Results

By type

          2021-06-09 10:19:51,217 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-06-09 10:19:54,904 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-06-09 10:19:57.825  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-06-09 10:20:10.907 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-06-09 10:20:11.920  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-06-09 10:20:12.813  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-06-09 10:20:27.214  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 38.797 seconds (JVM running for 46.751)
2021-06-09 10:36:32.817  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-09 10:36:32.908 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-09 10:36:33.013 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-06-09 10:36:33.016 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-09 10:36:33.108  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-06-09 10:36:33.112  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-09 10:36:33.200  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-09 10:36:33.201  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 10:36:33.201  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-09 10:36:33.207  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-09 10:36:33.209  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-09 10:36:33.399  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-09 10:36:33.404  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 10:36:33.404  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 10:36:33.497  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-09 10:36:34.541  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-09 10:36:34.543  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-09 10:36:34.544 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-09 10:36:34.601 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-09 10:36:34.602  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1101
2021-06-09 10:36:34.603  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-09 10:36:34.606  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-09 10:36:34.607  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-09 10:36:34.612  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-09 10:36:34.613  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-09 10:36:34.613 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 10:36:34.614 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 10:36:34.614 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 10:36:34.710 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 10:36:34.710 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 10:36:34.711 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 10:36:34.716 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-09 10:36:34.817 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 684508447430913461036280143567379591075134494572
             IssuerDN: UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 09 10:14:07 UTC 2021
           Final Date: Mon Jun 09 10:14:06 UTC 2031
            SubjectDN: UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [21:f5:3d:a6:d6:67:38:9a:6f:58:03:13:3f:95:7b:3f:10:7e:34:ce]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 364a183690cc5c07630bae8d90991496fdfef715
                       2b2c3cb0ffa90786268d2d8f53aeb0c717a45ff8
                       5a2daf22171ed1b3f7d4abf52eff67aa64a3812e
                       0c916272acdea12a302757a5f2b9ca2fe9108997
                       361d48e0abc03abdc38bfe0ee85c74d15fe59599
                       1dab3350a890994117ee64c08c4c23cc49216c46
                       3e6474b278337b2a91c3fb6c593498684a7f8103
                       b3cdc1b51d1abc53e437555110ad7ab8a4acc4b5
                       8344abf41e0b559b7c49b635917b508e0d6b7b80
                       3443ebdc1484cd11828c0164c32beee38b99ee46
                       b31040416aa1f28aa6c48c1dc0951d5e03cab43d
                       3ff2847f869176b596da996de58b38aaf2e754dc
                       57cf26e1dde0f3ec484a40418e53fc1532fe9c96
                       cc592a2c004085d4a5d830231176004290f4f3c0
                       7077601289c654d98e04d146a6be141b2dfbdb3f
                       fc4262fb31b880c097421e5ebdc449d40fa8de51
                       dd5484d6114d50f476184a8c1653b5920e95ace5
                       a36905efedc39c77a7dd6df143828e9cd4883468
                       bc0da5546ca0d843a635242d0bb071bd7013677d
                       f09ac847
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b8:13:d2:68:f0:1c:4d:85:40:5a:59:34:6e:22:1e:2b:bb:56:29:79]
            modulus: 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
    public exponent: 10001

] 
2021-06-09 11:57:37.735  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-09 11:57:37.739 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-09 11:57:37.741 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-09 11:57:37.745 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-09 11:57:37.746  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-09 11:57:37.798  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-09 11:57:37.800  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-09 11:57:37.800  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-09 11:57:37.801  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-09 11:57:37.818  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-09 11:57:37.819  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 11:57:37.821  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 11:57:37.900  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-09 11:57:38.105  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-09 11:57:38.106  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-09 11:57:38.107 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-09 11:57:38.113 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-09 11:57:38.114  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1101
2021-06-09 11:57:38.115  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-09 11:57:38.117  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-09 11:57:38.198  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-09 11:57:38.199  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-09 11:57:38.199  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-09 11:57:38.200 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 11:57:38.200 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 11:57:38.201 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 11:57:38.202 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 11:57:38.203 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 11:57:38.203 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 11:57:38.204 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-09 11:57:38.208 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 684508447430913461036280143567379591075134494572
             IssuerDN: UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 09 10:14:07 UTC 2021
           Final Date: Mon Jun 09 10:14:06 UTC 2031
            SubjectDN: UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [21:f5:3d:a6:d6:67:38:9a:6f:58:03:13:3f:95:7b:3f:10:7e:34:ce]
            modulus: 9e81a8bef13d2cba0115b2d103f893e068ac0851d75c9d57ca76af98c8c69232ef11a8f509ba61c732eaf39a467ba0105b068973d0f13d87cb0c5763c4137b91f9450d0921abacb6b45b930e77084e921af865d1f1b55e4b9971583870e81630aeb54eb6fe40ea5fc9d18866ef48bac86532fff277e45f1d5cdb709a12947a839bd4d7af8e9f4acae53da55e37f927c58ea554c2fef2a285311d328863e0b4fb59738dfbd64bf9c1c1983657b1bbe96a1176f591b7f3c54b014d70122795a3b6aa904577cec2b7fdee7972f8f8f884662ee7d53fd2e6b918c290578bee0d81543ce67b6c2879c5bece29b43c34f37f84a12812c7f354d241bee73a6c7bf79c2968dd46fcf2a70008aa7a125640da8bf1a029ff24d642742f0ec7abd8679016faacba8a261e7addfe60330997b52ecd4ee1900fa3f73856cdbbe1edcb3ffcd757bc857567eeb80a296c2c7d3981d90bd8e4bc38bf33564ccd8f6404bd350342f21f7f4de760e8666730479d87af93b5262b91496c6a854b4892a5e0a64ce8dc8f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 364a183690cc5c07630bae8d90991496fdfef715
                       2b2c3cb0ffa90786268d2d8f53aeb0c717a45ff8
                       5a2daf22171ed1b3f7d4abf52eff67aa64a3812e
                       0c916272acdea12a302757a5f2b9ca2fe9108997
                       361d48e0abc03abdc38bfe0ee85c74d15fe59599
                       1dab3350a890994117ee64c08c4c23cc49216c46
                       3e6474b278337b2a91c3fb6c593498684a7f8103
                       b3cdc1b51d1abc53e437555110ad7ab8a4acc4b5
                       8344abf41e0b559b7c49b635917b508e0d6b7b80
                       3443ebdc1484cd11828c0164c32beee38b99ee46
                       b31040416aa1f28aa6c48c1dc0951d5e03cab43d
                       3ff2847f869176b596da996de58b38aaf2e754dc
                       57cf26e1dde0f3ec484a40418e53fc1532fe9c96
                       cc592a2c004085d4a5d830231176004290f4f3c0
                       7077601289c654d98e04d146a6be141b2dfbdb3f
                       fc4262fb31b880c097421e5ebdc449d40fa8de51
                       dd5484d6114d50f476184a8c1653b5920e95ace5
                       a36905efedc39c77a7dd6df143828e9cd4883468
                       bc0da5546ca0d843a635242d0bb071bd7013677d
                       f09ac847
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7d:0b:bb:91:c8:ef:40:a0:ea:14:28:3f:51:4d:eb:ea:d1:88:f0:26]
            modulus: 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
    public exponent: 10001

