Results

By type

          2021-06-04 01:31:11,789 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-06-04 01:31:15,303 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-06-04 01:31:18.090  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-06-04 01:31:29.012 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-06-04 01:31:30.009  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-06-04 01:31:30.706  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-06-04 01:31:42.503  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 32.994 seconds (JVM running for 39.126)
2021-06-04 02:01:40.798  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-04 02:01:40.898 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-04 02:01:40.989 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-06-04 02:01:40.992 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-04 02:01:41.003  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-06-04 02:01:41.005  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-04 02:01:41.009  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-04 02:01:41.084  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-04 02:01:41.085  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-04 02:01:41.092  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-04 02:01:41.095  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-04 02:01:41.204  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-04 02:01:41.288  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-04 02:01:41.289  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-04 02:01:41.303  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-04 02:01:42.418  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-04 02:01:42.486  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-04 02:01:42.488 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-04 02:01:42.497 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-04 02:01:42.499  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1425
2021-06-04 02:01:42.500  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-04 02:01:42.585  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-04 02:01:42.587  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-04 02:01:42.594  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-04 02:01:42.595  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-04 02:01:42.596 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-04 02:01:42.596 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-04 02:01:42.597 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-04 02:01:42.695 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-04 02:01:42.696 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-04 02:01:42.696 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-04 02:01:42.702 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-04 02:01:42.900 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 545276590144279136683463567031071793545617090944
             IssuerDN: UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 04 01:27:07 UTC 2021
           Final Date: Wed Jun 04 01:27:06 UTC 2031
            SubjectDN: UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [80:02:8b:02:42:8d:35:1e:68:75:58:69:4d:70:b5:01:5a:99:c1:cb]
            modulus: a51b7b9fcca161c2c009034861be5a083d77766a6db6427f08203b089af6940c97c968c4fdf1180479fc825256f044dd697e1d7e3b725b740dac752e87bcc1da06a1187de3c5fd17bfacd4f4447a18c04849abde64963e4725ff080703e727804a51ae12bbfa8f9d338302f652f247536ffa756333d474add36c424c1a94dfc84ce2aaa290cc65102177f786d5f415da90934b93638b2bc58c518a8e27bad911369ade164fce4c2d4132ca026dd6424834c308783b7ffa90cca15688d4df65907e3077520ef74def9af55da2c90f044aaee15ea9e806420d4948fe86c3f3fa2a75216c5bb3dec16fc779176ab63a4319595c9e396231d80e000d1764a821f7fdd72e1ec9aab2a72fdc7646e52cae6ef36756b67b7948e144c6f60a4a18cb14ff3a1d0550d77e2995804d31cee6708c7f959d9a20b97c164b723c038fc4442245b3a13981d6560733659c8cd4aec653befb9640d6a30ceec63c7d4973056c0d1d71edb1ce10f8f7c69e5eb50bf8cab38e5d7f67cf689289450574fb6c624c4d9f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3812f7325a3cf682c47ede9344279f28a10cf329
                       5fcae8bc17018635c4c29804fe61478593b74179
                       285cfb118e6b37d43f50b840d2cff60fef244704
                       f00f680b48d324b4ae0a4901d106861181366642
                       cad7e368e970dc843a1b3989ff07753106e93f7e
                       006681511071f83d5e3e6601183a38ecd0d6cebd
                       955944cec12997e5b2dfb56bd4e3a72e248f1569
                       b70bdf86b91f0c3b9f8f7b23f7cd6d00bb666557
                       471cfb61c5a3866a5c028841a2f416fd7b236f3b
                       412d7adfe221ea0c937ef664691c0687a80056b7
                       64b8455fa62926776687c55bd4a33c6990d3a379
                       b7aef8cb7d38131c09b2fe71349b273022c3762a
                       72812800fffd9cf8d1b2c6f87bfb5ef37549cc87
                       0ad5ae91473d9c078674d655df7e6aff66eabef1
                       8a1aa26a5e106eece9e4b324869a2b8f0f9f290d
                       877265fa6986126c74cb41b82e53c211e17a6145
                       5a68e6660ff10202d6eb26445b19a01ce82f8dfd
                       2f3f6c2c407d57741f5137b75684f9df66de178c
                       2a978a96c3b17567d1beea7cc4ee43db0bfbe56e
                       4bb94732
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a2:13:7a:ff:91:45:86:90:7d:74:88:12:9d:d1:90:4b:0a:5f:e3:5e]
            modulus: d08c0f9357f2680b2d98da31544d7b22347c74deca509ab5135cecca7dcf4b61a33647d794c0d938c3cbf93a74b26283d0bc54b9fcf07d08fd869ee6c6d77d4eeec105ca2a7c7275ad1e33e0f6fb7899317043e10ecb9630f7174dd65feb18d4481210dcf76d0cce268b6e965d844f246899011b93476c483f111b9856512a325e7d0ea8799921c602fc588d2fe7898ff3c4a217b8ab61338b53565359050edb352409d0f3e9f634fec8a49efd016c98392050688b8125277f4f4d2ba0c8692f7a0ef3009110a23d74e614186dcb9810a73f52ab1d54e2576ce25ae0e2e645eacfd73060b187ae2d88213e42625e9984c6335361a8c7443ca5b7ff13c268ce01
    public exponent: 10001

