d2b5ccecaa80a41e
                       401ec7bbb8be6d029603cec83d6dd3f075bd0e06
                       a973284f4e85a60e5b9deaa2953b687378d5456b
                       5e51c4a6e648f6d9d97c53c2372f9a6c27adfa04
                       f92e109e85fd5cec16c0a00f9dcc100b46826125
                       ce6a2c327104290acd7932e38a2e2062f94fe59d
                       612df788936b2db7b42ec371b29144fefedff42d
                       c35a8a3e47797927e13f3b4e529c5352ee3c25e5
                       6fde2ab00d8ecce5cc4c09ce297d5ab85b5dab07
                       280e9452ec9d5cbe3681a5f59b3a0bac8831f51b
                       e5371b0947a951d4ec5203298c1947b04fbc16d2
                       28f2856b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0b:75:cd:be:a1:98:67:24:da:f3:84:df:1a:73:a3:ff:97:8f:77:fe]
            modulus: de6b23a1ba56051642365d55dc67c81dce69fe0435ecfe2e203bdf3067a9672ae9ba2304337254379f3a198d6a89e46f435f7377e600dcf125ace43767e60c5e9ff89f68ecc9bcb44c04775ebaca1d2905952fb4c14e08057b4f1786beaf800aba5e0808b57cd3d33fbc52b367c2f78a3e5e7bc796c28d6f6fcdbafadec17a60af31a320d32bd85b3fcef8c73d2b4601602d88322f7e834d7f178ea7028a2288ac23a9fc9be50387b5360b0e321984ad4de4b95d61efbf0dc7768129e0418b97cc8a59294fd5d938f8dbf70b8472a45ae046fe6f2ba6334522e44ce5f1a1985ebdfa5c8e7aa1b7ef0deb02122d5c623025268e83a5712b23357044cd024dd5fd
    public exponent: 10001

] 
2021-05-05 05:43:54.909  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 05:43:54.910 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 05:43:54.911 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-05 05:43:54.911 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 05:43:54.911  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-05 05:43:54.912  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 05:43:54.912  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 05:43:54.913  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 05:43:54.913  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 05:43:54.917  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 05:43:54.918  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 05:43:54.918  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 05:43:54.919  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 05:43:55.015  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 05:43:55.015  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 05:43:55.015 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 05:43:55.017 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 05:43:55.017  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1239
2021-05-05 05:43:55.017  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 05:43:55.018  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 05:43:55.019  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 05:43:55.019  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 05:43:55.020  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 05:43:55.020 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 05:43:55.020 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 05:43:55.021 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 05:43:55.021 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 05:43:55.022 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 05:43:55.022 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 05:43:55.023 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 05:43:55.089 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 446972477392075330337351376307171464653546616871
             IssuerDN: UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 04:14:46 UTC 2021
           Final Date: Mon May 05 04:14:46 UTC 2031
            SubjectDN: UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f8:45:f9:6c:f3:31:fe:91:ea:b2:91:bd:07:21:f5:d5:7d:f8:22:ed]
            modulus: 89d9c0dd04c9afc38a767562127dc25dd105b5dfcdd513c5c2104d7a9477058f5ae924eb6e8781fe4246bf799ceda362a5305b9efdd0dd0b9def02747c05a39708cb17a529f07839579b4e255a58d3bbe27307d2732b9f8fb80b605978df30d8077539c23c73310b3832b9c3942f2e6f1973b221699f0c964c6d015488e0a79143523d575333edefb0a37690a54a1ac5f414fdc89ea52f03602063947b2f80b4333fa6ea965b2e4600fea0d72f85f4a99165fbe89be5386ec2d01e363f01e206e8c6031e0d29e65d5091dfcce4e9677308cd1016e1bf5cd68e208679444aa533be4abc0e09fcbe8fb4969e9ddf50ffe974387cac91d0391f5bf531352ad29fb60c6e6a0e9240ed010d7939fe8f2fac9f113db7733fe44de709bbb706e91a224a62444452031e0fc7916031fe0a7eb5a0a430f6c593bc00c0453b0f461ba7139948af84a796194837e5cfb52594f0035c8d294bfe6a5abf5a7269c52805355d59604867d6411ca3de45ef66e5acaca66754f7a375be16efdd07cc6961017c834d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 60977c6153dc346fe4cb4bfeb3b132f264b5dd65
                       339191413286b60cf9426dc01920a3ddf041a176
                       6c5c2d1cb33b9287ea006ca35a4e6055729e8eb3
                       934214e593cce7a2f6ddbeafe303ae9d90613c75
                       709120c0e2c18114cd80a147c377a04a4620a3ab
                       652e6bdad82dcdcd78eaa97856ee64c42ed775cc
                       b127f0c525e91c9d057fba1f93ed95ca842b389b
                       98dc0e6888f1e5ce4980e0b3b5a1f261ae45dd41
                       3d075dbb26b3797ece112159d2b5ccecaa80a41e
                       401ec7bbb8be6d029603cec83d6dd3f075bd0e06