] 
2021-06-09 11:59:07.322  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-09 11:59:07.323 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-09 11:59:07.325 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-06-09 11:59:07.325 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-09 11:59:07.326  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-06-09 11:59:07.326  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-09 11:59:07.327  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-09 11:59:07.327  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-09 11:59:07.327  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-09 11:59:07.334  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-09 11:59:07.334  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 11:59:07.335  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 11:59:07.336  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-09 11:59:07.458  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-09 11:59:07.498  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-09 11:59:07.498 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-09 11:59:07.503 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-09 11:59:07.504  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1101
2021-06-09 11:59:07.504  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-09 11:59:07.505  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-09 11:59:07.505  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-09 11:59:07.505  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-09 11:59:07.506  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-09 11:59:07.506 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 11:59:07.506 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 11:59:07.506 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 11:59:07.507 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 11:59:07.507 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 11:59:07.507 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 11:59:07.508 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-09 11:59:07.510 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 684508447430913461036280143567379591075134494572
             IssuerDN: UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 09 10:14:07 UTC 2021
           Final Date: Mon Jun 09 10:14:06 UTC 2031
            SubjectDN: UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [21:f5:3d:a6:d6:67:38:9a:6f:58:03:13:3f:95:7b:3f:10:7e:34:ce]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 364a183690cc5c07630bae8d90991496fdfef715
                       2b2c3cb0ffa90786268d2d8f53aeb0c717a45ff8
                       5a2daf22171ed1b3f7d4abf52eff67aa64a3812e
                       0c916272acdea12a302757a5f2b9ca2fe9108997
                       361d48e0abc03abdc38bfe0ee85c74d15fe59599
                       1dab3350a890994117ee64c08c4c23cc49216c46
                       3e6474b278337b2a91c3fb6c593498684a7f8103
                       b3cdc1b51d1abc53e437555110ad7ab8a4acc4b5
                       8344abf41e0b559b7c49b635917b508e0d6b7b80
                       3443ebdc1484cd11828c0164c32beee38b99ee46
                       b31040416aa1f28aa6c48c1dc0951d5e03cab43d
                       3ff2847f869176b596da996de58b38aaf2e754dc
                       57cf26e1dde0f3ec484a40418e53fc1532fe9c96
                       cc592a2c004085d4a5d830231176004290f4f3c0
                       7077601289c654d98e04d146a6be141b2dfbdb3f
                       fc4262fb31b880c097421e5ebdc449d40fa8de51
                       dd5484d6114d50f476184a8c1653b5920e95ace5
                       a36905efedc39c77a7dd6df143828e9cd4883468
                       bc0da5546ca0d843a635242d0bb071bd7013677d
                       f09ac847
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [45:ed:5d:89:c0:b2:4b:65:bd:e4:a1:e9:b1:17:9b:63:da:7a:c3:d1]
            modulus: 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
    public exponent: 10001