] 
2021-06-04 03:19:14.742  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-04 03:19:14.743 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-04 03:19:14.744 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-04 03:19:14.746 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-04 03:19:14.747  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-04 03:19:14.748  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-04 03:19:14.748  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-04 03:19:14.749  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-04 03:19:14.749  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-04 03:19:14.759  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-04 03:19:14.760  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-04 03:19:14.761  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-04 03:19:14.784  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-04 03:19:14.866  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-04 03:19:14.867  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-04 03:19:14.867 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-04 03:19:14.888 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-04 03:19:14.889  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1425
2021-06-04 03:19:14.890  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-04 03:19:14.895  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-04 03:19:14.895  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-04 03:19:14.896  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-04 03:19:14.897  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-04 03:19:14.897 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-04 03:19:14.898 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-04 03:19:14.898 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-04 03:19:14.900 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-04 03:19:14.900 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-04 03:19:14.900 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-04 03:19:14.901 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-04 03:19:14.990 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 545276590144279136683463567031071793545617090944
             IssuerDN: UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 04 01:27:07 UTC 2021
           Final Date: Wed Jun 04 01:27:06 UTC 2031
            SubjectDN: UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [80:02:8b:02:42:8d:35:1e:68:75:58:69:4d:70:b5:01:5a:99:c1:cb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3812f7325a3cf682c47ede9344279f28a10cf329
                       5fcae8bc17018635c4c29804fe61478593b74179
                       285cfb118e6b37d43f50b840d2cff60fef244704
                       f00f680b48d324b4ae0a4901d106861181366642
                       cad7e368e970dc843a1b3989ff07753106e93f7e
                       006681511071f83d5e3e6601183a38ecd0d6cebd
                       955944cec12997e5b2dfb56bd4e3a72e248f1569
                       b70bdf86b91f0c3b9f8f7b23f7cd6d00bb666557
                       471cfb61c5a3866a5c028841a2f416fd7b236f3b
                       412d7adfe221ea0c937ef664691c0687a80056b7
                       64b8455fa62926776687c55bd4a33c6990d3a379
                       b7aef8cb7d38131c09b2fe71349b273022c3762a
                       72812800fffd9cf8d1b2c6f87bfb5ef37549cc87
                       0ad5ae91473d9c078674d655df7e6aff66eabef1
                       8a1aa26a5e106eece9e4b324869a2b8f0f9f290d
                       877265fa6986126c74cb41b82e53c211e17a6145
                       5a68e6660ff10202d6eb26445b19a01ce82f8dfd
                       2f3f6c2c407d57741f5137b75684f9df66de178c
                       2a978a96c3b17567d1beea7cc4ee43db0bfbe56e
                       4bb94732
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5f:0b:d5:62:0b:42:37:e0:fc:cb:58:f2:e5:20:ec:35:35:f1:7f:c8]
            modulus: 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
    public exponent: 10001

] 
2021-06-04 03:19:51.623  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-04 03:19:51.625 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-04 03:19:51.626 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-06-04 03:19:51.627 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-04 03:19:51.628  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-06-04 03:19:51.629  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-04 03:19:51.629  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-04 03:19:51.629  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-04 03:19:51.630  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-04 03:19:51.637  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-04 03:19:51.685  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-04 03:19:51.686  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-04 03:19:51.689  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-04 03:19:51.775  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-04 03:19:51.775  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-04 03:19:51.776 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-04 03:19:51.787 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-04 03:19:51.788  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1425
2021-06-04 03:19:51.788  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-04 03:19:51.792  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-04 03:19:51.793  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-04 03:19:51.793  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-04 03:19:51.794  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-04 03:19:51.794 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-04 03:19:51.794 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-04 03:19:51.795 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-04 03:19:51.795 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-04 03:19:51.795 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-04 03:19:51.796 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-04 03:19:51.798 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-04 03:19:51.801 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 545276590144279136683463567031071793545617090944
             IssuerDN: UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 04 01:27:07 UTC 2021
           Final Date: Wed Jun 04 01:27:06 UTC 2031
            SubjectDN: UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [80:02:8b:02:42:8d:35:1e:68:75:58:69:4d:70:b5:01:5a:99:c1:cb]
            modulus: a51b7b9fcca161c2c009034861be5a083d77766a6db6427f08203b089af6940c97c968c4fdf1180479fc825256f044dd697e1d7e3b725b740dac752e87bcc1da06a1187de3c5fd17bfacd4f4447a18c04849abde64963e4725ff080703e727804a51ae12bbfa8f9d338302f652f247536ffa756333d474add36c424c1a94dfc84ce2aaa290cc65102177f786d5f415da90934b93638b2bc58c518a8e27bad911369ade164fce4c2d4132ca026dd6424834c308783b7ffa90cca15688d4df65907e3077520ef74def9af55da2c90f044aaee15ea9e806420d4948fe86c3f3fa2a75216c5bb3dec16fc779176ab63a4319595c9e396231d80e000d1764a821f7fdd72e1ec9aab2a72fdc7646e52cae6ef36756b67b7948e144c6f60a4a18cb14ff3a1d0550d77e2995804d31cee6708c7f959d9a20b97c164b723c038fc4442245b3a13981d6560733659c8cd4aec653befb9640d6a30ceec63c7d4973056c0d1d71edb1ce10f8f7c69e5eb50bf8cab38e5d7f67cf689289450574fb6c624c4d9f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3812f7325a3cf682c47ede9344279f28a10cf329
                       5fcae8bc17018635c4c29804fe61478593b74179
                       285cfb118e6b37d43f50b840d2cff60fef244704
                       f00f680b48d324b4ae0a4901d106861181366642
                       cad7e368e970dc843a1b3989ff07753106e93f7e
                       006681511071f83d5e3e6601183a38ecd0d6cebd
                       955944cec12997e5b2dfb56bd4e3a72e248f1569
                       b70bdf86b91f0c3b9f8f7b23f7cd6d00bb666557
                       471cfb61c5a3866a5c028841a2f416fd7b236f3b
                       412d7adfe221ea0c937ef664691c0687a80056b7
                       64b8455fa62926776687c55bd4a33c6990d3a379
                       b7aef8cb7d38131c09b2fe71349b273022c3762a
                       72812800fffd9cf8d1b2c6f87bfb5ef37549cc87
                       0ad5ae91473d9c078674d655df7e6aff66eabef1
                       8a1aa26a5e106eece9e4b324869a2b8f0f9f290d
                       877265fa6986126c74cb41b82e53c211e17a6145
                       5a68e6660ff10202d6eb26445b19a01ce82f8dfd
                       2f3f6c2c407d57741f5137b75684f9df66de178c
                       2a978a96c3b17567d1beea7cc4ee43db0bfbe56e
                       4bb94732
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a9:51:af:40:bc:78:68:ef:27:52:df:28:70:33:57:85:1d:2c:34:a5]
            modulus: ac8dd6b44cd8d9d9b336da20dd7daa204db17b20176757475b82d258cf6c37b2a92c73f342e4771fad436bcfd1b3d0b9132fbf47b71bcc96682c9b7cdab23f62e285b52d64f39808a88801c280709c5cd1af0e9f8319c6a9e96122ad6fa70c868f126686dd9cb9fd3638b4860ae213eda8b777d520f0d6da4bf63407c392d0898fc9225e259cc90021040dc5adad7ee7c1dbd782fe20f90a3c16c89713833950d875d42d1260506b4484bb51e01d05ce110172947c32b20161d4a815b1a991dc3b45e89efb547a211bea30d416ca53847f053cec16fc327b142cafe2bb62757fb071e219c286a484b102a89c30f70a503678ddb3df19157a3601dfaa1e67af15
    public exponent: 10001

