Results

By type

          2021-05-30 01:11:30,687 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-05-30 01:11:34,198 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-05-30 01:11:36.885  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-05-30 01:11:47.401 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-05-30 01:11:48.501  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-05-30 01:11:49.278  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-05-30 01:12:00.380  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 31.603 seconds (JVM running for 37.744)
2021-05-30 01:29:06.887  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-30 01:29:06.896 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-30 01:29:07.092 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-30 01:29:07.096 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-30 01:29:07.180  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-30 01:29:07.184  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-30 01:29:07.188  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-30 01:29:07.189  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 01:29:07.189  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-30 01:29:07.195  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-30 01:29:07.198  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-30 01:29:07.385  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-30 01:29:07.391  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 01:29:07.391  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 01:29:07.483  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-30 01:29:08.686  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-30 01:29:08.689  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-30 01:29:08.690 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-30 01:29:08.694 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-30 01:29:08.696  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1489
2021-05-30 01:29:08.696  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-30 01:29:08.700  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-30 01:29:08.700  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-30 01:29:08.781  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-30 01:29:08.783  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-30 01:29:08.783 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 01:29:08.784 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 01:29:08.784 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 01:29:08.797 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 01:29:08.797 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 01:29:08.798 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 01:29:08.804 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-30 01:29:08.980 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 556361099812106194759715698783736529071681187194
             IssuerDN: UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 30 01:07:07 UTC 2021
           Final Date: Fri May 30 01:07:06 UTC 2031
            SubjectDN: UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7b:8d:50:4f:36:2f:4b:cf:2d:e4:b0:b6:63:5e:cd:2f:d0:d0:11:ae]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62bef2e8886870d136c66ea3a99845bfca0bca75
                       be1b20781689128756bbc23d84a974ab0621a1db
                       82ee6aedb6dd8ad0fbe02e8e099e5ff4a42636f0
                       0ae5dd6f2bc7b4674ad7a174dfb7d172e21a59a7
                       fd1ccb24dc706cb9b476db76dc5bc898c7541b02
                       1c6b1cefd7ed0425dc121c74a33f46205dd6b3b1
                       636521fd8db4cbfaa9117dc25cb6e7e4a37db2a4
                       b79c4e1c0210d0b6bbedf064ddadb801d06817f6
                       d6d16ac671a50ce66f9f23bfeddd3033ed8a2758
                       f8bd1cbcef2a410fda2b1735d95d1cc581034783
                       fa9d1d6e61ffab58d71730aa14f5e02de9b3cb65
                       1be4dc2586f2e32ec114b032360f5718b3f62f6d
                       a63a87b93e246f929a2dcadd0552dce28dc59bdd
                       080d887293737b2b8a857ed0d022c73d2afcea45
                       82e490d4a05b5c64cfcebdb437d469c16f67deed
                       ddc88657f7fe3e10634741eb39124459d325b193
                       d9f3374e5cde4b6e5ab9230e87718b6e059de223
                       7a0cefcd27a88422a57ea7cfddf3a5a2e97ee901
                       3efd4cf476b5dd0633fcd24b25fb7162c4e3ebee
                       14fd3646
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c4:bd:42:fc:57:7c:bb:3c:33:ce:81:5f:32:95:1d:56:3e:fd:ba:a2]
            modulus: 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
    public exponent: 10001

] 
2021-05-30 02:43:50.401  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-30 02:43:50.402 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-30 02:43:50.403 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-30 02:43:50.404 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-30 02:43:50.405  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-30 02:43:50.406  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-30 02:43:50.406  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-30 02:43:50.406  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-30 02:43:50.407  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-30 02:43:50.413  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-30 02:43:50.414  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 02:43:50.414  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 02:43:50.482  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-30 02:43:50.582  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-30 02:43:50.583  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-30 02:43:50.583 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-30 02:43:50.587 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-30 02:43:50.587  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1489
2021-05-30 02:43:50.588  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-30 02:43:50.591  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-30 02:43:50.592  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-30 02:43:50.592  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-30 02:43:50.593  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-30 02:43:50.593 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 02:43:50.593 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 02:43:50.594 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 02:43:50.595 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 02:43:50.595 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 02:43:50.596 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 02:43:50.678 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-30 02:43:50.683 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 556361099812106194759715698783736529071681187194
             IssuerDN: UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 30 01:07:07 UTC 2021
           Final Date: Fri May 30 01:07:06 UTC 2031
            SubjectDN: UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7b:8d:50:4f:36:2f:4b:cf:2d:e4:b0:b6:63:5e:cd:2f:d0:d0:11:ae]
            modulus: b60ca836173babb4206a4acda967501b3361cb1ab550de71c51287f2310e184db84a483da0e1a62ef6ccda2cf4db68b84ff5199b3e1a827af9b0e2a51dc080610b58ff530b4688f127562db8385a24a3520d8c8c84200825f78c247f73cfa298fc75f16a774b6a38409121b0788bc03c9d02d27da60b59632eb454f135ae4d7fea51cd5320e53d143e2386c9dc71606bfdb324754cb769f9d500c013659ca0787488e73e5de996fe50b9867081e449f564eac11d83d9d9e232e579ef4ed8aa96a60b4419810dc43f0be9d11fe9714e87395eb511be8025fc505b72ebe928d66c8c379e2f77a5ce3e6ec5c591eaeb3a2cfeee9aa8c3eec231421f7fff30cb8912307c62857c507cbdac1c3d24db523f830020d9314a133506af75c65882cb411bb6bfb8c53536fab9bc1b91be79753592a9afbef071c5bf736e1855227732a5d81833409027520bbeae01577f1f09710bb3db3920e029dcc0bfaad2bee4644fe7b2eaf5cf53e1d801139ce50f2bcf42d28d6b926ff1f810092085f54be644271b
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62bef2e8886870d136c66ea3a99845bfca0bca75
                       be1b20781689128756bbc23d84a974ab0621a1db
                       82ee6aedb6dd8ad0fbe02e8e099e5ff4a42636f0
                       0ae5dd6f2bc7b4674ad7a174dfb7d172e21a59a7
                       fd1ccb24dc706cb9b476db76dc5bc898c7541b02
                       1c6b1cefd7ed0425dc121c74a33f46205dd6b3b1
                       636521fd8db4cbfaa9117dc25cb6e7e4a37db2a4
                       b79c4e1c0210d0b6bbedf064ddadb801d06817f6
                       d6d16ac671a50ce66f9f23bfeddd3033ed8a2758
                       f8bd1cbcef2a410fda2b1735d95d1cc581034783
                       fa9d1d6e61ffab58d71730aa14f5e02de9b3cb65
                       1be4dc2586f2e32ec114b032360f5718b3f62f6d
                       a63a87b93e246f929a2dcadd0552dce28dc59bdd
                       080d887293737b2b8a857ed0d022c73d2afcea45
                       82e490d4a05b5c64cfcebdb437d469c16f67deed
                       ddc88657f7fe3e10634741eb39124459d325b193
                       d9f3374e5cde4b6e5ab9230e87718b6e059de223
                       7a0cefcd27a88422a57ea7cfddf3a5a2e97ee901
                       3efd4cf476b5dd0633fcd24b25fb7162c4e3ebee
                       14fd3646
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [96:90:70:77:42:30:95:dd:08:76:a1:bf:49:3a:1c:c3:a0:1d:1f:75]
            modulus: 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
    public exponent: 10001