] 
2021-06-09 12:02:06.235  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-09 12:02:06.236 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-09 12:02:06.238 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-09 12:02:06.239 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-09 12:02:06.239  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-09 12:02:06.240  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-09 12:02:06.240  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-09 12:02:06.241  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-09 12:02:06.241  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-09 12:02:06.248  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-09 12:02:06.248  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 12:02:06.249  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 12:02:06.250  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-09 12:02:06.423  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-09 12:02:06.424  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-09 12:02:06.425 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-09 12:02:06.427 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-09 12:02:06.429  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1101
2021-06-09 12:02:06.429  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-09 12:02:06.432  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-09 12:02:06.432  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-09 12:02:06.433  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-09 12:02:06.433  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-09 12:02:06.434 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 12:02:06.434 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 12:02:06.434 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 12:02:06.435 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 12:02:06.435 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 12:02:06.435 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 12:02:06.436 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-09 12:02:06.438 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 684508447430913461036280143567379591075134494572
             IssuerDN: UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 09 10:14:07 UTC 2021
           Final Date: Mon Jun 09 10:14:06 UTC 2031
            SubjectDN: UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [21:f5:3d:a6:d6:67:38:9a:6f:58:03:13:3f:95:7b:3f:10:7e:34:ce]
            modulus: 9e81a8bef13d2cba0115b2d103f893e068ac0851d75c9d57ca76af98c8c69232ef11a8f509ba61c732eaf39a467ba0105b068973d0f13d87cb0c5763c4137b91f9450d0921abacb6b45b930e77084e921af865d1f1b55e4b9971583870e81630aeb54eb6fe40ea5fc9d18866ef48bac86532fff277e45f1d5cdb709a12947a839bd4d7af8e9f4acae53da55e37f927c58ea554c2fef2a285311d328863e0b4fb59738dfbd64bf9c1c1983657b1bbe96a1176f591b7f3c54b014d70122795a3b6aa904577cec2b7fdee7972f8f8f884662ee7d53fd2e6b918c290578bee0d81543ce67b6c2879c5bece29b43c34f37f84a12812c7f354d241bee73a6c7bf79c2968dd46fcf2a70008aa7a125640da8bf1a029ff24d642742f0ec7abd8679016faacba8a261e7addfe60330997b52ecd4ee1900fa3f73856cdbbe1edcb3ffcd757bc857567eeb80a296c2c7d3981d90bd8e4bc38bf33564ccd8f6404bd350342f21f7f4de760e8666730479d87af93b5262b91496c6a854b4892a5e0a64ce8dc8f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 364a183690cc5c07630bae8d90991496fdfef715
                       2b2c3cb0ffa90786268d2d8f53aeb0c717a45ff8
                       5a2daf22171ed1b3f7d4abf52eff67aa64a3812e
                       0c916272acdea12a302757a5f2b9ca2fe9108997
                       361d48e0abc03abdc38bfe0ee85c74d15fe59599
                       1dab3350a890994117ee64c08c4c23cc49216c46
                       3e6474b278337b2a91c3fb6c593498684a7f8103
                       b3cdc1b51d1abc53e437555110ad7ab8a4acc4b5
                       8344abf41e0b559b7c49b635917b508e0d6b7b80
                       3443ebdc1484cd11828c0164c32beee38b99ee46
                       b31040416aa1f28aa6c48c1dc0951d5e03cab43d
                       3ff2847f869176b596da996de58b38aaf2e754dc
                       57cf26e1dde0f3ec484a40418e53fc1532fe9c96
                       cc592a2c004085d4a5d830231176004290f4f3c0
                       7077601289c654d98e04d146a6be141b2dfbdb3f
                       fc4262fb31b880c097421e5ebdc449d40fa8de51
                       dd5484d6114d50f476184a8c1653b5920e95ace5
                       a36905efedc39c77a7dd6df143828e9cd4883468
                       bc0da5546ca0d843a635242d0bb071bd7013677d
                       f09ac847
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [15:91:10:c7:74:04:3f:35:b0:4a:7a:99:fa:11:ba:13:ed:3d:f9:85]
            modulus: 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
    public exponent: 10001

] 
2021-06-09 12:02:42.858  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-09 12:02:42.859 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-09 12:02:42.861 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-09 12:02:42.862 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-09 12:02:42.862  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-09 12:02:42.863  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-09 12:02:42.864  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-09 12:02:42.864  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-09 12:02:42.864  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-09 12:02:42.869  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-09 12:02:42.870  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 12:02:42.870  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 12:02:42.871  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-09 12:02:42.965  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-09 12:02:42.966  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-09 12:02:42.966 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-09 12:02:43.000 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-09 12:02:43.001  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1101
2021-06-09 12:02:43.002  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-09 12:02:43.004  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-09 12:02:43.005  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-09 12:02:43.005  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-09 12:02:43.006  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-09 12:02:43.007 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 12:02:43.007 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 12:02:43.007 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 12:02:43.008 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 12:02:43.009 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 12:02:43.009 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 12:02:43.011 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-09 12:02:43.014 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 684508447430913461036280143567379591075134494572
             IssuerDN: UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 09 10:14:07 UTC 2021
           Final Date: Mon Jun 09 10:14:06 UTC 2031
            SubjectDN: UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [21:f5:3d:a6:d6:67:38:9a:6f:58:03:13:3f:95:7b:3f:10:7e:34:ce]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 364a183690cc5c07630bae8d90991496fdfef715
                       2b2c3cb0ffa90786268d2d8f53aeb0c717a45ff8
                       5a2daf22171ed1b3f7d4abf52eff67aa64a3812e
                       0c916272acdea12a302757a5f2b9ca2fe9108997
                       361d48e0abc03abdc38bfe0ee85c74d15fe59599
                       1dab3350a890994117ee64c08c4c23cc49216c46
                       3e6474b278337b2a91c3fb6c593498684a7f8103
                       b3cdc1b51d1abc53e437555110ad7ab8a4acc4b5
                       8344abf41e0b559b7c49b635917b508e0d6b7b80
                       3443ebdc1484cd11828c0164c32beee38b99ee46
                       b31040416aa1f28aa6c48c1dc0951d5e03cab43d
                       3ff2847f869176b596da996de58b38aaf2e754dc
                       57cf26e1dde0f3ec484a40418e53fc1532fe9c96
                       cc592a2c004085d4a5d830231176004290f4f3c0
                       7077601289c654d98e04d146a6be141b2dfbdb3f
                       fc4262fb31b880c097421e5ebdc449d40fa8de51
                       dd5484d6114d50f476184a8c1653b5920e95ace5
                       a36905efedc39c77a7dd6df143828e9cd4883468
                       bc0da5546ca0d843a635242d0bb071bd7013677d
                       f09ac847
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [01:44:a2:18:85:46:8b:06:34:3f:9d:b6:54:ee:b6:c9:8f:07:be:39]
            modulus: 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
    public exponent: 10001