] 
2021-06-04 03:23:01.116  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-04 03:23:01.118 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-04 03:23:01.119 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-04 03:23:01.120 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-04 03:23:01.121  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-04 03:23:01.121  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-04 03:23:01.122  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-04 03:23:01.122  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-04 03:23:01.123  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-04 03:23:01.128  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-04 03:23:01.129  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-04 03:23:01.129  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-04 03:23:01.132  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-04 03:23:01.212  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-04 03:23:01.213  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-04 03:23:01.213 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-04 03:23:01.215 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-04 03:23:01.216  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1425
2021-06-04 03:23:01.217  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-04 03:23:01.218  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-04 03:23:01.219  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-04 03:23:01.219  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-04 03:23:01.220  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-04 03:23:01.220 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-04 03:23:01.221 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-04 03:23:01.221 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-04 03:23:01.221 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-04 03:23:01.222 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-04 03:23:01.222 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-04 03:23:01.223 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-04 03:23:01.288 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 545276590144279136683463567031071793545617090944
             IssuerDN: UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 04 01:27:07 UTC 2021
           Final Date: Wed Jun 04 01:27:06 UTC 2031
            SubjectDN: UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [80:02:8b:02:42:8d:35:1e:68:75:58:69:4d:70:b5:01:5a:99:c1:cb]
            modulus: a51b7b9fcca161c2c009034861be5a083d77766a6db6427f08203b089af6940c97c968c4fdf1180479fc825256f044dd697e1d7e3b725b740dac752e87bcc1da06a1187de3c5fd17bfacd4f4447a18c04849abde64963e4725ff080703e727804a51ae12bbfa8f9d338302f652f247536ffa756333d474add36c424c1a94dfc84ce2aaa290cc65102177f786d5f415da90934b93638b2bc58c518a8e27bad911369ade164fce4c2d4132ca026dd6424834c308783b7ffa90cca15688d4df65907e3077520ef74def9af55da2c90f044aaee15ea9e806420d4948fe86c3f3fa2a75216c5bb3dec16fc779176ab63a4319595c9e396231d80e000d1764a821f7fdd72e1ec9aab2a72fdc7646e52cae6ef36756b67b7948e144c6f60a4a18cb14ff3a1d0550d77e2995804d31cee6708c7f959d9a20b97c164b723c038fc4442245b3a13981d6560733659c8cd4aec653befb9640d6a30ceec63c7d4973056c0d1d71edb1ce10f8f7c69e5eb50bf8cab38e5d7f67cf689289450574fb6c624c4d9f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3812f7325a3cf682c47ede9344279f28a10cf329
                       5fcae8bc17018635c4c29804fe61478593b74179
                       285cfb118e6b37d43f50b840d2cff60fef244704
                       f00f680b48d324b4ae0a4901d106861181366642
                       cad7e368e970dc843a1b3989ff07753106e93f7e
                       006681511071f83d5e3e6601183a38ecd0d6cebd
                       955944cec12997e5b2dfb56bd4e3a72e248f1569
                       b70bdf86b91f0c3b9f8f7b23f7cd6d00bb666557
                       471cfb61c5a3866a5c028841a2f416fd7b236f3b
                       412d7adfe221ea0c937ef664691c0687a80056b7
                       64b8455fa62926776687c55bd4a33c6990d3a379
                       b7aef8cb7d38131c09b2fe71349b273022c3762a
                       72812800fffd9cf8d1b2c6f87bfb5ef37549cc87
                       0ad5ae91473d9c078674d655df7e6aff66eabef1
                       8a1aa26a5e106eece9e4b324869a2b8f0f9f290d
                       877265fa6986126c74cb41b82e53c211e17a6145
                       5a68e6660ff10202d6eb26445b19a01ce82f8dfd
                       2f3f6c2c407d57741f5137b75684f9df66de178c
                       2a978a96c3b17567d1beea7cc4ee43db0bfbe56e
                       4bb94732
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bd:87:98:55:0e:73:85:34:8e:97:15:fa:a4:df:f6:24:2f:41:35:4d]
            modulus: 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
    public exponent: 10001