] 
2021-05-30 02:45:23.986  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-30 02:45:23.987 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-30 02:45:23.989 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-30 02:45:23.989 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-30 02:45:23.990  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-30 02:45:23.990  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-30 02:45:23.991  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-30 02:45:23.991  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-30 02:45:23.991  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-30 02:45:24.081  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-30 02:45:24.082  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 02:45:24.082  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 02:45:24.085  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-30 02:45:24.187  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-30 02:45:24.188  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-30 02:45:24.188 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-30 02:45:24.189 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-30 02:45:24.190  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1489
2021-05-30 02:45:24.190  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-30 02:45:24.196  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-30 02:45:24.196  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-30 02:45:24.197  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-30 02:45:24.197  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-30 02:45:24.198 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 02:45:24.198 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 02:45:24.198 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 02:45:24.199 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 02:45:24.200 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 02:45:24.200 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 02:45:24.201 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-30 02:45:24.279 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 556361099812106194759715698783736529071681187194
             IssuerDN: UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 30 01:07:07 UTC 2021
           Final Date: Fri May 30 01:07:06 UTC 2031
            SubjectDN: UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7b:8d:50:4f:36:2f:4b:cf:2d:e4:b0:b6:63:5e:cd:2f:d0:d0:11:ae]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62bef2e8886870d136c66ea3a99845bfca0bca75
                       be1b20781689128756bbc23d84a974ab0621a1db
                       82ee6aedb6dd8ad0fbe02e8e099e5ff4a42636f0
                       0ae5dd6f2bc7b4674ad7a174dfb7d172e21a59a7
                       fd1ccb24dc706cb9b476db76dc5bc898c7541b02
                       1c6b1cefd7ed0425dc121c74a33f46205dd6b3b1
                       636521fd8db4cbfaa9117dc25cb6e7e4a37db2a4
                       b79c4e1c0210d0b6bbedf064ddadb801d06817f6
                       d6d16ac671a50ce66f9f23bfeddd3033ed8a2758
                       f8bd1cbcef2a410fda2b1735d95d1cc581034783
                       fa9d1d6e61ffab58d71730aa14f5e02de9b3cb65
                       1be4dc2586f2e32ec114b032360f5718b3f62f6d
                       a63a87b93e246f929a2dcadd0552dce28dc59bdd
                       080d887293737b2b8a857ed0d022c73d2afcea45
                       82e490d4a05b5c64cfcebdb437d469c16f67deed
                       ddc88657f7fe3e10634741eb39124459d325b193
                       d9f3374e5cde4b6e5ab9230e87718b6e059de223
                       7a0cefcd27a88422a57ea7cfddf3a5a2e97ee901
                       3efd4cf476b5dd0633fcd24b25fb7162c4e3ebee
                       14fd3646
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d5:4d:16:5d:a3:81:a9:0e:3a:fc:ed:a6:81:a6:82:cb:b2:73:f4:5c]
            modulus: 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
    public exponent: 10001

] 
2021-05-30 02:48:16.347  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-30 02:48:16.348 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-30 02:48:16.349 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-30 02:48:16.350 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-30 02:48:16.350  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-30 02:48:16.351  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-30 02:48:16.351  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-30 02:48:16.351  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-30 02:48:16.352  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-30 02:48:16.359  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-30 02:48:16.360  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 02:48:16.360  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 02:48:16.362  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-30 02:48:16.470  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-30 02:48:16.471  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-30 02:48:16.478 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-30 02:48:16.480 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-30 02:48:16.480  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1489
2021-05-30 02:48:16.481  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-30 02:48:16.482  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-30 02:48:16.482  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-30 02:48:16.483  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-30 02:48:16.483  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-30 02:48:16.483 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 02:48:16.484 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 02:48:16.484 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 02:48:16.484 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 02:48:16.485 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 02:48:16.485 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 02:48:16.486 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-30 02:48:16.488 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 556361099812106194759715698783736529071681187194
             IssuerDN: UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 30 01:07:07 UTC 2021
           Final Date: Fri May 30 01:07:06 UTC 2031
            SubjectDN: UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7b:8d:50:4f:36:2f:4b:cf:2d:e4:b0:b6:63:5e:cd:2f:d0:d0:11:ae]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62bef2e8886870d136c66ea3a99845bfca0bca75
                       be1b20781689128756bbc23d84a974ab0621a1db
                       82ee6aedb6dd8ad0fbe02e8e099e5ff4a42636f0
                       0ae5dd6f2bc7b4674ad7a174dfb7d172e21a59a7
                       fd1ccb24dc706cb9b476db76dc5bc898c7541b02
                       1c6b1cefd7ed0425dc121c74a33f46205dd6b3b1
                       636521fd8db4cbfaa9117dc25cb6e7e4a37db2a4
                       b79c4e1c0210d0b6bbedf064ddadb801d06817f6
                       d6d16ac671a50ce66f9f23bfeddd3033ed8a2758
                       f8bd1cbcef2a410fda2b1735d95d1cc581034783
                       fa9d1d6e61ffab58d71730aa14f5e02de9b3cb65
                       1be4dc2586f2e32ec114b032360f5718b3f62f6d
                       a63a87b93e246f929a2dcadd0552dce28dc59bdd
                       080d887293737b2b8a857ed0d022c73d2afcea45
                       82e490d4a05b5c64cfcebdb437d469c16f67deed
                       ddc88657f7fe3e10634741eb39124459d325b193
                       d9f3374e5cde4b6e5ab9230e87718b6e059de223
                       7a0cefcd27a88422a57ea7cfddf3a5a2e97ee901
                       3efd4cf476b5dd0633fcd24b25fb7162c4e3ebee
                       14fd3646
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c6:5f:18:7c:62:6c:af:66:52:54:b1:1b:77:34:e6:16:af:fd:86:01]
            modulus: 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
    public exponent: 10001