                       a973284f4e85a60e5b9deaa2953b687378d5456b
                       5e51c4a6e648f6d9d97c53c2372f9a6c27adfa04
                       f92e109e85fd5cec16c0a00f9dcc100b46826125
                       ce6a2c327104290acd7932e38a2e2062f94fe59d
                       612df788936b2db7b42ec371b29144fefedff42d
                       c35a8a3e47797927e13f3b4e529c5352ee3c25e5
                       6fde2ab00d8ecce5cc4c09ce297d5ab85b5dab07
                       280e9452ec9d5cbe3681a5f59b3a0bac8831f51b
                       e5371b0947a951d4ec5203298c1947b04fbc16d2
                       28f2856b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fe:72:02:ca:b6:27:5b:56:a0:a5:9a:30:3f:0e:43:f9:2d:1a:7b:00]
            modulus: 856010a671546dabfaa3f9d8920c82ebf094ab837104ddeb3e4229a6a66d3cae9d20f3c4738ec0354838581f615d4c02b0bb7178096a2578220b53ff40ccaaa9fa1763091ed8bc439bd29901ed5c0802ce0655c8ed8fd3201a03ccf53c2090c19014e25e517635a53e689d5e09adfa0c5b70fe6aa3763713a377d280f6940c08a2fe6b147876ce0d8408a429533105c53914e605deaaf66fc80d8d07bea4f1745da24e080e5a4514b1fb91cb41636b73e5cdc39cc2b36aa72ba52b869b4a9cf6499d9170a0f9bc761fbf7b73aaa4053c5a9c028bc4eaec780bf82183177f6705ff26c8dc0c786d4cfd764d067a01860780c8f1b1f9ed2529b81eb1f121b0e581
    public exponent: 10001

] 
2021-05-05 05:43:59.507  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 05:43:59.508 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 05:43:59.509 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-05 05:43:59.510 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 05:43:59.510  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-05 05:43:59.510  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 05:43:59.511  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 05:43:59.511  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 05:43:59.511  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 05:43:59.515  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 05:43:59.515  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 05:43:59.516  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 05:43:59.516  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 05:43:59.585  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 05:43:59.587  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 05:43:59.587 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 05:43:59.589 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 05:43:59.589  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1239
2021-05-05 05:43:59.589  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 05:43:59.591  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 05:43:59.592  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 05:43:59.592  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 05:43:59.592  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 05:43:59.593 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 05:43:59.593 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 05:43:59.593 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 05:43:59.594 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 05:43:59.594 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 05:43:59.594 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 05:43:59.595 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 05:43:59.598 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 446972477392075330337351376307171464653546616871
             IssuerDN: UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 04:14:46 UTC 2021
           Final Date: Mon May 05 04:14:46 UTC 2031
            SubjectDN: UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f8:45:f9:6c:f3:31:fe:91:ea:b2:91:bd:07:21:f5:d5:7d:f8:22:ed]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 60977c6153dc346fe4cb4bfeb3b132f264b5dd65
                       339191413286b60cf9426dc01920a3ddf041a176
                       6c5c2d1cb33b9287ea006ca35a4e6055729e8eb3
                       934214e593cce7a2f6ddbeafe303ae9d90613c75
                       709120c0e2c18114cd80a147c377a04a4620a3ab
                       652e6bdad82dcdcd78eaa97856ee64c42ed775cc
                       b127f0c525e91c9d057fba1f93ed95ca842b389b
                       98dc0e6888f1e5ce4980e0b3b5a1f261ae45dd41
                       3d075dbb26b3797ece112159d2b5ccecaa80a41e
                       401ec7bbb8be6d029603cec83d6dd3f075bd0e06
                       a973284f4e85a60e5b9deaa2953b687378d5456b
                       5e51c4a6e648f6d9d97c53c2372f9a6c27adfa04
                       f92e109e85fd5cec16c0a00f9dcc100b46826125
                       ce6a2c327104290acd7932e38a2e2062f94fe59d
                       612df788936b2db7b42ec371b29144fefedff42d
                       c35a8a3e47797927e13f3b4e529c5352ee3c25e5
                       6fde2ab00d8ecce5cc4c09ce297d5ab85b5dab07
                       280e9452ec9d5cbe3681a5f59b3a0bac8831f51b
                       e5371b0947a951d4ec5203298c1947b04fbc16d2
                       28f2856b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [96:d2:d9:6e:cd:af:b3:99:8f:6d:10:32:9c:a1:f5:4f:f7:21:17:a6]
            modulus: 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
    public exponent: 10001