] 
2021-06-04 03:24:18.508  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-04 03:24:18.510 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-04 03:24:18.511 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-04 03:24:18.511 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-04 03:24:18.512  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-04 03:24:18.512  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-04 03:24:18.513  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-04 03:24:18.513  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-04 03:24:18.513  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-04 03:24:18.518  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-04 03:24:18.518  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-04 03:24:18.519  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-04 03:24:18.520  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-04 03:24:18.654  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-04 03:24:18.655  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-04 03:24:18.656 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-04 03:24:18.687 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-04 03:24:18.688  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1425
2021-06-04 03:24:18.688  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-04 03:24:18.690  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-04 03:24:18.690  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-04 03:24:18.691  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-04 03:24:18.691  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-04 03:24:18.692 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-04 03:24:18.692 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-04 03:24:18.692 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-04 03:24:18.693 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-04 03:24:18.693 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-04 03:24:18.693 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-04 03:24:18.695 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-04 03:24:18.698 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 545276590144279136683463567031071793545617090944
             IssuerDN: UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 04 01:27:07 UTC 2021
           Final Date: Wed Jun 04 01:27:06 UTC 2031
            SubjectDN: UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [80:02:8b:02:42:8d:35:1e:68:75:58:69:4d:70:b5:01:5a:99:c1:cb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3812f7325a3cf682c47ede9344279f28a10cf329
                       5fcae8bc17018635c4c29804fe61478593b74179
                       285cfb118e6b37d43f50b840d2cff60fef244704
                       f00f680b48d324b4ae0a4901d106861181366642
                       cad7e368e970dc843a1b3989ff07753106e93f7e
                       006681511071f83d5e3e6601183a38ecd0d6cebd
                       955944cec12997e5b2dfb56bd4e3a72e248f1569
                       b70bdf86b91f0c3b9f8f7b23f7cd6d00bb666557
                       471cfb61c5a3866a5c028841a2f416fd7b236f3b
                       412d7adfe221ea0c937ef664691c0687a80056b7
                       64b8455fa62926776687c55bd4a33c6990d3a379
                       b7aef8cb7d38131c09b2fe71349b273022c3762a
                       72812800fffd9cf8d1b2c6f87bfb5ef37549cc87
                       0ad5ae91473d9c078674d655df7e6aff66eabef1
                       8a1aa26a5e106eece9e4b324869a2b8f0f9f290d
                       877265fa6986126c74cb41b82e53c211e17a6145
                       5a68e6660ff10202d6eb26445b19a01ce82f8dfd
                       2f3f6c2c407d57741f5137b75684f9df66de178c
                       2a978a96c3b17567d1beea7cc4ee43db0bfbe56e
                       4bb94732
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6b:b6:82:33:23:58:80:9a:48:a8:4a:c6:56:8f:a7:26:8d:7b:08:36]
            modulus: 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
    public exponent: 10001

] 
2021-06-04 03:24:53.271  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-04 03:24:53.272 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-04 03:24:53.274 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-06-04 03:24:53.274 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-04 03:24:53.275  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-06-04 03:24:53.275  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-04 03:24:53.276  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-04 03:24:53.276  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-04 03:24:53.276  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-04 03:24:53.280  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-04 03:24:53.280  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-04 03:24:53.280  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-04 03:24:53.281  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-04 03:24:53.385  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-04 03:24:53.386  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-04 03:24:53.386 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-04 03:24:53.388 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-04 03:24:53.389  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1425
2021-06-04 03:24:53.390  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-04 03:24:53.392  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-04 03:24:53.393  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-04 03:24:53.393  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-04 03:24:53.393  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-04 03:24:53.394 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-04 03:24:53.394 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-04 03:24:53.394 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-04 03:24:53.395 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-04 03:24:53.395 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-04 03:24:53.395 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-04 03:24:53.396 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-04 03:24:53.398 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 545276590144279136683463567031071793545617090944
             IssuerDN: UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 04 01:27:07 UTC 2021
           Final Date: Wed Jun 04 01:27:06 UTC 2031
            SubjectDN: UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [80:02:8b:02:42:8d:35:1e:68:75:58:69:4d:70:b5:01:5a:99:c1:cb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3812f7325a3cf682c47ede9344279f28a10cf329
                       5fcae8bc17018635c4c29804fe61478593b74179
                       285cfb118e6b37d43f50b840d2cff60fef244704
                       f00f680b48d324b4ae0a4901d106861181366642
                       cad7e368e970dc843a1b3989ff07753106e93f7e
                       006681511071f83d5e3e6601183a38ecd0d6cebd
                       955944cec12997e5b2dfb56bd4e3a72e248f1569
                       b70bdf86b91f0c3b9f8f7b23f7cd6d00bb666557
                       471cfb61c5a3866a5c028841a2f416fd7b236f3b
                       412d7adfe221ea0c937ef664691c0687a80056b7
                       64b8455fa62926776687c55bd4a33c6990d3a379
                       b7aef8cb7d38131c09b2fe71349b273022c3762a
                       72812800fffd9cf8d1b2c6f87bfb5ef37549cc87
                       0ad5ae91473d9c078674d655df7e6aff66eabef1
                       8a1aa26a5e106eece9e4b324869a2b8f0f9f290d
                       877265fa6986126c74cb41b82e53c211e17a6145
                       5a68e6660ff10202d6eb26445b19a01ce82f8dfd
                       2f3f6c2c407d57741f5137b75684f9df66de178c
                       2a978a96c3b17567d1beea7cc4ee43db0bfbe56e
                       4bb94732
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [48:f2:97:1f:69:cb:92:15:29:7c:55:e2:3a:3d:19:17:fe:3e:77:a4]
            modulus: 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
    public exponent: 10001