] 
2021-05-30 02:49:26.903  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-30 02:49:26.904 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-30 02:49:26.907 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-30 02:49:26.907 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-30 02:49:26.908  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-30 02:49:26.909  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-30 02:49:26.909  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-30 02:49:26.909  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-30 02:49:26.910  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-30 02:49:26.918  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-30 02:49:26.919  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 02:49:26.919  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 02:49:26.921  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-30 02:49:27.049  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-30 02:49:27.078  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-30 02:49:27.079 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-30 02:49:27.080 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-30 02:49:27.081  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1489
2021-05-30 02:49:27.081  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-30 02:49:27.082  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-30 02:49:27.083  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-30 02:49:27.083  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-30 02:49:27.083  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-30 02:49:27.084 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 02:49:27.084 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 02:49:27.084 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 02:49:27.085 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 02:49:27.085 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 02:49:27.086 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 02:49:27.086 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-30 02:49:27.089 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 556361099812106194759715698783736529071681187194
             IssuerDN: UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 30 01:07:07 UTC 2021
           Final Date: Fri May 30 01:07:06 UTC 2031
            SubjectDN: UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7b:8d:50:4f:36:2f:4b:cf:2d:e4:b0:b6:63:5e:cd:2f:d0:d0:11:ae]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62bef2e8886870d136c66ea3a99845bfca0bca75
                       be1b20781689128756bbc23d84a974ab0621a1db
                       82ee6aedb6dd8ad0fbe02e8e099e5ff4a42636f0
                       0ae5dd6f2bc7b4674ad7a174dfb7d172e21a59a7
                       fd1ccb24dc706cb9b476db76dc5bc898c7541b02
                       1c6b1cefd7ed0425dc121c74a33f46205dd6b3b1
                       636521fd8db4cbfaa9117dc25cb6e7e4a37db2a4
                       b79c4e1c0210d0b6bbedf064ddadb801d06817f6
                       d6d16ac671a50ce66f9f23bfeddd3033ed8a2758
                       f8bd1cbcef2a410fda2b1735d95d1cc581034783
                       fa9d1d6e61ffab58d71730aa14f5e02de9b3cb65
                       1be4dc2586f2e32ec114b032360f5718b3f62f6d
                       a63a87b93e246f929a2dcadd0552dce28dc59bdd
                       080d887293737b2b8a857ed0d022c73d2afcea45
                       82e490d4a05b5c64cfcebdb437d469c16f67deed
                       ddc88657f7fe3e10634741eb39124459d325b193
                       d9f3374e5cde4b6e5ab9230e87718b6e059de223
                       7a0cefcd27a88422a57ea7cfddf3a5a2e97ee901
                       3efd4cf476b5dd0633fcd24b25fb7162c4e3ebee
                       14fd3646
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [94:e3:c8:e2:d7:71:2e:18:f5:50:f1:09:fa:3e:9b:26:91:99:4e:e8]
            modulus: 996baec6a5dafb270ea5b0fde27a2b36d268c50d63f73d845d160fcf0bc0ad4b90e53418dae4dd295724554d2ccbbc458ec77e47f3cc846e6f53ac4d15235128c49344aeafd0a4f657d8af75b9b8728e08d1bb4349f9a06570e40e61ffa37e15a42ddd4cee59226c18462772349873e9c8222723f7fa65e94b26e628e86f5dd28e5d05adf86157710d5a68f142b509d9f02ea1a31bb0488859296636e82a76a2e9199817814de6fa0c6bd54c31d3925042aacca64877281993bec55c7b81614dfd9ba35f990758a432d4ef4d8f1503b7d434342b47397abd484b7f3a694c5e46b6c834d494f1fb5c6a6f4cd249918f138fdd7b0f2b58e6db52b966f17149694d
    public exponent: 10001

] 
2021-05-30 02:49:28.513  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-30 02:49:28.514 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-30 02:49:28.515 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-30 02:49:28.515 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-30 02:49:28.516  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-30 02:49:28.516  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-30 02:49:28.516  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-30 02:49:28.517  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-30 02:49:28.517  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-30 02:49:28.521  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-30 02:49:28.522  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 02:49:28.522  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 02:49:28.523  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-30 02:49:28.580  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-30 02:49:28.581  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-30 02:49:28.581 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-30 02:49:28.582 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-30 02:49:28.583  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1489
2021-05-30 02:49:28.583  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-30 02:49:28.584  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-30 02:49:28.584  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-30 02:49:28.585  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-30 02:49:28.585  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-30 02:49:28.585 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 02:49:28.586 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 02:49:28.586 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 02:49:28.586 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 02:49:28.587 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 02:49:28.587 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 02:49:28.588 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-30 02:49:28.590 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 556361099812106194759715698783736529071681187194
             IssuerDN: UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 30 01:07:07 UTC 2021
           Final Date: Fri May 30 01:07:06 UTC 2031
            SubjectDN: UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7b:8d:50:4f:36:2f:4b:cf:2d:e4:b0:b6:63:5e:cd:2f:d0:d0:11:ae]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62bef2e8886870d136c66ea3a99845bfca0bca75
                       be1b20781689128756bbc23d84a974ab0621a1db
                       82ee6aedb6dd8ad0fbe02e8e099e5ff4a42636f0
                       0ae5dd6f2bc7b4674ad7a174dfb7d172e21a59a7
                       fd1ccb24dc706cb9b476db76dc5bc898c7541b02
                       1c6b1cefd7ed0425dc121c74a33f46205dd6b3b1
                       636521fd8db4cbfaa9117dc25cb6e7e4a37db2a4
                       b79c4e1c0210d0b6bbedf064ddadb801d06817f6
                       d6d16ac671a50ce66f9f23bfeddd3033ed8a2758
                       f8bd1cbcef2a410fda2b1735d95d1cc581034783
                       fa9d1d6e61ffab58d71730aa14f5e02de9b3cb65
                       1be4dc2586f2e32ec114b032360f5718b3f62f6d
                       a63a87b93e246f929a2dcadd0552dce28dc59bdd
                       080d887293737b2b8a857ed0d022c73d2afcea45
                       82e490d4a05b5c64cfcebdb437d469c16f67deed
                       ddc88657f7fe3e10634741eb39124459d325b193
                       d9f3374e5cde4b6e5ab9230e87718b6e059de223
                       7a0cefcd27a88422a57ea7cfddf3a5a2e97ee901
                       3efd4cf476b5dd0633fcd24b25fb7162c4e3ebee
                       14fd3646
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fd:79:5d:7f:06:54:b1:ac:a3:1c:cd:79:45:2a:bf:e5:89:6a:10:db]
            modulus: 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
    public exponent: 10001