] 
2021-05-05 05:45:55.884  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 05:45:55.885 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 05:45:55.887 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-05 05:45:55.888 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 05:45:55.888  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-05 05:45:55.888  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 05:45:55.889  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 05:45:55.889  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 05:45:55.889  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 05:45:55.893  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 05:45:55.893  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 05:45:55.894  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 05:45:55.895  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 05:45:56.002  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 05:45:56.003  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 05:45:56.003 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 05:45:56.004 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 05:45:56.004  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1239
2021-05-05 05:45:56.005  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 05:45:56.006  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 05:45:56.006  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 05:45:56.006  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 05:45:56.006  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 05:45:56.007 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 05:45:56.007 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 05:45:56.007 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 05:45:56.008 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 05:45:56.008 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 05:45:56.008 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 05:45:56.009 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 05:45:56.011 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 446972477392075330337351376307171464653546616871
             IssuerDN: UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 04:14:46 UTC 2021
           Final Date: Mon May 05 04:14:46 UTC 2031
            SubjectDN: UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f8:45:f9:6c:f3:31:fe:91:ea:b2:91:bd:07:21:f5:d5:7d:f8:22:ed]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 60977c6153dc346fe4cb4bfeb3b132f264b5dd65
                       339191413286b60cf9426dc01920a3ddf041a176
                       6c5c2d1cb33b9287ea006ca35a4e6055729e8eb3
                       934214e593cce7a2f6ddbeafe303ae9d90613c75
                       709120c0e2c18114cd80a147c377a04a4620a3ab
                       652e6bdad82dcdcd78eaa97856ee64c42ed775cc
                       b127f0c525e91c9d057fba1f93ed95ca842b389b
                       98dc0e6888f1e5ce4980e0b3b5a1f261ae45dd41
                       3d075dbb26b3797ece112159d2b5ccecaa80a41e
                       401ec7bbb8be6d029603cec83d6dd3f075bd0e06
                       a973284f4e85a60e5b9deaa2953b687378d5456b
                       5e51c4a6e648f6d9d97c53c2372f9a6c27adfa04
                       f92e109e85fd5cec16c0a00f9dcc100b46826125
                       ce6a2c327104290acd7932e38a2e2062f94fe59d
                       612df788936b2db7b42ec371b29144fefedff42d
                       c35a8a3e47797927e13f3b4e529c5352ee3c25e5
                       6fde2ab00d8ecce5cc4c09ce297d5ab85b5dab07
                       280e9452ec9d5cbe3681a5f59b3a0bac8831f51b
                       e5371b0947a951d4ec5203298c1947b04fbc16d2
                       28f2856b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b4:71:d2:60:08:6c:76:ef:26:8c:69:e0:e3:67:c6:5e:e0:d1:85:81]
            modulus: 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
    public exponent: 10001

] 
2021-05-05 05:48:24.483  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 05:48:24.484 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 05:48:24.485 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-05 05:48:24.485 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 05:48:24.486  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-05 05:48:24.486  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 05:48:24.486  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 05:48:24.486  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 05:48:24.487  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 05:48:24.491  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 05:48:24.491  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 05:48:24.491  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 05:48:24.492  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 05:48:24.596  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 05:48:24.597  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 05:48:24.597 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 05:48:24.599 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 05:48:24.600  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1239