] 
2021-06-09 12:02:59.934  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-09 12:02:59.935 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-09 12:02:59.937 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-06-09 12:02:59.937 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-09 12:02:59.938  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-06-09 12:02:59.938  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-09 12:02:59.938  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-09 12:02:59.939  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-09 12:02:59.939  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-09 12:02:59.944  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-09 12:02:59.944  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 12:02:59.944  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 12:02:59.945  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-09 12:03:00.073  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-09 12:03:00.074  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-09 12:03:00.075 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-09 12:03:00.077 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-09 12:03:00.078  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1101
2021-06-09 12:03:00.078  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-09 12:03:00.079  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-09 12:03:00.080  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-09 12:03:00.080  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-09 12:03:00.081  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-09 12:03:00.081 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 12:03:00.081 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 12:03:00.081 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 12:03:00.082 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 12:03:00.082 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 12:03:00.083 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 12:03:00.083 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-09 12:03:00.086 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 684508447430913461036280143567379591075134494572
             IssuerDN: UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 09 10:14:07 UTC 2021
           Final Date: Mon Jun 09 10:14:06 UTC 2031
            SubjectDN: UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [21:f5:3d:a6:d6:67:38:9a:6f:58:03:13:3f:95:7b:3f:10:7e:34:ce]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 364a183690cc5c07630bae8d90991496fdfef715
                       2b2c3cb0ffa90786268d2d8f53aeb0c717a45ff8
                       5a2daf22171ed1b3f7d4abf52eff67aa64a3812e
                       0c916272acdea12a302757a5f2b9ca2fe9108997
                       361d48e0abc03abdc38bfe0ee85c74d15fe59599
                       1dab3350a890994117ee64c08c4c23cc49216c46
                       3e6474b278337b2a91c3fb6c593498684a7f8103
                       b3cdc1b51d1abc53e437555110ad7ab8a4acc4b5
                       8344abf41e0b559b7c49b635917b508e0d6b7b80
                       3443ebdc1484cd11828c0164c32beee38b99ee46
                       b31040416aa1f28aa6c48c1dc0951d5e03cab43d
                       3ff2847f869176b596da996de58b38aaf2e754dc
                       57cf26e1dde0f3ec484a40418e53fc1532fe9c96
                       cc592a2c004085d4a5d830231176004290f4f3c0
                       7077601289c654d98e04d146a6be141b2dfbdb3f
                       fc4262fb31b880c097421e5ebdc449d40fa8de51
                       dd5484d6114d50f476184a8c1653b5920e95ace5
                       a36905efedc39c77a7dd6df143828e9cd4883468
                       bc0da5546ca0d843a635242d0bb071bd7013677d
                       f09ac847
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8a:2c:69:93:7d:14:8a:34:48:97:d2:56:7b:dd:95:f5:b9:17:c8:59]
            modulus: 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
    public exponent: 10001

] 
2021-06-09 12:03:33.815  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-09 12:03:33.817 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-09 12:03:33.819 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-06-09 12:03:33.819 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-09 12:03:33.820  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-06-09 12:03:33.821  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-09 12:03:33.821  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-09 12:03:33.822  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-09 12:03:33.822  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-09 12:03:33.826  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-09 12:03:33.827  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 12:03:33.827  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 12:03:33.828  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-09 12:03:33.915  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-09 12:03:33.916  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-09 12:03:33.916 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-09 12:03:33.917 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-09 12:03:33.917  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1101
2021-06-09 12:03:33.917  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-09 12:03:33.918  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-09 12:03:33.919  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-09 12:03:33.919  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-09 12:03:33.919  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-09 12:03:33.920 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 12:03:33.920 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 12:03:33.920 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 12:03:33.921 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 12:03:33.921 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 12:03:33.922 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 12:03:33.922 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-09 12:03:33.925 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 684508447430913461036280143567379591075134494572
             IssuerDN: UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 09 10:14:07 UTC 2021
           Final Date: Mon Jun 09 10:14:06 UTC 2031
            SubjectDN: UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [21:f5:3d:a6:d6:67:38:9a:6f:58:03:13:3f:95:7b:3f:10:7e:34:ce]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 364a183690cc5c07630bae8d90991496fdfef715
                       2b2c3cb0ffa90786268d2d8f53aeb0c717a45ff8
                       5a2daf22171ed1b3f7d4abf52eff67aa64a3812e
                       0c916272acdea12a302757a5f2b9ca2fe9108997
                       361d48e0abc03abdc38bfe0ee85c74d15fe59599
                       1dab3350a890994117ee64c08c4c23cc49216c46
                       3e6474b278337b2a91c3fb6c593498684a7f8103
                       b3cdc1b51d1abc53e437555110ad7ab8a4acc4b5
                       8344abf41e0b559b7c49b635917b508e0d6b7b80
                       3443ebdc1484cd11828c0164c32beee38b99ee46
                       b31040416aa1f28aa6c48c1dc0951d5e03cab43d
                       3ff2847f869176b596da996de58b38aaf2e754dc
                       57cf26e1dde0f3ec484a40418e53fc1532fe9c96
                       cc592a2c004085d4a5d830231176004290f4f3c0
                       7077601289c654d98e04d146a6be141b2dfbdb3f
                       fc4262fb31b880c097421e5ebdc449d40fa8de51
                       dd5484d6114d50f476184a8c1653b5920e95ace5
                       a36905efedc39c77a7dd6df143828e9cd4883468
                       bc0da5546ca0d843a635242d0bb071bd7013677d
                       f09ac847
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3f:28:38:61:c6:85:77:f4:54:01:ba:b1:61:e8:fd:83:01:ea:08:64]
            modulus: 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
    public exponent: 10001