] 
2021-05-30 02:49:38.477  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-30 02:49:38.478 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-30 02:49:38.479 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-30 02:49:38.480 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-30 02:49:38.480  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-30 02:49:38.481  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-30 02:49:38.481  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-30 02:49:38.482  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-30 02:49:38.482  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-30 02:49:38.486  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-30 02:49:38.486  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 02:49:38.487  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 02:49:38.488  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-30 02:49:38.537  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-30 02:49:38.578  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-30 02:49:38.578 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-30 02:49:38.579 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-30 02:49:38.580  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1489
2021-05-30 02:49:38.580  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-30 02:49:38.581  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-30 02:49:38.581  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-30 02:49:38.582  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-30 02:49:38.582  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-30 02:49:38.582 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 02:49:38.582 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 02:49:38.583 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 02:49:38.583 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 02:49:38.584 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 02:49:38.584 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 02:49:38.585 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-30 02:49:38.587 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 556361099812106194759715698783736529071681187194
             IssuerDN: UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 30 01:07:07 UTC 2021
           Final Date: Fri May 30 01:07:06 UTC 2031
            SubjectDN: UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7b:8d:50:4f:36:2f:4b:cf:2d:e4:b0:b6:63:5e:cd:2f:d0:d0:11:ae]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62bef2e8886870d136c66ea3a99845bfca0bca75
                       be1b20781689128756bbc23d84a974ab0621a1db
                       82ee6aedb6dd8ad0fbe02e8e099e5ff4a42636f0
                       0ae5dd6f2bc7b4674ad7a174dfb7d172e21a59a7
                       fd1ccb24dc706cb9b476db76dc5bc898c7541b02
                       1c6b1cefd7ed0425dc121c74a33f46205dd6b3b1
                       636521fd8db4cbfaa9117dc25cb6e7e4a37db2a4
                       b79c4e1c0210d0b6bbedf064ddadb801d06817f6
                       d6d16ac671a50ce66f9f23bfeddd3033ed8a2758
                       f8bd1cbcef2a410fda2b1735d95d1cc581034783
                       fa9d1d6e61ffab58d71730aa14f5e02de9b3cb65
                       1be4dc2586f2e32ec114b032360f5718b3f62f6d
                       a63a87b93e246f929a2dcadd0552dce28dc59bdd
                       080d887293737b2b8a857ed0d022c73d2afcea45
                       82e490d4a05b5c64cfcebdb437d469c16f67deed
                       ddc88657f7fe3e10634741eb39124459d325b193
                       d9f3374e5cde4b6e5ab9230e87718b6e059de223
                       7a0cefcd27a88422a57ea7cfddf3a5a2e97ee901
                       3efd4cf476b5dd0633fcd24b25fb7162c4e3ebee
                       14fd3646
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b8:80:a4:52:cf:79:bd:62:e5:6d:ac:4b:16:e3:4f:02:9f:e2:0c:e3]
            modulus: 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
    public exponent: 10001

] 
2021-05-30 02:51:11.734  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-30 02:51:11.735 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-30 02:51:11.736 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-30 02:51:11.737 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-30 02:51:11.737  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-30 02:51:11.738  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-30 02:51:11.738  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-30 02:51:11.739  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-30 02:51:11.739  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-30 02:51:11.743  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-30 02:51:11.744  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 02:51:11.744  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 02:51:11.746  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-30 02:51:11.804  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-30 02:51:11.804  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-30 02:51:11.805 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-30 02:51:11.806 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-30 02:51:11.806  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1489
2021-05-30 02:51:11.807  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-30 02:51:11.808  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-30 02:51:11.809  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-30 02:51:11.809  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-30 02:51:11.810  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-30 02:51:11.810 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 02:51:11.810 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 02:51:11.811 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 02:51:11.811 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 02:51:11.812 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 02:51:11.812 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 02:51:11.813 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-30 02:51:11.815 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 556361099812106194759715698783736529071681187194
             IssuerDN: UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 30 01:07:07 UTC 2021
           Final Date: Fri May 30 01:07:06 UTC 2031
            SubjectDN: UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7b:8d:50:4f:36:2f:4b:cf:2d:e4:b0:b6:63:5e:cd:2f:d0:d0:11:ae]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62bef2e8886870d136c66ea3a99845bfca0bca75
                       be1b20781689128756bbc23d84a974ab0621a1db
                       82ee6aedb6dd8ad0fbe02e8e099e5ff4a42636f0
                       0ae5dd6f2bc7b4674ad7a174dfb7d172e21a59a7
                       fd1ccb24dc706cb9b476db76dc5bc898c7541b02
                       1c6b1cefd7ed0425dc121c74a33f46205dd6b3b1
                       636521fd8db4cbfaa9117dc25cb6e7e4a37db2a4
                       b79c4e1c0210d0b6bbedf064ddadb801d06817f6
                       d6d16ac671a50ce66f9f23bfeddd3033ed8a2758
                       f8bd1cbcef2a410fda2b1735d95d1cc581034783
                       fa9d1d6e61ffab58d71730aa14f5e02de9b3cb65
                       1be4dc2586f2e32ec114b032360f5718b3f62f6d
                       a63a87b93e246f929a2dcadd0552dce28dc59bdd
                       080d887293737b2b8a857ed0d022c73d2afcea45
                       82e490d4a05b5c64cfcebdb437d469c16f67deed
                       ddc88657f7fe3e10634741eb39124459d325b193
                       d9f3374e5cde4b6e5ab9230e87718b6e059de223
                       7a0cefcd27a88422a57ea7cfddf3a5a2e97ee901
                       3efd4cf476b5dd0633fcd24b25fb7162c4e3ebee
                       14fd3646
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a5:a7:d8:42:98:0c:1c:ef:1c:4a:90:60:0e:51:62:32:e4:b2:63:62]
            modulus: 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
    public exponent: 10001