2021-05-05 05:48:24.600  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 05:48:24.602  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 05:48:24.602  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 05:48:24.602  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 05:48:24.603  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 05:48:24.603 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 05:48:24.604 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 05:48:24.604 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 05:48:24.605 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 05:48:24.605 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 05:48:24.606 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 05:48:24.607 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 05:48:24.610 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 446972477392075330337351376307171464653546616871
             IssuerDN: UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 04:14:46 UTC 2021
           Final Date: Mon May 05 04:14:46 UTC 2031
            SubjectDN: UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f8:45:f9:6c:f3:31:fe:91:ea:b2:91:bd:07:21:f5:d5:7d:f8:22:ed]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 60977c6153dc346fe4cb4bfeb3b132f264b5dd65
                       339191413286b60cf9426dc01920a3ddf041a176
                       6c5c2d1cb33b9287ea006ca35a4e6055729e8eb3
                       934214e593cce7a2f6ddbeafe303ae9d90613c75
                       709120c0e2c18114cd80a147c377a04a4620a3ab
                       652e6bdad82dcdcd78eaa97856ee64c42ed775cc
                       b127f0c525e91c9d057fba1f93ed95ca842b389b
                       98dc0e6888f1e5ce4980e0b3b5a1f261ae45dd41
                       3d075dbb26b3797ece112159d2b5ccecaa80a41e
                       401ec7bbb8be6d029603cec83d6dd3f075bd0e06
                       a973284f4e85a60e5b9deaa2953b687378d5456b
                       5e51c4a6e648f6d9d97c53c2372f9a6c27adfa04
                       f92e109e85fd5cec16c0a00f9dcc100b46826125
                       ce6a2c327104290acd7932e38a2e2062f94fe59d
                       612df788936b2db7b42ec371b29144fefedff42d
                       c35a8a3e47797927e13f3b4e529c5352ee3c25e5
                       6fde2ab00d8ecce5cc4c09ce297d5ab85b5dab07
                       280e9452ec9d5cbe3681a5f59b3a0bac8831f51b
                       e5371b0947a951d4ec5203298c1947b04fbc16d2
                       28f2856b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a8:6f:2c:0e:a2:8c:88:db:57:be:ae:72:53:58:45:51:f5:9d:34:75]
            modulus: 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
    public exponent: 10001

] 
2021-05-05 05:50:59.868  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 05:50:59.869 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 05:50:59.871 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-05 05:50:59.871 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 05:50:59.871  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-05 05:50:59.872  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 05:50:59.872  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 05:50:59.872  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 05:50:59.873  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 05:50:59.879  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 05:50:59.879  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 05:50:59.879  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 05:50:59.880  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 05:50:59.976  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 05:50:59.987  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 05:50:59.987 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 05:50:59.988 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 05:50:59.988  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1239
2021-05-05 05:50:59.989  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 05:50:59.990  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 05:50:59.990  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 05:50:59.990  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 05:50:59.991  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 05:50:59.991 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 05:50:59.991 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 05:50:59.991 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 05:50:59.992 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 05:50:59.992 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 05:50:59.993 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 05:50:59.993 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 05:50:59.996 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 446972477392075330337351376307171464653546616871
             IssuerDN: UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 04:14:46 UTC 2021
           Final Date: Mon May 05 04:14:46 UTC 2031
            SubjectDN: UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f8:45:f9:6c:f3:31:fe:91:ea:b2:91:bd:07:21:f5:d5:7d:f8:22:ed]