] 
2021-06-04 03:25:03.158  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-04 03:25:03.159 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-04 03:25:03.160 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-06-04 03:25:03.160 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-04 03:25:03.160  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-06-04 03:25:03.161  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-04 03:25:03.161  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-04 03:25:03.161  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-04 03:25:03.162  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-04 03:25:03.165  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-04 03:25:03.166  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-04 03:25:03.166  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-04 03:25:03.167  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-04 03:25:03.220  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-04 03:25:03.221  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-04 03:25:03.221 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-04 03:25:03.222 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-04 03:25:03.223  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1425
2021-06-04 03:25:03.223  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-04 03:25:03.224  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-04 03:25:03.224  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-04 03:25:03.225  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-04 03:25:03.225  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-04 03:25:03.225 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-04 03:25:03.225 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-04 03:25:03.226 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-04 03:25:03.226 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-04 03:25:03.227 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-04 03:25:03.227 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-04 03:25:03.227 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-04 03:25:03.229 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 545276590144279136683463567031071793545617090944
             IssuerDN: UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 04 01:27:07 UTC 2021
           Final Date: Wed Jun 04 01:27:06 UTC 2031
            SubjectDN: UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [80:02:8b:02:42:8d:35:1e:68:75:58:69:4d:70:b5:01:5a:99:c1:cb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3812f7325a3cf682c47ede9344279f28a10cf329
                       5fcae8bc17018635c4c29804fe61478593b74179
                       285cfb118e6b37d43f50b840d2cff60fef244704
                       f00f680b48d324b4ae0a4901d106861181366642
                       cad7e368e970dc843a1b3989ff07753106e93f7e
                       006681511071f83d5e3e6601183a38ecd0d6cebd
                       955944cec12997e5b2dfb56bd4e3a72e248f1569
                       b70bdf86b91f0c3b9f8f7b23f7cd6d00bb666557
                       471cfb61c5a3866a5c028841a2f416fd7b236f3b
                       412d7adfe221ea0c937ef664691c0687a80056b7
                       64b8455fa62926776687c55bd4a33c6990d3a379
                       b7aef8cb7d38131c09b2fe71349b273022c3762a
                       72812800fffd9cf8d1b2c6f87bfb5ef37549cc87
                       0ad5ae91473d9c078674d655df7e6aff66eabef1
                       8a1aa26a5e106eece9e4b324869a2b8f0f9f290d
                       877265fa6986126c74cb41b82e53c211e17a6145
                       5a68e6660ff10202d6eb26445b19a01ce82f8dfd
                       2f3f6c2c407d57741f5137b75684f9df66de178c
                       2a978a96c3b17567d1beea7cc4ee43db0bfbe56e
                       4bb94732
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d9:77:07:7e:1c:2b:82:94:12:55:15:22:6b:fa:4a:d2:91:0c:07:58]
            modulus: 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
    public exponent: 10001

] 
2021-06-04 03:25:39.407  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-04 03:25:39.408 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-04 03:25:39.409 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-06-04 03:25:39.410 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-04 03:25:39.411  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-06-04 03:25:39.411  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-04 03:25:39.412  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-04 03:25:39.412  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-04 03:25:39.412  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-04 03:25:39.417  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-04 03:25:39.418  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-04 03:25:39.418  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-04 03:25:39.419  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-04 03:25:39.486  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-04 03:25:39.487  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-04 03:25:39.487 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-04 03:25:39.489 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-04 03:25:39.490  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1425
2021-06-04 03:25:39.490  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-04 03:25:39.493  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-04 03:25:39.493  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-04 03:25:39.494  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-04 03:25:39.494  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-04 03:25:39.494 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-04 03:25:39.494 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-04 03:25:39.495 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-04 03:25:39.495 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-04 03:25:39.495 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-04 03:25:39.495 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-04 03:25:39.496 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-04 03:25:39.498 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 545276590144279136683463567031071793545617090944
             IssuerDN: UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 04 01:27:07 UTC 2021
           Final Date: Wed Jun 04 01:27:06 UTC 2031
            SubjectDN: UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [80:02:8b:02:42:8d:35:1e:68:75:58:69:4d:70:b5:01:5a:99:c1:cb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3812f7325a3cf682c47ede9344279f28a10cf329
                       5fcae8bc17018635c4c29804fe61478593b74179
                       285cfb118e6b37d43f50b840d2cff60fef244704
                       f00f680b48d324b4ae0a4901d106861181366642
                       cad7e368e970dc843a1b3989ff07753106e93f7e
                       006681511071f83d5e3e6601183a38ecd0d6cebd
                       955944cec12997e5b2dfb56bd4e3a72e248f1569
                       b70bdf86b91f0c3b9f8f7b23f7cd6d00bb666557
                       471cfb61c5a3866a5c028841a2f416fd7b236f3b
                       412d7adfe221ea0c937ef664691c0687a80056b7
                       64b8455fa62926776687c55bd4a33c6990d3a379
                       b7aef8cb7d38131c09b2fe71349b273022c3762a
                       72812800fffd9cf8d1b2c6f87bfb5ef37549cc87
                       0ad5ae91473d9c078674d655df7e6aff66eabef1
                       8a1aa26a5e106eece9e4b324869a2b8f0f9f290d
                       877265fa6986126c74cb41b82e53c211e17a6145
                       5a68e6660ff10202d6eb26445b19a01ce82f8dfd
                       2f3f6c2c407d57741f5137b75684f9df66de178c
                       2a978a96c3b17567d1beea7cc4ee43db0bfbe56e
                       4bb94732
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ea:48:8e:f9:3f:25:d7:68:d6:c7:38:04:c9:e9:89:f7:6d:91:79:50]
            modulus: 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
    public exponent: 10001