] 
2021-05-30 02:51:24.603  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-30 02:51:24.604 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-30 02:51:24.605 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-30 02:51:24.606 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-30 02:51:24.606  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-30 02:51:24.606  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-30 02:51:24.607  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-30 02:51:24.607  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-30 02:51:24.607  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-30 02:51:24.611  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-30 02:51:24.612  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 02:51:24.612  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 02:51:24.613  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-30 02:51:24.681  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-30 02:51:24.682  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-30 02:51:24.683 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-30 02:51:24.684 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-30 02:51:24.685  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1489
2021-05-30 02:51:24.685  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-30 02:51:24.686  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-30 02:51:24.686  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-30 02:51:24.687  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-30 02:51:24.687  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-30 02:51:24.687 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 02:51:24.687 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 02:51:24.688 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 02:51:24.688 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 02:51:24.689 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 02:51:24.689 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 02:51:24.689 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-30 02:51:24.692 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 556361099812106194759715698783736529071681187194
             IssuerDN: UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 30 01:07:07 UTC 2021
           Final Date: Fri May 30 01:07:06 UTC 2031
            SubjectDN: UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7b:8d:50:4f:36:2f:4b:cf:2d:e4:b0:b6:63:5e:cd:2f:d0:d0:11:ae]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62bef2e8886870d136c66ea3a99845bfca0bca75
                       be1b20781689128756bbc23d84a974ab0621a1db
                       82ee6aedb6dd8ad0fbe02e8e099e5ff4a42636f0
                       0ae5dd6f2bc7b4674ad7a174dfb7d172e21a59a7
                       fd1ccb24dc706cb9b476db76dc5bc898c7541b02
                       1c6b1cefd7ed0425dc121c74a33f46205dd6b3b1
                       636521fd8db4cbfaa9117dc25cb6e7e4a37db2a4
                       b79c4e1c0210d0b6bbedf064ddadb801d06817f6
                       d6d16ac671a50ce66f9f23bfeddd3033ed8a2758
                       f8bd1cbcef2a410fda2b1735d95d1cc581034783
                       fa9d1d6e61ffab58d71730aa14f5e02de9b3cb65
                       1be4dc2586f2e32ec114b032360f5718b3f62f6d
                       a63a87b93e246f929a2dcadd0552dce28dc59bdd
                       080d887293737b2b8a857ed0d022c73d2afcea45
                       82e490d4a05b5c64cfcebdb437d469c16f67deed
                       ddc88657f7fe3e10634741eb39124459d325b193
                       d9f3374e5cde4b6e5ab9230e87718b6e059de223
                       7a0cefcd27a88422a57ea7cfddf3a5a2e97ee901
                       3efd4cf476b5dd0633fcd24b25fb7162c4e3ebee
                       14fd3646
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fc:db:2e:a9:94:c8:a1:39:dc:c0:93:4c:fb:56:69:71:23:cc:c7:01]
            modulus: 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
    public exponent: 10001

] 
2021-05-30 02:56:31.071  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-30 02:56:31.072 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-30 02:56:31.073 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-30 02:56:31.073 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-30 02:56:31.074  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-30 02:56:31.074  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-30 02:56:31.074  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-30 02:56:31.075  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-30 02:56:31.075  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-30 02:56:31.079  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-30 02:56:31.079  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 02:56:31.080  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 02:56:31.081  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-30 02:56:31.190  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-30 02:56:31.191  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-30 02:56:31.191 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-30 02:56:31.192 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-30 02:56:31.193  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1489
2021-05-30 02:56:31.193  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-30 02:56:31.194  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-30 02:56:31.194  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-30 02:56:31.194  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-30 02:56:31.195  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-30 02:56:31.195 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 02:56:31.195 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 02:56:31.195 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 02:56:31.196 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 02:56:31.196 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 02:56:31.196 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 02:56:31.197 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-30 02:56:31.199 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 556361099812106194759715698783736529071681187194
             IssuerDN: UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 30 01:07:07 UTC 2021
           Final Date: Fri May 30 01:07:06 UTC 2031
            SubjectDN: UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7b:8d:50:4f:36:2f:4b:cf:2d:e4:b0:b6:63:5e:cd:2f:d0:d0:11:ae]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62bef2e8886870d136c66ea3a99845bfca0bca75
                       be1b20781689128756bbc23d84a974ab0621a1db
                       82ee6aedb6dd8ad0fbe02e8e099e5ff4a42636f0
                       0ae5dd6f2bc7b4674ad7a174dfb7d172e21a59a7
                       fd1ccb24dc706cb9b476db76dc5bc898c7541b02
                       1c6b1cefd7ed0425dc121c74a33f46205dd6b3b1
                       636521fd8db4cbfaa9117dc25cb6e7e4a37db2a4
                       b79c4e1c0210d0b6bbedf064ddadb801d06817f6
                       d6d16ac671a50ce66f9f23bfeddd3033ed8a2758
                       f8bd1cbcef2a410fda2b1735d95d1cc581034783
                       fa9d1d6e61ffab58d71730aa14f5e02de9b3cb65
                       1be4dc2586f2e32ec114b032360f5718b3f62f6d
                       a63a87b93e246f929a2dcadd0552dce28dc59bdd
                       080d887293737b2b8a857ed0d022c73d2afcea45
                       82e490d4a05b5c64cfcebdb437d469c16f67deed
                       ddc88657f7fe3e10634741eb39124459d325b193
                       d9f3374e5cde4b6e5ab9230e87718b6e059de223
                       7a0cefcd27a88422a57ea7cfddf3a5a2e97ee901
                       3efd4cf476b5dd0633fcd24b25fb7162c4e3ebee
                       14fd3646
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [50:18:09:18:c1:9f:b8:2b:f0:b8:d3:c6:ee:86:89:a2:52:6a:50:bb]
            modulus: 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
    public exponent: 10001

