2021-04-24 00:20:28,241 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-04-24 00:20:31,921 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-04-24 00:20:34.527  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-04-24 00:20:45.218 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-04-24 00:20:46.226  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-04-24 00:20:46.837  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-04-24 00:20:59.535  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 33.399 seconds (JVM running for 39.991) 2021-04-24 00:21:21.328  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-24 00:21:21.421 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-24 00:21:21.623 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-04-24 00:21:21.627 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-24 00:21:21.722  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-04-24 00:21:21.727  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-24 00:21:21.732  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-24 00:21:21.732  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-24 00:21:21.733  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-24 00:21:21.824  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-24 00:21:21.828  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-24 00:21:22.032  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-24 00:21:22.036  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-24 00:21:22.037  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-24 00:21:22.128  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-24 00:21:23.439  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-24 00:21:23.444  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-24 00:21:23.444 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-24 00:21:23.452 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-24 00:21:23.453  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1635 2021-04-24 00:21:23.453  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-24 00:21:23.521  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-24 00:21:23.522  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-24 00:21:23.528  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-24 00:21:23.529  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-24 00:21:23.530 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-24 00:21:23.530 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-24 00:21:23.531 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-24 00:21:23.623 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-24 00:21:23.624 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-24 00:21:23.624 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-24 00:21:23.631 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-24 00:21:23.741 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 166961891920327901474382146960586393097025796734 IssuerDN: UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 24 00:16:31 UTC 2021 Final Date: Thu Apr 24 00:16:31 UTC 2031 SubjectDN: UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:43:a4:1f:23:e9:97:53:1c:7e:76:0a:d9:fd:58:32:4c:a0:fd:e9] modulus: af4fd22265e522708a259124391619c2f4e3d0d8424d479ab9b8cbb903f69d5b7364ebe717bd5838d4dc35e371ea762892b299c4a16f824a3ff362a8b4be974e71195b30e81cbb0edf46b1165a7147c2e9d89dfacbebe798c84050f1d6f5185a4438f14b30ec6b8a2dae97bc5151c506c3528d9a271d44ce025c7ecfd03197c069d089315340e102e835df51c03b3f58b6c51b56d9ef7f261b8e529d8981a3e394e14b9f58a7b40cea0d244af0f98a28a98f5e72f9e880f1d7a604135bc6b9f14021f60e8dbb9c001e1439c317c7985cbc9a35081d81b2991720256fafd8ffab9706440a0aece1e7feb8e8450c941532288bf4c5c8155359d384e4ccdaec986243b4b36ce68760669b65ff774b999f1641dd1bea9a87789d47a36cf54e4e7ad14ace8218dff63595315317b90b8aa5c284ffca0ced8aa0615c276f696bb217989367b676966034ea3dd33a89c89b0d3d70525759911f8d8ff43f87251e52f8dee08437b00d1681c425c01e71b0f6ce08ae5fa11f0dc5109acbad61aa10e391e9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9e5af217c3839468f22d17a611efcb7243384ada 2d682992bf7076950f94205fe23f6a1f107c6ee1 5a3b45ca0f379dbb2262e0bbf27b87f535e2c88e bc9598351001c23fc059731321f252d70869558b 038c74f3253fc73952746b671cc58ebe40f895a5 e2306bc94918e0a5cdcb7c009c910865d5b2c547 0a1fb587645eb5896b83c4dde94416122590bcda 65d920517af12f735f603cbde5d4ab8ac5cc5d61 0827be5af72765da107db521b96c0e585717c44f 12d4e800964320246290330ad040be9a2201871a bfcf6eef5fdb1f4ad35d490721e4e22f173e8633 298bbb8ebf539f5d8c1967031991958bfdb604ca 8ab494c8fc88eb7b5d11ff978b6438fb31ce8f86 7a116b5e8daec2c849d4b09dd1e905758edd7712 3c118a96805803d2841e8543686445b9386c792c ce469e494164896d9a455abf00201de4f059cdb9 78dffa9e9bd064b3292024e5bfd984088699ff47 aca6ecfbc95633c1868e90a89797188dd3464431 0a408edab7c0882cab8f5724b1262055179924d3 a1ba3afa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [42:b3:41:53:a8:78:5b:d0:e6:ab:46:87:a6:0f:92:9d:dc:e6:0f:2a] modulus: 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 public exponent: 10001 ] 2021-04-24 01:22:27.252  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-24 01:22:27.254 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-24 01:22:27.256 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-24 01:22:27.257 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-24 01:22:27.258  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-24 01:22:27.259  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-24 01:22:27.260  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-24 01:22:27.260  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-24 01:22:27.261  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-24 01:22:27.320  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-24 01:22:27.321  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-24 01:22:27.322  