            modulus: 89d9c0dd04c9afc38a767562127dc25dd105b5dfcdd513c5c2104d7a9477058f5ae924eb6e8781fe4246bf799ceda362a5305b9efdd0dd0b9def02747c05a39708cb17a529f07839579b4e255a58d3bbe27307d2732b9f8fb80b605978df30d8077539c23c73310b3832b9c3942f2e6f1973b221699f0c964c6d015488e0a79143523d575333edefb0a37690a54a1ac5f414fdc89ea52f03602063947b2f80b4333fa6ea965b2e4600fea0d72f85f4a99165fbe89be5386ec2d01e363f01e206e8c6031e0d29e65d5091dfcce4e9677308cd1016e1bf5cd68e208679444aa533be4abc0e09fcbe8fb4969e9ddf50ffe974387cac91d0391f5bf531352ad29fb60c6e6a0e9240ed010d7939fe8f2fac9f113db7733fe44de709bbb706e91a224a62444452031e0fc7916031fe0a7eb5a0a430f6c593bc00c0453b0f461ba7139948af84a796194837e5cfb52594f0035c8d294bfe6a5abf5a7269c52805355d59604867d6411ca3de45ef66e5acaca66754f7a375be16efdd07cc6961017c834d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 60977c6153dc346fe4cb4bfeb3b132f264b5dd65
                       339191413286b60cf9426dc01920a3ddf041a176
                       6c5c2d1cb33b9287ea006ca35a4e6055729e8eb3
                       934214e593cce7a2f6ddbeafe303ae9d90613c75
                       709120c0e2c18114cd80a147c377a04a4620a3ab
                       652e6bdad82dcdcd78eaa97856ee64c42ed775cc
                       b127f0c525e91c9d057fba1f93ed95ca842b389b
                       98dc0e6888f1e5ce4980e0b3b5a1f261ae45dd41
                       3d075dbb26b3797ece112159d2b5ccecaa80a41e
                       401ec7bbb8be6d029603cec83d6dd3f075bd0e06
                       a973284f4e85a60e5b9deaa2953b687378d5456b
                       5e51c4a6e648f6d9d97c53c2372f9a6c27adfa04
                       f92e109e85fd5cec16c0a00f9dcc100b46826125
                       ce6a2c327104290acd7932e38a2e2062f94fe59d
                       612df788936b2db7b42ec371b29144fefedff42d
                       c35a8a3e47797927e13f3b4e529c5352ee3c25e5
                       6fde2ab00d8ecce5cc4c09ce297d5ab85b5dab07
                       280e9452ec9d5cbe3681a5f59b3a0bac8831f51b
                       e5371b0947a951d4ec5203298c1947b04fbc16d2
                       28f2856b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ac:f9:58:d0:26:7d:c0:36:6f:47:99:ea:ea:5c:18:33:51:cd:c0:76]
            modulus: c2815f1952bf7c7f400b64514fa02733fd7fc9ad16e947ca0869153a533a01c5772c85520eaebfb28d2b972365487488dbb8d2883feb0286c3b2764eb91f9b423e098bba9950a9877c3598b7b4fe07a054ec7e51c2f0167b7008f36d18bcced93c86f890ab914ff9af47e3ddd1812f0346660daf07cc93965219bbeaf2017d8057f431c8cce80e73e810ae462c7ffc662be316b589a67cc988b7cd8b718c40d67408a159c6f4b5608172249ab801fb8f95fc788cba216b102f97b8ffb49572d98d50854c6c6d8b1220e0f60f65c4c3962663492237b3268cf191fb271d93d763f3a7cff88949846ea8711afad3bfb95e0dfb4f362b8ea0a4f57282bf46f42aed
    public exponent: 10001

] 
2021-05-05 05:52:56.272  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 05:52:56.273 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 05:52:56.275 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-05 05:52:56.275 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 05:52:56.276  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-05 05:52:56.276  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 05:52:56.276  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 05:52:56.277  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 05:52:56.277  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 05:52:56.283  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 05:52:56.284  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 05:52:56.284  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 05:52:56.286  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 05:52:56.386  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 05:52:56.387  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 05:52:56.387 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 05:52:56.389 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 05:52:56.389  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1239
2021-05-05 05:52:56.390  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 05:52:56.391  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 05:52:56.391  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 05:52:56.392  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 05:52:56.392  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 05:52:56.392 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 05:52:56.393 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 05:52:56.393 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 05:52:56.393 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 05:52:56.394 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 05:52:56.394 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 05:52:56.395 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 05:52:56.398 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 446972477392075330337351376307171464653546616871
             IssuerDN: UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 04:14:46 UTC 2021
           Final Date: Mon May 05 04:14:46 UTC 2031
            SubjectDN: UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f8:45:f9:6c:f3:31:fe:91:ea:b2:91:bd:07:21:f5:d5:7d:f8:22:ed]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 60977c6153dc346fe4cb4bfeb3b132f264b5dd65
                       339191413286b60cf9426dc01920a3ddf041a176
                       6c5c2d1cb33b9287ea006ca35a4e6055729e8eb3