] 
2021-05-30 02:56:33.725  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-30 02:56:33.725 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-30 02:56:33.726 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-30 02:56:33.727 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-30 02:56:33.727  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-30 02:56:33.727  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-30 02:56:33.728  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-30 02:56:33.728  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-30 02:56:33.728  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-30 02:56:33.732  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-30 02:56:33.733  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 02:56:33.733  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 02:56:33.734  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-30 02:56:33.785  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-30 02:56:33.786  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-30 02:56:33.786 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-30 02:56:33.787 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-30 02:56:33.788  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1489
2021-05-30 02:56:33.788  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-30 02:56:33.789  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-30 02:56:33.790  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-30 02:56:33.790  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-30 02:56:33.791  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-30 02:56:33.791 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 02:56:33.791 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 02:56:33.792 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 02:56:33.792 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 02:56:33.793 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 02:56:33.793 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 02:56:33.794 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-30 02:56:33.796 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 556361099812106194759715698783736529071681187194
             IssuerDN: UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 30 01:07:07 UTC 2021
           Final Date: Fri May 30 01:07:06 UTC 2031
            SubjectDN: UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7b:8d:50:4f:36:2f:4b:cf:2d:e4:b0:b6:63:5e:cd:2f:d0:d0:11:ae]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62bef2e8886870d136c66ea3a99845bfca0bca75
                       be1b20781689128756bbc23d84a974ab0621a1db
                       82ee6aedb6dd8ad0fbe02e8e099e5ff4a42636f0
                       0ae5dd6f2bc7b4674ad7a174dfb7d172e21a59a7
                       fd1ccb24dc706cb9b476db76dc5bc898c7541b02
                       1c6b1cefd7ed0425dc121c74a33f46205dd6b3b1
                       636521fd8db4cbfaa9117dc25cb6e7e4a37db2a4
                       b79c4e1c0210d0b6bbedf064ddadb801d06817f6
                       d6d16ac671a50ce66f9f23bfeddd3033ed8a2758
                       f8bd1cbcef2a410fda2b1735d95d1cc581034783
                       fa9d1d6e61ffab58d71730aa14f5e02de9b3cb65
                       1be4dc2586f2e32ec114b032360f5718b3f62f6d
                       a63a87b93e246f929a2dcadd0552dce28dc59bdd
                       080d887293737b2b8a857ed0d022c73d2afcea45
                       82e490d4a05b5c64cfcebdb437d469c16f67deed
                       ddc88657f7fe3e10634741eb39124459d325b193
                       d9f3374e5cde4b6e5ab9230e87718b6e059de223
                       7a0cefcd27a88422a57ea7cfddf3a5a2e97ee901
                       3efd4cf476b5dd0633fcd24b25fb7162c4e3ebee
                       14fd3646
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a7:d4:20:ee:13:61:40:01:cb:43:e3:13:b0:cc:23:b9:2c:df:73:95]
            modulus: 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
    public exponent: 10001

] 
2021-05-30 02:58:02.932  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-30 02:58:02.933 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-30 02:58:02.934 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-30 02:58:02.935 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-30 02:58:02.935  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-30 02:58:02.935  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-30 02:58:02.936  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-30 02:58:02.936  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-30 02:58:02.936  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-30 02:58:02.940  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-30 02:58:02.940  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 02:58:02.941  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 02:58:02.942  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-30 02:58:03.008  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-30 02:58:03.009  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-30 02:58:03.009 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-30 02:58:03.010 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-30 02:58:03.011  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1489
2021-05-30 02:58:03.012  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-30 02:58:03.013  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-30 02:58:03.014  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-30 02:58:03.014  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-30 02:58:03.014  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-30 02:58:03.015 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 02:58:03.015 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 02:58:03.015 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 02:58:03.016 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 02:58:03.016 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 02:58:03.017 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 02:58:03.018 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-30 02:58:03.021 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 556361099812106194759715698783736529071681187194
             IssuerDN: UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 30 01:07:07 UTC 2021
           Final Date: Fri May 30 01:07:06 UTC 2031
            SubjectDN: UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7b:8d:50:4f:36:2f:4b:cf:2d:e4:b0:b6:63:5e:cd:2f:d0:d0:11:ae]
            modulus: b60ca836173babb4206a4acda967501b3361cb1ab550de71c51287f2310e184db84a483da0e1a62ef6ccda2cf4db68b84ff5199b3e1a827af9b0e2a51dc080610b58ff530b4688f127562db8385a24a3520d8c8c84200825f78c247f73cfa298fc75f16a774b6a38409121b0788bc03c9d02d27da60b59632eb454f135ae4d7fea51cd5320e53d143e2386c9dc71606bfdb324754cb769f9d500c013659ca0787488e73e5de996fe50b9867081e449f564eac11d83d9d9e232e579ef4ed8aa96a60b4419810dc43f0be9d11fe9714e87395eb511be8025fc505b72ebe928d66c8c379e2f77a5ce3e6ec5c591eaeb3a2cfeee9aa8c3eec231421f7fff30cb8912307c62857c507cbdac1c3d24db523f830020d9314a133506af75c65882cb411bb6bfb8c53536fab9bc1b91be79753592a9afbef071c5bf736e1855227732a5d81833409027520bbeae01577f1f09710bb3db3920e029dcc0bfaad2bee4644fe7b2eaf5cf53e1d801139ce50f2bcf42d28d6b926ff1f810092085f54be644271b
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62bef2e8886870d136c66ea3a99845bfca0bca75
                       be1b20781689128756bbc23d84a974ab0621a1db
                       82ee6aedb6dd8ad0fbe02e8e099e5ff4a42636f0
                       0ae5dd6f2bc7b4674ad7a174dfb7d172e21a59a7
                       fd1ccb24dc706cb9b476db76dc5bc898c7541b02
                       1c6b1cefd7ed0425dc121c74a33f46205dd6b3b1
                       636521fd8db4cbfaa9117dc25cb6e7e4a37db2a4
                       b79c4e1c0210d0b6bbedf064ddadb801d06817f6
                       d6d16ac671a50ce66f9f23bfeddd3033ed8a2758
                       f8bd1cbcef2a410fda2b1735d95d1cc581034783
                       fa9d1d6e61ffab58d71730aa14f5e02de9b3cb65
                       1be4dc2586f2e32ec114b032360f5718b3f62f6d
                       a63a87b93e246f929a2dcadd0552dce28dc59bdd
                       080d887293737b2b8a857ed0d022c73d2afcea45
                       82e490d4a05b5c64cfcebdb437d469c16f67deed
                       ddc88657f7fe3e10634741eb39124459d325b193
                       d9f3374e5cde4b6e5ab9230e87718b6e059de223
                       7a0cefcd27a88422a57ea7cfddf3a5a2e97ee901
                       3efd4cf476b5dd0633fcd24b25fb7162c4e3ebee
                       14fd3646
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bc:da:9f:b6:a4:74:f1:28:50:09:7f:e5:c9:61:57:e2:51:4b:b6:09]
            modulus: 85d6532bf2f97d0879d3602d0d193f04a2313432366ad847cf289f0a502b36c0d22d732d85f0cd9d0dd4f2685bf50bc7d3bd8da6c131873924dc7cf7cf288675f92f6b8f79dc175e832a629b1dc1c74d88a9030ed74c4352727271ebc9da402033f6ef631cca5d7a6d0d7a5145bcfcfc5791b67b34bae3c9bb4b6de7e34196d172a873ce17d530ed22b3b00c0d04f7e48ea2c5cb1602798146983951431177789d92696987147ba4eff5728a1601a4a05380aad135bcc02797cac8ef45be8e07f42abe42342ed36c7c514f5380a7de06d6a70e6e99e6d66ead574bc69dcbb118deeabfcb44228e3b49eec1e714d0eeebe1a17cde801eba27e45d68a248c5dcad
    public exponent: 10001