] 
2021-06-09 12:04:16.953  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-09 12:04:16.955 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-09 12:04:16.956 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-06-09 12:04:16.956 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-09 12:04:16.957  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-06-09 12:04:16.957  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-09 12:04:16.958  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-09 12:04:16.958  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-09 12:04:16.958  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-09 12:04:16.961  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-09 12:04:16.962  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 12:04:16.962  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 12:04:16.963  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-09 12:04:17.033  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-09 12:04:17.034  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-09 12:04:17.035 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-09 12:04:17.036 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-09 12:04:17.037  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1101
2021-06-09 12:04:17.037  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-09 12:04:17.039  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-09 12:04:17.098  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-09 12:04:17.099  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-09 12:04:17.100  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-09 12:04:17.100 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 12:04:17.100 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 12:04:17.101 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 12:04:17.101 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 12:04:17.101 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 12:04:17.102 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 12:04:17.103 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-09 12:04:17.105 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 684508447430913461036280143567379591075134494572
             IssuerDN: UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 09 10:14:07 UTC 2021
           Final Date: Mon Jun 09 10:14:06 UTC 2031
            SubjectDN: UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [21:f5:3d:a6:d6:67:38:9a:6f:58:03:13:3f:95:7b:3f:10:7e:34:ce]
            modulus: 9e81a8bef13d2cba0115b2d103f893e068ac0851d75c9d57ca76af98c8c69232ef11a8f509ba61c732eaf39a467ba0105b068973d0f13d87cb0c5763c4137b91f9450d0921abacb6b45b930e77084e921af865d1f1b55e4b9971583870e81630aeb54eb6fe40ea5fc9d18866ef48bac86532fff277e45f1d5cdb709a12947a839bd4d7af8e9f4acae53da55e37f927c58ea554c2fef2a285311d328863e0b4fb59738dfbd64bf9c1c1983657b1bbe96a1176f591b7f3c54b014d70122795a3b6aa904577cec2b7fdee7972f8f8f884662ee7d53fd2e6b918c290578bee0d81543ce67b6c2879c5bece29b43c34f37f84a12812c7f354d241bee73a6c7bf79c2968dd46fcf2a70008aa7a125640da8bf1a029ff24d642742f0ec7abd8679016faacba8a261e7addfe60330997b52ecd4ee1900fa3f73856cdbbe1edcb3ffcd757bc857567eeb80a296c2c7d3981d90bd8e4bc38bf33564ccd8f6404bd350342f21f7f4de760e8666730479d87af93b5262b91496c6a854b4892a5e0a64ce8dc8f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 364a183690cc5c07630bae8d90991496fdfef715
                       2b2c3cb0ffa90786268d2d8f53aeb0c717a45ff8
                       5a2daf22171ed1b3f7d4abf52eff67aa64a3812e
                       0c916272acdea12a302757a5f2b9ca2fe9108997
                       361d48e0abc03abdc38bfe0ee85c74d15fe59599
                       1dab3350a890994117ee64c08c4c23cc49216c46
                       3e6474b278337b2a91c3fb6c593498684a7f8103
                       b3cdc1b51d1abc53e437555110ad7ab8a4acc4b5
                       8344abf41e0b559b7c49b635917b508e0d6b7b80
                       3443ebdc1484cd11828c0164c32beee38b99ee46
                       b31040416aa1f28aa6c48c1dc0951d5e03cab43d
                       3ff2847f869176b596da996de58b38aaf2e754dc
                       57cf26e1dde0f3ec484a40418e53fc1532fe9c96
                       cc592a2c004085d4a5d830231176004290f4f3c0
                       7077601289c654d98e04d146a6be141b2dfbdb3f
                       fc4262fb31b880c097421e5ebdc449d40fa8de51
                       dd5484d6114d50f476184a8c1653b5920e95ace5
                       a36905efedc39c77a7dd6df143828e9cd4883468
                       bc0da5546ca0d843a635242d0bb071bd7013677d
                       f09ac847
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [73:a2:58:b6:b1:90:b0:71:0a:ec:7b:ec:28:3a:72:a6:10:7c:df:b3]
            modulus: a19b36dbe084f31ff3f8012f3e5baaefc5277cbd2a10f94ed15f7a9df171f915b0fb75895acf433f6cde1a590bba50b12b73938bdd27d82ed26f170141b5836d98dff8ab5d770202d8962669a560d1d34571789df452f710443c148913ed895fb5c1a9ca5207e650d2587324894b07feb610c1392c9ceeded11007ecb511e8b6d0de2ad1f4f2db9798a87c9c3834fac4397784352e6de3940438bf86f71e75d114045f14a467434b4c0442ee6fb82fe7c1fd762302d475a08ac816195d686d46d1355a2e5fcfbba00dddc4c996d8c39e6c7d6d2873387dfd1acd137364d64db5e36a35de0b1e3a98e334690fc6c454ec2dbdd5697777a9d5b84d8551a3799cbf
    public exponent: 10001