] 
2021-06-04 03:27:34.060  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-04 03:27:34.061 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-04 03:27:34.061 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-06-04 03:27:34.062 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-04 03:27:34.062  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-06-04 03:27:34.062  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-04 03:27:34.062  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-04 03:27:34.062  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-04 03:27:34.063  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-04 03:27:34.066  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-04 03:27:34.066  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-04 03:27:34.066  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-04 03:27:34.067  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-04 03:27:34.147  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-04 03:27:34.148  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-04 03:27:34.148 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-04 03:27:34.149 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-04 03:27:34.149  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1425
2021-06-04 03:27:34.149  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-04 03:27:34.150  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-04 03:27:34.150  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-04 03:27:34.151  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-04 03:27:34.151  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-04 03:27:34.151 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-04 03:27:34.151 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-04 03:27:34.151 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-04 03:27:34.152 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-04 03:27:34.152 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-04 03:27:34.152 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-04 03:27:34.153 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-04 03:27:34.154 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 545276590144279136683463567031071793545617090944
             IssuerDN: UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 04 01:27:07 UTC 2021
           Final Date: Wed Jun 04 01:27:06 UTC 2031
            SubjectDN: UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [80:02:8b:02:42:8d:35:1e:68:75:58:69:4d:70:b5:01:5a:99:c1:cb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3812f7325a3cf682c47ede9344279f28a10cf329
                       5fcae8bc17018635c4c29804fe61478593b74179
                       285cfb118e6b37d43f50b840d2cff60fef244704
                       f00f680b48d324b4ae0a4901d106861181366642
                       cad7e368e970dc843a1b3989ff07753106e93f7e
                       006681511071f83d5e3e6601183a38ecd0d6cebd
                       955944cec12997e5b2dfb56bd4e3a72e248f1569
                       b70bdf86b91f0c3b9f8f7b23f7cd6d00bb666557
                       471cfb61c5a3866a5c028841a2f416fd7b236f3b
                       412d7adfe221ea0c937ef664691c0687a80056b7
                       64b8455fa62926776687c55bd4a33c6990d3a379
                       b7aef8cb7d38131c09b2fe71349b273022c3762a
                       72812800fffd9cf8d1b2c6f87bfb5ef37549cc87
                       0ad5ae91473d9c078674d655df7e6aff66eabef1
                       8a1aa26a5e106eece9e4b324869a2b8f0f9f290d
                       877265fa6986126c74cb41b82e53c211e17a6145
                       5a68e6660ff10202d6eb26445b19a01ce82f8dfd
                       2f3f6c2c407d57741f5137b75684f9df66de178c
                       2a978a96c3b17567d1beea7cc4ee43db0bfbe56e
                       4bb94732
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c1:98:09:9b:2e:ea:46:26:11:68:73:e1:f7:e4:8f:03:fa:e2:b8:78]
            modulus: 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
    public exponent: 10001

] 
2021-06-04 03:30:23.526  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-04 03:30:23.527 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-04 03:30:23.529 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-04 03:30:23.530 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-04 03:30:23.530  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-04 03:30:23.530  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-04 03:30:23.531  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-04 03:30:23.531  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-04 03:30:23.532  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-04 03:30:23.537  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-04 03:30:23.537  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-04 03:30:23.537  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-04 03:30:23.538  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-04 03:30:23.639  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-04 03:30:23.639  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-04 03:30:23.640 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-04 03:30:23.643 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-04 03:30:23.644  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1425
2021-06-04 03:30:23.644  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-04 03:30:23.646  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-04 03:30:23.646  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-04 03:30:23.646  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-04 03:30:23.647  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-04 03:30:23.647 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-04 03:30:23.647 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-04 03:30:23.647 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-04 03:30:23.648 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-04 03:30:23.648 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-04 03:30:23.648 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-04 03:30:23.649 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-04 03:30:23.652 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 545276590144279136683463567031071793545617090944
             IssuerDN: UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 04 01:27:07 UTC 2021
           Final Date: Wed Jun 04 01:27:06 UTC 2031
            SubjectDN: UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [80:02:8b:02:42:8d:35:1e:68:75:58:69:4d:70:b5:01:5a:99:c1:cb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3812f7325a3cf682c47ede9344279f28a10cf329
                       5fcae8bc17018635c4c29804fe61478593b74179
                       285cfb118e6b37d43f50b840d2cff60fef244704
                       f00f680b48d324b4ae0a4901d106861181366642
                       cad7e368e970dc843a1b3989ff07753106e93f7e
                       006681511071f83d5e3e6601183a38ecd0d6cebd
                       955944cec12997e5b2dfb56bd4e3a72e248f1569
                       b70bdf86b91f0c3b9f8f7b23f7cd6d00bb666557
                       471cfb61c5a3866a5c028841a2f416fd7b236f3b
                       412d7adfe221ea0c937ef664691c0687a80056b7
                       64b8455fa62926776687c55bd4a33c6990d3a379
                       b7aef8cb7d38131c09b2fe71349b273022c3762a
                       72812800fffd9cf8d1b2c6f87bfb5ef37549cc87
                       0ad5ae91473d9c078674d655df7e6aff66eabef1
                       8a1aa26a5e106eece9e4b324869a2b8f0f9f290d
                       877265fa6986126c74cb41b82e53c211e17a6145
                       5a68e6660ff10202d6eb26445b19a01ce82f8dfd
                       2f3f6c2c407d57741f5137b75684f9df66de178c
                       2a978a96c3b17567d1beea7cc4ee43db0bfbe56e
                       4bb94732
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f1:a7:10:74:10:6c:56:47:ec:ea:54:68:89:1e:92:e1:07:85:82:93]
            modulus: d9fdd506afd0a54475c48b70c714c9e3a2e94ea609a18d9e036e22b6c68aa6f79ce44e34b3bd9376f76de9af5f09f2f34e556d8c6170ad1072e4651041cf98cedac79728d155caf46d83a7d2116882824e15faefb9e425b64ef7e32683f25cd551a38a6b4d3bf08532327b23f204211e8702659752fc51eb0bdd645b6ec04478cf70285f79d851c16342dcecff9479ca39acb4c6d54429568061215ed0372c0354db071bf09f997b2bfbb4821615b1d1e6934e1fd0e7c44241862dd9336bebb6fc45637a2c51b4ffd82c199ccc096c3b7dd49b0de3e7bf4a82ba94278012f83563e7bf1b322137ebdb13a1a76561b0ef01d039d350e2ada77201834869de58c9
    public exponent: 10001