] 
2021-05-30 02:59:05.217  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-30 02:59:05.218 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-30 02:59:05.219 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-30 02:59:05.219 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-30 02:59:05.220  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-30 02:59:05.220  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-30 02:59:05.221  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-30 02:59:05.221  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-30 02:59:05.221  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-30 02:59:05.225  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-30 02:59:05.225  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 02:59:05.226  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 02:59:05.227  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-30 02:59:05.289  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-30 02:59:05.290  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-30 02:59:05.290 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-30 02:59:05.291 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-30 02:59:05.291  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1489
2021-05-30 02:59:05.292  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-30 02:59:05.293  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-30 02:59:05.293  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-30 02:59:05.294  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-30 02:59:05.294  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-30 02:59:05.294 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 02:59:05.294 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 02:59:05.294 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 02:59:05.295 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 02:59:05.295 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 02:59:05.295 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 02:59:05.296 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-30 02:59:05.298 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 556361099812106194759715698783736529071681187194
             IssuerDN: UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 30 01:07:07 UTC 2021
           Final Date: Fri May 30 01:07:06 UTC 2031
            SubjectDN: UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7b:8d:50:4f:36:2f:4b:cf:2d:e4:b0:b6:63:5e:cd:2f:d0:d0:11:ae]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62bef2e8886870d136c66ea3a99845bfca0bca75
                       be1b20781689128756bbc23d84a974ab0621a1db
                       82ee6aedb6dd8ad0fbe02e8e099e5ff4a42636f0
                       0ae5dd6f2bc7b4674ad7a174dfb7d172e21a59a7
                       fd1ccb24dc706cb9b476db76dc5bc898c7541b02
                       1c6b1cefd7ed0425dc121c74a33f46205dd6b3b1
                       636521fd8db4cbfaa9117dc25cb6e7e4a37db2a4
                       b79c4e1c0210d0b6bbedf064ddadb801d06817f6
                       d6d16ac671a50ce66f9f23bfeddd3033ed8a2758
                       f8bd1cbcef2a410fda2b1735d95d1cc581034783
                       fa9d1d6e61ffab58d71730aa14f5e02de9b3cb65
                       1be4dc2586f2e32ec114b032360f5718b3f62f6d
                       a63a87b93e246f929a2dcadd0552dce28dc59bdd
                       080d887293737b2b8a857ed0d022c73d2afcea45
                       82e490d4a05b5c64cfcebdb437d469c16f67deed
                       ddc88657f7fe3e10634741eb39124459d325b193
                       d9f3374e5cde4b6e5ab9230e87718b6e059de223
                       7a0cefcd27a88422a57ea7cfddf3a5a2e97ee901
                       3efd4cf476b5dd0633fcd24b25fb7162c4e3ebee
                       14fd3646
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fc:6a:e5:23:49:75:e5:c3:f8:d1:96:f5:cd:dd:35:57:16:02:3c:7e]
            modulus: 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
    public exponent: 10001

] 
2021-05-30 02:59:54.489  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-30 02:59:54.490 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-30 02:59:54.491 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-30 02:59:54.491 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-30 02:59:54.492  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-30 02:59:54.492  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-30 02:59:54.492  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-30 02:59:54.492  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-30 02:59:54.493  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-30 02:59:54.496  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-30 02:59:54.497  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 02:59:54.497  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 02:59:54.498  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-30 02:59:54.570  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-30 02:59:54.571  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-30 02:59:54.571 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-30 02:59:54.572 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-30 02:59:54.572  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1489
2021-05-30 02:59:54.572  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-30 02:59:54.573  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-30 02:59:54.574  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-30 02:59:54.574  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-30 02:59:54.574  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-30 02:59:54.574 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 02:59:54.574 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 02:59:54.575 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 02:59:54.575 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 02:59:54.575 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 02:59:54.575 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 02:59:54.576 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-30 02:59:54.578 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 556361099812106194759715698783736529071681187194
             IssuerDN: UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 30 01:07:07 UTC 2021
           Final Date: Fri May 30 01:07:06 UTC 2031
            SubjectDN: UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7b:8d:50:4f:36:2f:4b:cf:2d:e4:b0:b6:63:5e:cd:2f:d0:d0:11:ae]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62bef2e8886870d136c66ea3a99845bfca0bca75
                       be1b20781689128756bbc23d84a974ab0621a1db
                       82ee6aedb6dd8ad0fbe02e8e099e5ff4a42636f0
                       0ae5dd6f2bc7b4674ad7a174dfb7d172e21a59a7
                       fd1ccb24dc706cb9b476db76dc5bc898c7541b02
                       1c6b1cefd7ed0425dc121c74a33f46205dd6b3b1
                       636521fd8db4cbfaa9117dc25cb6e7e4a37db2a4
                       b79c4e1c0210d0b6bbedf064ddadb801d06817f6
                       d6d16ac671a50ce66f9f23bfeddd3033ed8a2758
                       f8bd1cbcef2a410fda2b1735d95d1cc581034783
                       fa9d1d6e61ffab58d71730aa14f5e02de9b3cb65
                       1be4dc2586f2e32ec114b032360f5718b3f62f6d
                       a63a87b93e246f929a2dcadd0552dce28dc59bdd
                       080d887293737b2b8a857ed0d022c73d2afcea45
                       82e490d4a05b5c64cfcebdb437d469c16f67deed
                       ddc88657f7fe3e10634741eb39124459d325b193
                       d9f3374e5cde4b6e5ab9230e87718b6e059de223
                       7a0cefcd27a88422a57ea7cfddf3a5a2e97ee901
                       3efd4cf476b5dd0633fcd24b25fb7162c4e3ebee
                       14fd3646
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [40:6c:06:65:eb:88:5e:7a:a4:53:c5:61:a0:1f:75:c1:fa:64:82:a1]
            modulus: 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
    public exponent: 10001