] 
2021-06-09 12:05:52.726  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-09 12:05:52.727 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-09 12:05:52.729 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-06-09 12:05:52.729 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-09 12:05:52.729  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-06-09 12:05:52.730  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-09 12:05:52.730  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-09 12:05:52.730  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-09 12:05:52.731  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-09 12:05:52.734  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-09 12:05:52.734  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 12:05:52.734  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 12:05:52.735  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-09 12:05:52.829  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-09 12:05:52.829  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-09 12:05:52.830 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-09 12:05:52.832 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-09 12:05:52.832  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1101
2021-06-09 12:05:52.832  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-09 12:05:52.833  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-09 12:05:52.833  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-09 12:05:52.834  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-09 12:05:52.834  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-09 12:05:52.834 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 12:05:52.834 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 12:05:52.834 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 12:05:52.835 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 12:05:52.835 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 12:05:52.835 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 12:05:52.836 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-09 12:05:52.838 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 684508447430913461036280143567379591075134494572
             IssuerDN: UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 09 10:14:07 UTC 2021
           Final Date: Mon Jun 09 10:14:06 UTC 2031
            SubjectDN: UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [21:f5:3d:a6:d6:67:38:9a:6f:58:03:13:3f:95:7b:3f:10:7e:34:ce]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 364a183690cc5c07630bae8d90991496fdfef715
                       2b2c3cb0ffa90786268d2d8f53aeb0c717a45ff8
                       5a2daf22171ed1b3f7d4abf52eff67aa64a3812e
                       0c916272acdea12a302757a5f2b9ca2fe9108997
                       361d48e0abc03abdc38bfe0ee85c74d15fe59599
                       1dab3350a890994117ee64c08c4c23cc49216c46
                       3e6474b278337b2a91c3fb6c593498684a7f8103
                       b3cdc1b51d1abc53e437555110ad7ab8a4acc4b5
                       8344abf41e0b559b7c49b635917b508e0d6b7b80
                       3443ebdc1484cd11828c0164c32beee38b99ee46
                       b31040416aa1f28aa6c48c1dc0951d5e03cab43d
                       3ff2847f869176b596da996de58b38aaf2e754dc
                       57cf26e1dde0f3ec484a40418e53fc1532fe9c96
                       cc592a2c004085d4a5d830231176004290f4f3c0
                       7077601289c654d98e04d146a6be141b2dfbdb3f
                       fc4262fb31b880c097421e5ebdc449d40fa8de51
                       dd5484d6114d50f476184a8c1653b5920e95ace5
                       a36905efedc39c77a7dd6df143828e9cd4883468
                       bc0da5546ca0d843a635242d0bb071bd7013677d
                       f09ac847
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a8:06:c2:47:ee:4a:3d:d5:16:95:af:fe:82:b5:27:1e:b7:c7:bd:44]
            modulus: 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
    public exponent: 10001

] 
2021-06-09 12:10:38.324  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-09 12:10:38.326 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-09 12:10:38.330 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-09 12:10:38.331 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-09 12:10:38.332  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-09 12:10:38.332  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-09 12:10:38.332  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-09 12:10:38.333  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-09 12:10:38.333  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-09 12:10:38.340  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-09 12:10:38.341  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 12:10:38.342  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 12:10:38.343  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-09 12:10:38.492  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-09 12:10:38.493  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-09 12:10:38.494 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-09 12:10:38.498 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-09 12:10:38.499  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1101
2021-06-09 12:10:38.500  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-09 12:10:38.502  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-09 12:10:38.503  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-09 12:10:38.503  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-09 12:10:38.503  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-09 12:10:38.504 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 12:10:38.504 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 12:10:38.504 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 12:10:38.505 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 12:10:38.505 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 12:10:38.505 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 12:10:38.506 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-09 12:10:38.509 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 684508447430913461036280143567379591075134494572
             IssuerDN: UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 09 10:14:07 UTC 2021
           Final Date: Mon Jun 09 10:14:06 UTC 2031
            SubjectDN: UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [21:f5:3d:a6:d6:67:38:9a:6f:58:03:13:3f:95:7b:3f:10:7e:34:ce]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 364a183690cc5c07630bae8d90991496fdfef715
                       2b2c3cb0ffa90786268d2d8f53aeb0c717a45ff8
                       5a2daf22171ed1b3f7d4abf52eff67aa64a3812e
                       0c916272acdea12a302757a5f2b9ca2fe9108997
                       361d48e0abc03abdc38bfe0ee85c74d15fe59599
                       1dab3350a890994117ee64c08c4c23cc49216c46
                       3e6474b278337b2a91c3fb6c593498684a7f8103
                       b3cdc1b51d1abc53e437555110ad7ab8a4acc4b5
                       8344abf41e0b559b7c49b635917b508e0d6b7b80
                       3443ebdc1484cd11828c0164c32beee38b99ee46
                       b31040416aa1f28aa6c48c1dc0951d5e03cab43d
                       3ff2847f869176b596da996de58b38aaf2e754dc
                       57cf26e1dde0f3ec484a40418e53fc1532fe9c96
                       cc592a2c004085d4a5d830231176004290f4f3c0
                       7077601289c654d98e04d146a6be141b2dfbdb3f
                       fc4262fb31b880c097421e5ebdc449d40fa8de51
                       dd5484d6114d50f476184a8c1653b5920e95ace5
                       a36905efedc39c77a7dd6df143828e9cd4883468
                       bc0da5546ca0d843a635242d0bb071bd7013677d
                       f09ac847
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [90:cd:9e:b3:28:e1:4e:9f:00:59:e2:1b:98:32:55:67:d2:69:ff:63]
            modulus: 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
    public exponent: 10001