] 
2021-06-04 03:33:55.942  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-04 03:33:55.943 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-04 03:33:55.944 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-04 03:33:55.944 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-04 03:33:55.944  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-04 03:33:55.944  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-04 03:33:55.945  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-04 03:33:55.945  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-04 03:33:55.945  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-04 03:33:55.948  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-04 03:33:55.948  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-04 03:33:55.949  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-04 03:33:55.949  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-04 03:33:56.024  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-04 03:33:56.024  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-04 03:33:56.025 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-04 03:33:56.026 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-04 03:33:56.026  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1425
2021-06-04 03:33:56.026  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-04 03:33:56.027  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-04 03:33:56.027  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-04 03:33:56.028  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-04 03:33:56.028  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-04 03:33:56.028 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-04 03:33:56.028 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-04 03:33:56.028 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-04 03:33:56.029 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-04 03:33:56.029 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-04 03:33:56.029 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-04 03:33:56.030 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-04 03:33:56.032 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 545276590144279136683463567031071793545617090944
             IssuerDN: UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 04 01:27:07 UTC 2021
           Final Date: Wed Jun 04 01:27:06 UTC 2031
            SubjectDN: UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [80:02:8b:02:42:8d:35:1e:68:75:58:69:4d:70:b5:01:5a:99:c1:cb]
            modulus: a51b7b9fcca161c2c009034861be5a083d77766a6db6427f08203b089af6940c97c968c4fdf1180479fc825256f044dd697e1d7e3b725b740dac752e87bcc1da06a1187de3c5fd17bfacd4f4447a18c04849abde64963e4725ff080703e727804a51ae12bbfa8f9d338302f652f247536ffa756333d474add36c424c1a94dfc84ce2aaa290cc65102177f786d5f415da90934b93638b2bc58c518a8e27bad911369ade164fce4c2d4132ca026dd6424834c308783b7ffa90cca15688d4df65907e3077520ef74def9af55da2c90f044aaee15ea9e806420d4948fe86c3f3fa2a75216c5bb3dec16fc779176ab63a4319595c9e396231d80e000d1764a821f7fdd72e1ec9aab2a72fdc7646e52cae6ef36756b67b7948e144c6f60a4a18cb14ff3a1d0550d77e2995804d31cee6708c7f959d9a20b97c164b723c038fc4442245b3a13981d6560733659c8cd4aec653befb9640d6a30ceec63c7d4973056c0d1d71edb1ce10f8f7c69e5eb50bf8cab38e5d7f67cf689289450574fb6c624c4d9f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3812f7325a3cf682c47ede9344279f28a10cf329
                       5fcae8bc17018635c4c29804fe61478593b74179
                       285cfb118e6b37d43f50b840d2cff60fef244704
                       f00f680b48d324b4ae0a4901d106861181366642
                       cad7e368e970dc843a1b3989ff07753106e93f7e
                       006681511071f83d5e3e6601183a38ecd0d6cebd
                       955944cec12997e5b2dfb56bd4e3a72e248f1569
                       b70bdf86b91f0c3b9f8f7b23f7cd6d00bb666557
                       471cfb61c5a3866a5c028841a2f416fd7b236f3b
                       412d7adfe221ea0c937ef664691c0687a80056b7
                       64b8455fa62926776687c55bd4a33c6990d3a379
                       b7aef8cb7d38131c09b2fe71349b273022c3762a
                       72812800fffd9cf8d1b2c6f87bfb5ef37549cc87
                       0ad5ae91473d9c078674d655df7e6aff66eabef1
                       8a1aa26a5e106eece9e4b324869a2b8f0f9f290d
                       877265fa6986126c74cb41b82e53c211e17a6145
                       5a68e6660ff10202d6eb26445b19a01ce82f8dfd
                       2f3f6c2c407d57741f5137b75684f9df66de178c
                       2a978a96c3b17567d1beea7cc4ee43db0bfbe56e
                       4bb94732
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9a:e2:bf:d3:16:79:5c:85:94:a3:a4:7c:cb:4b:e3:cf:c1:ea:97:fa]
            modulus: ceb2e1dd63881a3c993443ec3ed3e8bf1edd7ebad3e8381d9fc0203cb2b1b080f37ff57d3e3034c6f178ff4b62e33deccbb975817f59957e42719cc6567c71f81d8e332c5016d51201ee99a7104a84edb57316fa1504bfe93eeb76e3e4a96d4d760884ef1c84a61d3a3338bb0495fb05d3282f5210783cb51d63d622adef60ac6af53fd9b697c537b517e9f28e2ec2b343f15c8813910534c2ed7d374de7d7673af6275ce37b61ffe515518d75ad541d686ac3afec901b278715709f0a403a3e8b7f64870fa01f50cde1f78a719860333641a35315e015d5c9dad98d9772090f63137caf7e1bba7f38ad64f536608adade8ba23f6a64b4157c0cc848627f73af
    public exponent: 10001