                       934214e593cce7a2f6ddbeafe303ae9d90613c75
                       709120c0e2c18114cd80a147c377a04a4620a3ab
                       652e6bdad82dcdcd78eaa97856ee64c42ed775cc
                       b127f0c525e91c9d057fba1f93ed95ca842b389b
                       98dc0e6888f1e5ce4980e0b3b5a1f261ae45dd41
                       3d075dbb26b3797ece112159d2b5ccecaa80a41e
                       401ec7bbb8be6d029603cec83d6dd3f075bd0e06
                       a973284f4e85a60e5b9deaa2953b687378d5456b
                       5e51c4a6e648f6d9d97c53c2372f9a6c27adfa04
                       f92e109e85fd5cec16c0a00f9dcc100b46826125
                       ce6a2c327104290acd7932e38a2e2062f94fe59d
                       612df788936b2db7b42ec371b29144fefedff42d
                       c35a8a3e47797927e13f3b4e529c5352ee3c25e5
                       6fde2ab00d8ecce5cc4c09ce297d5ab85b5dab07
                       280e9452ec9d5cbe3681a5f59b3a0bac8831f51b
                       e5371b0947a951d4ec5203298c1947b04fbc16d2
                       28f2856b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a3:e0:ee:a0:c5:22:df:10:ad:74:25:93:00:e4:2a:0d:ad:be:bf:e9]
            modulus: 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
    public exponent: 10001

] 
2021-05-05 05:54:21.036  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 05:54:21.036 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 05:54:21.037 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-05 05:54:21.038 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 05:54:21.038  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-05 05:54:21.039  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 05:54:21.039  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 05:54:21.039  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 05:54:21.039  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 05:54:21.043  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 05:54:21.044  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 05:54:21.044  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 05:54:21.045  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 05:54:21.140  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 05:54:21.141  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 05:54:21.141 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 05:54:21.142 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 05:54:21.143  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1239
2021-05-05 05:54:21.143  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 05:54:21.144  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 05:54:21.144  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 05:54:21.144  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 05:54:21.144  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 05:54:21.145 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 05:54:21.145 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 05:54:21.145 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 05:54:21.145 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 05:54:21.146 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 05:54:21.146 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 05:54:21.146 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 05:54:21.148 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 446972477392075330337351376307171464653546616871
             IssuerDN: UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 04:14:46 UTC 2021
           Final Date: Mon May 05 04:14:46 UTC 2031
            SubjectDN: UID=c-0bcd3d869cf92d8b3,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f8:45:f9:6c:f3:31:fe:91:ea:b2:91:bd:07:21:f5:d5:7d:f8:22:ed]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 60977c6153dc346fe4cb4bfeb3b132f264b5dd65
                       339191413286b60cf9426dc01920a3ddf041a176
                       6c5c2d1cb33b9287ea006ca35a4e6055729e8eb3
                       934214e593cce7a2f6ddbeafe303ae9d90613c75
                       709120c0e2c18114cd80a147c377a04a4620a3ab
                       652e6bdad82dcdcd78eaa97856ee64c42ed775cc
                       b127f0c525e91c9d057fba1f93ed95ca842b389b
                       98dc0e6888f1e5ce4980e0b3b5a1f261ae45dd41
                       3d075dbb26b3797ece112159d2b5ccecaa80a41e
                       401ec7bbb8be6d029603cec83d6dd3f075bd0e06
                       a973284f4e85a60e5b9deaa2953b687378d5456b
                       5e51c4a6e648f6d9d97c53c2372f9a6c27adfa04
                       f92e109e85fd5cec16c0a00f9dcc100b46826125
                       ce6a2c327104290acd7932e38a2e2062f94fe59d
                       612df788936b2db7b42ec371b29144fefedff42d
                       c35a8a3e47797927e13f3b4e529c5352ee3c25e5
                       6fde2ab00d8ecce5cc4c09ce297d5ab85b5dab07
                       280e9452ec9d5cbe3681a5f59b3a0bac8831f51b
                       e5371b0947a951d4ec5203298c1947b04fbc16d2
                       28f2856b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4f:87:e9:07:45:6b:dc:46:cc:db:28:52:f1:da:96:e9:d5:d3:fa:34]
            modulus: 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
    public exponent: 10001

]