] 
2021-05-30 03:00:52.749  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-30 03:00:52.749 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-30 03:00:52.750 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-30 03:00:52.751 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-30 03:00:52.751  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-30 03:00:52.751  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-30 03:00:52.751  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-30 03:00:52.752  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-30 03:00:52.752  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-30 03:00:52.756  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-30 03:00:52.756  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 03:00:52.756  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 03:00:52.757  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-30 03:00:52.856  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-30 03:00:52.856  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-30 03:00:52.856 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-30 03:00:52.857 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-30 03:00:52.858  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1489
2021-05-30 03:00:52.858  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-30 03:00:52.859  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-30 03:00:52.859  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-30 03:00:52.859  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-30 03:00:52.859  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-30 03:00:52.860 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 03:00:52.860 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 03:00:52.860 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 03:00:52.860 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 03:00:52.861 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 03:00:52.861 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 03:00:52.861 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-30 03:00:52.863 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 556361099812106194759715698783736529071681187194
             IssuerDN: UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 30 01:07:07 UTC 2021
           Final Date: Fri May 30 01:07:06 UTC 2031
            SubjectDN: UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7b:8d:50:4f:36:2f:4b:cf:2d:e4:b0:b6:63:5e:cd:2f:d0:d0:11:ae]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62bef2e8886870d136c66ea3a99845bfca0bca75
                       be1b20781689128756bbc23d84a974ab0621a1db
                       82ee6aedb6dd8ad0fbe02e8e099e5ff4a42636f0
                       0ae5dd6f2bc7b4674ad7a174dfb7d172e21a59a7
                       fd1ccb24dc706cb9b476db76dc5bc898c7541b02
                       1c6b1cefd7ed0425dc121c74a33f46205dd6b3b1
                       636521fd8db4cbfaa9117dc25cb6e7e4a37db2a4
                       b79c4e1c0210d0b6bbedf064ddadb801d06817f6
                       d6d16ac671a50ce66f9f23bfeddd3033ed8a2758
                       f8bd1cbcef2a410fda2b1735d95d1cc581034783
                       fa9d1d6e61ffab58d71730aa14f5e02de9b3cb65
                       1be4dc2586f2e32ec114b032360f5718b3f62f6d
                       a63a87b93e246f929a2dcadd0552dce28dc59bdd
                       080d887293737b2b8a857ed0d022c73d2afcea45
                       82e490d4a05b5c64cfcebdb437d469c16f67deed
                       ddc88657f7fe3e10634741eb39124459d325b193
                       d9f3374e5cde4b6e5ab9230e87718b6e059de223
                       7a0cefcd27a88422a57ea7cfddf3a5a2e97ee901
                       3efd4cf476b5dd0633fcd24b25fb7162c4e3ebee
                       14fd3646
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6f:04:4a:31:7e:5c:1d:15:47:0a:72:08:58:a1:40:27:32:15:d7:6e]
            modulus: 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
    public exponent: 10001

] 
2021-05-30 03:02:52.906  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-30 03:02:52.907 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-30 03:02:52.908 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-30 03:02:52.909 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-30 03:02:52.909  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-30 03:02:52.909  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-30 03:02:52.909  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-30 03:02:52.910  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-30 03:02:52.910  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-30 03:02:52.914  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-30 03:02:52.914  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 03:02:52.914  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 03:02:52.915  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-30 03:02:53.001  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-30 03:02:53.002  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-30 03:02:53.002 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-30 03:02:53.003 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-30 03:02:53.003  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1489
2021-05-30 03:02:53.003  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-30 03:02:53.004  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-30 03:02:53.005  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-30 03:02:53.005  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-30 03:02:53.005  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-30 03:02:53.006 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 03:02:53.006 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 03:02:53.006 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 03:02:53.007 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 03:02:53.007 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 03:02:53.007 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 03:02:53.008 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-30 03:02:53.010 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 556361099812106194759715698783736529071681187194
             IssuerDN: UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 30 01:07:07 UTC 2021
           Final Date: Fri May 30 01:07:06 UTC 2031
            SubjectDN: UID=c-0ev9dt7b7sjpzjls2,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7b:8d:50:4f:36:2f:4b:cf:2d:e4:b0:b6:63:5e:cd:2f:d0:d0:11:ae]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62bef2e8886870d136c66ea3a99845bfca0bca75
                       be1b20781689128756bbc23d84a974ab0621a1db
                       82ee6aedb6dd8ad0fbe02e8e099e5ff4a42636f0
                       0ae5dd6f2bc7b4674ad7a174dfb7d172e21a59a7
                       fd1ccb24dc706cb9b476db76dc5bc898c7541b02
                       1c6b1cefd7ed0425dc121c74a33f46205dd6b3b1
                       636521fd8db4cbfaa9117dc25cb6e7e4a37db2a4
                       b79c4e1c0210d0b6bbedf064ddadb801d06817f6
                       d6d16ac671a50ce66f9f23bfeddd3033ed8a2758
                       f8bd1cbcef2a410fda2b1735d95d1cc581034783
                       fa9d1d6e61ffab58d71730aa14f5e02de9b3cb65
                       1be4dc2586f2e32ec114b032360f5718b3f62f6d
                       a63a87b93e246f929a2dcadd0552dce28dc59bdd
                       080d887293737b2b8a857ed0d022c73d2afcea45
                       82e490d4a05b5c64cfcebdb437d469c16f67deed
                       ddc88657f7fe3e10634741eb39124459d325b193
                       d9f3374e5cde4b6e5ab9230e87718b6e059de223
                       7a0cefcd27a88422a57ea7cfddf3a5a2e97ee901
                       3efd4cf476b5dd0633fcd24b25fb7162c4e3ebee
                       14fd3646
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2c:10:ab:f5:cb:61:4d:ba:77:fb:03:76:d2:d2:a5:8f:07:3c:aa:da]
            modulus: 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
    public exponent: 10001

]