] 
2021-06-04 03:35:53.919  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-04 03:35:53.919 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-04 03:35:53.920 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-04 03:35:53.921 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-04 03:35:53.921  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-04 03:35:53.921  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-04 03:35:53.922  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-04 03:35:53.922  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-04 03:35:53.922  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-04 03:35:53.926  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-04 03:35:53.927  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-04 03:35:53.927  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-04 03:35:53.928  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-04 03:35:54.002  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-04 03:35:54.002  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-04 03:35:54.003 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-04 03:35:54.003 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-04 03:35:54.004  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1425
2021-06-04 03:35:54.004  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-04 03:35:54.005  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-04 03:35:54.005  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-04 03:35:54.005  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-04 03:35:54.005  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-04 03:35:54.005 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-04 03:35:54.006 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-04 03:35:54.006 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-04 03:35:54.006 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-04 03:35:54.006 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-04 03:35:54.006 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-04 03:35:54.007 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-04 03:35:54.009 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 545276590144279136683463567031071793545617090944
             IssuerDN: UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 04 01:27:07 UTC 2021
           Final Date: Wed Jun 04 01:27:06 UTC 2031
            SubjectDN: UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [80:02:8b:02:42:8d:35:1e:68:75:58:69:4d:70:b5:01:5a:99:c1:cb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3812f7325a3cf682c47ede9344279f28a10cf329
                       5fcae8bc17018635c4c29804fe61478593b74179
                       285cfb118e6b37d43f50b840d2cff60fef244704
                       f00f680b48d324b4ae0a4901d106861181366642
                       cad7e368e970dc843a1b3989ff07753106e93f7e
                       006681511071f83d5e3e6601183a38ecd0d6cebd
                       955944cec12997e5b2dfb56bd4e3a72e248f1569
                       b70bdf86b91f0c3b9f8f7b23f7cd6d00bb666557
                       471cfb61c5a3866a5c028841a2f416fd7b236f3b
                       412d7adfe221ea0c937ef664691c0687a80056b7
                       64b8455fa62926776687c55bd4a33c6990d3a379
                       b7aef8cb7d38131c09b2fe71349b273022c3762a
                       72812800fffd9cf8d1b2c6f87bfb5ef37549cc87
                       0ad5ae91473d9c078674d655df7e6aff66eabef1
                       8a1aa26a5e106eece9e4b324869a2b8f0f9f290d
                       877265fa6986126c74cb41b82e53c211e17a6145
                       5a68e6660ff10202d6eb26445b19a01ce82f8dfd
                       2f3f6c2c407d57741f5137b75684f9df66de178c
                       2a978a96c3b17567d1beea7cc4ee43db0bfbe56e
                       4bb94732
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d3:a4:71:be:07:10:c1:d5:c5:55:49:45:cd:b1:e4:2e:d1:bb:30:46]
            modulus: 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
    public exponent: 10001

] 
2021-06-04 03:37:36.020  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-04 03:37:36.021 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-04 03:37:36.022 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-04 03:37:36.023 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-04 03:37:36.023  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-04 03:37:36.023  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-04 03:37:36.024  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-04 03:37:36.024  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-04 03:37:36.024  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-04 03:37:36.029  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-04 03:37:36.030  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-04 03:37:36.030  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-04 03:37:36.033  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-04 03:37:36.185  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-04 03:37:36.185  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-04 03:37:36.185 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-04 03:37:36.186 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-04 03:37:36.187  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1425
2021-06-04 03:37:36.187  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-04 03:37:36.188  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-04 03:37:36.188  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-04 03:37:36.188  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-04 03:37:36.188  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-04 03:37:36.188 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-04 03:37:36.189 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-04 03:37:36.189 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-04 03:37:36.189 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-04 03:37:36.189 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-04 03:37:36.189 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-04 03:37:36.190 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-04 03:37:36.192 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 545276590144279136683463567031071793545617090944
             IssuerDN: UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 04 01:27:07 UTC 2021
           Final Date: Wed Jun 04 01:27:06 UTC 2031
            SubjectDN: UID=c-0y7eq01yssbvrfvog,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [80:02:8b:02:42:8d:35:1e:68:75:58:69:4d:70:b5:01:5a:99:c1:cb]
            modulus: a51b7b9fcca161c2c009034861be5a083d77766a6db6427f08203b089af6940c97c968c4fdf1180479fc825256f044dd697e1d7e3b725b740dac752e87bcc1da06a1187de3c5fd17bfacd4f4447a18c04849abde64963e4725ff080703e727804a51ae12bbfa8f9d338302f652f247536ffa756333d474add36c424c1a94dfc84ce2aaa290cc65102177f786d5f415da90934b93638b2bc58c518a8e27bad911369ade164fce4c2d4132ca026dd6424834c308783b7ffa90cca15688d4df65907e3077520ef74def9af55da2c90f044aaee15ea9e806420d4948fe86c3f3fa2a75216c5bb3dec16fc779176ab63a4319595c9e396231d80e000d1764a821f7fdd72e1ec9aab2a72fdc7646e52cae6ef36756b67b7948e144c6f60a4a18cb14ff3a1d0550d77e2995804d31cee6708c7f959d9a20b97c164b723c038fc4442245b3a13981d6560733659c8cd4aec653befb9640d6a30ceec63c7d4973056c0d1d71edb1ce10f8f7c69e5eb50bf8cab38e5d7f67cf689289450574fb6c624c4d9f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3812f7325a3cf682c47ede9344279f28a10cf329
                       5fcae8bc17018635c4c29804fe61478593b74179
                       285cfb118e6b37d43f50b840d2cff60fef244704
                       f00f680b48d324b4ae0a4901d106861181366642
                       cad7e368e970dc843a1b3989ff07753106e93f7e
                       006681511071f83d5e3e6601183a38ecd0d6cebd
                       955944cec12997e5b2dfb56bd4e3a72e248f1569
                       b70bdf86b91f0c3b9f8f7b23f7cd6d00bb666557
                       471cfb61c5a3866a5c028841a2f416fd7b236f3b
                       412d7adfe221ea0c937ef664691c0687a80056b7
                       64b8455fa62926776687c55bd4a33c6990d3a379
                       b7aef8cb7d38131c09b2fe71349b273022c3762a
                       72812800fffd9cf8d1b2c6f87bfb5ef37549cc87
                       0ad5ae91473d9c078674d655df7e6aff66eabef1
                       8a1aa26a5e106eece9e4b324869a2b8f0f9f290d
                       877265fa6986126c74cb41b82e53c211e17a6145
                       5a68e6660ff10202d6eb26445b19a01ce82f8dfd
                       2f3f6c2c407d57741f5137b75684f9df66de178c
                       2a978a96c3b17567d1beea7cc4ee43db0bfbe56e
                       4bb94732
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d2:e4:83:53:3b:d1:ec:63:fd:9f:c5:b7:46:ee:20:e5:b2:ab:64:a5]
            modulus: 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
    public exponent: 10001

]