] 
2021-06-09 12:13:15.216  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-09 12:13:15.218 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-09 12:13:15.219 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-09 12:13:15.220 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-09 12:13:15.220  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-09 12:13:15.221  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-09 12:13:15.221  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-09 12:13:15.221  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-09 12:13:15.222  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-09 12:13:15.227  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-09 12:13:15.227  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 12:13:15.228  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 12:13:15.228  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-09 12:13:15.307  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-09 12:13:15.308  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-09 12:13:15.308 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-09 12:13:15.310 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-09 12:13:15.311  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1101
2021-06-09 12:13:15.312  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-09 12:13:15.313  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-09 12:13:15.315  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-09 12:13:15.316  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-09 12:13:15.316  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-09 12:13:15.317 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 12:13:15.317 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 12:13:15.318 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 12:13:15.320 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 12:13:15.320 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 12:13:15.320 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 12:13:15.321 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-09 12:13:15.327 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 684508447430913461036280143567379591075134494572
             IssuerDN: UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 09 10:14:07 UTC 2021
           Final Date: Mon Jun 09 10:14:06 UTC 2031
            SubjectDN: UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [21:f5:3d:a6:d6:67:38:9a:6f:58:03:13:3f:95:7b:3f:10:7e:34:ce]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 364a183690cc5c07630bae8d90991496fdfef715
                       2b2c3cb0ffa90786268d2d8f53aeb0c717a45ff8
                       5a2daf22171ed1b3f7d4abf52eff67aa64a3812e
                       0c916272acdea12a302757a5f2b9ca2fe9108997
                       361d48e0abc03abdc38bfe0ee85c74d15fe59599
                       1dab3350a890994117ee64c08c4c23cc49216c46
                       3e6474b278337b2a91c3fb6c593498684a7f8103
                       b3cdc1b51d1abc53e437555110ad7ab8a4acc4b5
                       8344abf41e0b559b7c49b635917b508e0d6b7b80
                       3443ebdc1484cd11828c0164c32beee38b99ee46
                       b31040416aa1f28aa6c48c1dc0951d5e03cab43d
                       3ff2847f869176b596da996de58b38aaf2e754dc
                       57cf26e1dde0f3ec484a40418e53fc1532fe9c96
                       cc592a2c004085d4a5d830231176004290f4f3c0
                       7077601289c654d98e04d146a6be141b2dfbdb3f
                       fc4262fb31b880c097421e5ebdc449d40fa8de51
                       dd5484d6114d50f476184a8c1653b5920e95ace5
                       a36905efedc39c77a7dd6df143828e9cd4883468
                       bc0da5546ca0d843a635242d0bb071bd7013677d
                       f09ac847
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [af:b5:a2:db:ba:f7:54:e3:76:6e:92:a3:25:6b:dd:cd:dc:b8:22:a4]
            modulus: 8089fa4c9336527537520df438eff5c030c7df3082367791ba3dbd102b2dd91d5aac973fa890e8f8e2a573bb7d5cbcb8b302666d769ba741312175e7726cf043bb9dd29d1af72de3361aebb74cfbfd3e2929e3345381a759ad89be52c39894bc4d1f3fadfc7d26c12372c398c6e329b6ee87a3ff0c521a6656fe6bfbbb22d978a8c63a88a2782a5419d8b9c347948256eefcf8e703fb46a947bfd85dd95aa797ca77dec625138025920c7e93594cce7c70c95a8b653f6e1ad50d2226486873163db986a75b69773269f9734301a16f878e93f88e80abe4df6697a093fc4262246674cbbba570c2a5ecfc3297d95d4974852577f2cac292eaa756ff35ca0f901b
    public exponent: 10001

] 
2021-06-09 12:15:14.432  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-09 12:15:14.434 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-09 12:15:14.435 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-09 12:15:14.436 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-09 12:15:14.437  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-09 12:15:14.437  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-09 12:15:14.437  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-09 12:15:14.438  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-09 12:15:14.438  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-09 12:15:14.442  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-09 12:15:14.443  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 12:15:14.443  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 12:15:14.444  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-09 12:15:14.580  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-09 12:15:14.581  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-09 12:15:14.582 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-09 12:15:14.583 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-09 12:15:14.584  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1101
2021-06-09 12:15:14.598  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-09 12:15:14.599  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-09 12:15:14.599  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-09 12:15:14.600  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-09 12:15:14.600  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-09 12:15:14.600 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 12:15:14.600 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 12:15:14.601 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 12:15:14.601 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 12:15:14.601 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 12:15:14.601 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 12:15:14.602 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-09 12:15:14.605 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 684508447430913461036280143567379591075134494572
             IssuerDN: UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 09 10:14:07 UTC 2021
           Final Date: Mon Jun 09 10:14:06 UTC 2031
            SubjectDN: UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [21:f5:3d:a6:d6:67:38:9a:6f:58:03:13:3f:95:7b:3f:10:7e:34:ce]
            modulus: 9e81a8bef13d2cba0115b2d103f893e068ac0851d75c9d57ca76af98c8c69232ef11a8f509ba61c732eaf39a467ba0105b068973d0f13d87cb0c5763c4137b91f9450d0921abacb6b45b930e77084e921af865d1f1b55e4b9971583870e81630aeb54eb6fe40ea5fc9d18866ef48bac86532fff277e45f1d5cdb709a12947a839bd4d7af8e9f4acae53da55e37f927c58ea554c2fef2a285311d328863e0b4fb59738dfbd64bf9c1c1983657b1bbe96a1176f591b7f3c54b014d70122795a3b6aa904577cec2b7fdee7972f8f8f884662ee7d53fd2e6b918c290578bee0d81543ce67b6c2879c5bece29b43c34f37f84a12812c7f354d241bee73a6c7bf79c2968dd46fcf2a70008aa7a125640da8bf1a029ff24d642742f0ec7abd8679016faacba8a261e7addfe60330997b52ecd4ee1900fa3f73856cdbbe1edcb3ffcd757bc857567eeb80a296c2c7d3981d90bd8e4bc38bf33564ccd8f6404bd350342f21f7f4de760e8666730479d87af93b5262b91496c6a854b4892a5e0a64ce8dc8f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 364a183690cc5c07630bae8d90991496fdfef715
                       2b2c3cb0ffa90786268d2d8f53aeb0c717a45ff8
                       5a2daf22171ed1b3f7d4abf52eff67aa64a3812e
                       0c916272acdea12a302757a5f2b9ca2fe9108997
                       361d48e0abc03abdc38bfe0ee85c74d15fe59599
                       1dab3350a890994117ee64c08c4c23cc49216c46
                       3e6474b278337b2a91c3fb6c593498684a7f8103
                       b3cdc1b51d1abc53e437555110ad7ab8a4acc4b5
                       8344abf41e0b559b7c49b635917b508e0d6b7b80
                       3443ebdc1484cd11828c0164c32beee38b99ee46
                       b31040416aa1f28aa6c48c1dc0951d5e03cab43d
                       3ff2847f869176b596da996de58b38aaf2e754dc
                       57cf26e1dde0f3ec484a40418e53fc1532fe9c96
                       cc592a2c004085d4a5d830231176004290f4f3c0
                       7077601289c654d98e04d146a6be141b2dfbdb3f
                       fc4262fb31b880c097421e5ebdc449d40fa8de51
                       dd5484d6114d50f476184a8c1653b5920e95ace5
                       a36905efedc39c77a7dd6df143828e9cd4883468
                       bc0da5546ca0d843a635242d0bb071bd7013677d
                       f09ac847
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8b:0b:88:68:8c:65:ff:dd:0a:1e:b4:e3:42:31:62:36:6e:4d:6a:7b]
            modulus: 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
    public exponent: 10001

] 
2021-06-09 12:16:45.070  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-09 12:16:45.071 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-09 12:16:45.072 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-09 12:16:45.073 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-09 12:16:45.073  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-09 12:16:45.073  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-09 12:16:45.073  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-09 12:16:45.074  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-09 12:16:45.074  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-09 12:16:45.078  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-09 12:16:45.078  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 12:16:45.078  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 12:16:45.098  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-09 12:16:45.186  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-09 12:16:45.187  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-09 12:16:45.187 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-09 12:16:45.188 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-09 12:16:45.189  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1101
2021-06-09 12:16:45.189  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-09 12:16:45.190  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-09 12:16:45.198  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-09 12:16:45.198  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-09 12:16:45.198  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-09 12:16:45.199 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 12:16:45.199 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 12:16:45.199 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 12:16:45.199 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 12:16:45.199 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 12:16:45.200 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 12:16:45.200 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-09 12:16:45.203 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 684508447430913461036280143567379591075134494572
             IssuerDN: UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 09 10:14:07 UTC 2021
           Final Date: Mon Jun 09 10:14:06 UTC 2031
            SubjectDN: UID=c-0ocn8sd8ajmo6zpwp,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [21:f5:3d:a6:d6:67:38:9a:6f:58:03:13:3f:95:7b:3f:10:7e:34:ce]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 364a183690cc5c07630bae8d90991496fdfef715
                       2b2c3cb0ffa90786268d2d8f53aeb0c717a45ff8
                       5a2daf22171ed1b3f7d4abf52eff67aa64a3812e
                       0c916272acdea12a302757a5f2b9ca2fe9108997
                       361d48e0abc03abdc38bfe0ee85c74d15fe59599
                       1dab3350a890994117ee64c08c4c23cc49216c46
                       3e6474b278337b2a91c3fb6c593498684a7f8103
                       b3cdc1b51d1abc53e437555110ad7ab8a4acc4b5
                       8344abf41e0b559b7c49b635917b508e0d6b7b80
                       3443ebdc1484cd11828c0164c32beee38b99ee46
                       b31040416aa1f28aa6c48c1dc0951d5e03cab43d
                       3ff2847f869176b596da996de58b38aaf2e754dc
                       57cf26e1dde0f3ec484a40418e53fc1532fe9c96
                       cc592a2c004085d4a5d830231176004290f4f3c0
                       7077601289c654d98e04d146a6be141b2dfbdb3f
                       fc4262fb31b880c097421e5ebdc449d40fa8de51
                       dd5484d6114d50f476184a8c1653b5920e95ace5
                       a36905efedc39c77a7dd6df143828e9cd4883468
                       bc0da5546ca0d843a635242d0bb071bd7013677d
                       f09ac847
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bf:b9:a3:90:4a:5b:3f:2f:2b:fb:96:c1:22:f7:a8:eb:92:1e:2a:38]
            modulus: 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
    public exponent: 10001

]