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-24 01:22:27.327  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-24 01:22:27.518  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-24 01:22:27.519  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-24 01:22:27.520 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-24 01:22:27.523 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-24 01:22:27.524  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1635 2021-04-24 01:22:27.524  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-24 01:22:27.526  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-24 01:22:27.527  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-24 01:22:27.528  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-24 01:22:27.528  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-24 01:22:27.529 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-24 01:22:27.529 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-24 01:22:27.529 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-24 01:22:27.531 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-24 01:22:27.531 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-24 01:22:27.532 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-24 01:22:27.533 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-24 01:22:27.537 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 166961891920327901474382146960586393097025796734 IssuerDN: UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 24 00:16:31 UTC 2021 Final Date: Thu Apr 24 00:16:31 UTC 2031 SubjectDN: UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:43:a4:1f:23:e9:97:53:1c:7e:76:0a:d9:fd:58:32:4c:a0:fd:e9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9e5af217c3839468f22d17a611efcb7243384ada 2d682992bf7076950f94205fe23f6a1f107c6ee1 5a3b45ca0f379dbb2262e0bbf27b87f535e2c88e bc9598351001c23fc059731321f252d70869558b 038c74f3253fc73952746b671cc58ebe40f895a5 e2306bc94918e0a5cdcb7c009c910865d5b2c547 0a1fb587645eb5896b83c4dde94416122590bcda 65d920517af12f735f603cbde5d4ab8ac5cc5d61 0827be5af72765da107db521b96c0e585717c44f 12d4e800964320246290330ad040be9a2201871a bfcf6eef5fdb1f4ad35d490721e4e22f173e8633 298bbb8ebf539f5d8c1967031991958bfdb604ca 8ab494c8fc88eb7b5d11ff978b6438fb31ce8f86 7a116b5e8daec2c849d4b09dd1e905758edd7712 3c118a96805803d2841e8543686445b9386c792c ce469e494164896d9a455abf00201de4f059cdb9 78dffa9e9bd064b3292024e5bfd984088699ff47 aca6ecfbc95633c1868e90a89797188dd3464431 0a408edab7c0882cab8f5724b1262055179924d3 a1ba3afa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4a:59:d2:63:73:ff:13:a6:6d:be:6b:5f:32:45:5d:00:31:09:ce:ab] modulus: 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 public exponent: 10001 ] 2021-04-24 01:25:11.356  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-24 01:25:11.357 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-24 01:25:11.358 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-04-24 01:25:11.359 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-24 01:25:11.359  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-04-24 01:25:11.360  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-24 01:25:11.361  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-24 01:25:11.361  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-24 01:25:11.361  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-24 01:25:11.369  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-24 01:25:11.369  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-24 01:25:11.370  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-24 01:25:11.371  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-24 01:25:11.522  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-24 01:25:11.523  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-24 01:25:11.523 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-24 01:25:11.525 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-24 01:25:11.526  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1635 2021-04-24 01:25:11.527  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-24 01:25:11.528  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-24 01:25:11.529  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-24 01:25:11.529  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-24 01:25:11.529  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-24 01:25:11.530 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-24 01:25:11.530 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-24 01:25:11.531 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-24 01:25:11.531 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-24 01:25:11.532 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-24 01:25:11.532 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-24 01:25:11.533 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-24 01:25:11.536 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 166961891920327901474382146960586393097025796734 IssuerDN: UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 24 00:16:31 UTC 2021 Final Date: Thu Apr 24 00:16:31 UTC 2031 SubjectDN: UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:43:a4:1f:23:e9:97:53:1c:7e:76:0a:d9:fd:58:32:4c:a0:fd:e9] modulus: af4fd22265e522708a259124391619c2f4e3d0d8424d479ab9b8cbb903f69d5b7364ebe717bd5838d4dc35e371ea762892b299c4a16f824a3ff362a8b4be974e71195b30e81cbb0edf46b1165a7147c2e9d89dfacbebe798c84050f1d6f5185a4438f14b30ec6b8a2dae97bc5151c506c3528d9a271d44ce025c7ecfd03197c069d089315340e102e835df51c03b3f58b6c51b56d9ef7f261b8e529d8981a3e394e14b9f58a7b40cea0d244af0f98a28a98f5e72f9e880f1d7a604135bc6b9f14021f60e8dbb9c001e1439c317c7985cbc9a35081d81b2991720256fafd8ffab9706440a0aece1e7feb8e8450c941532288bf4c5c8155359d384e4ccdaec986243b4b36ce68760669b65ff774b999f1641dd1bea9a87789d47a36cf54e4e7ad14ace8218dff63595315317b90b8aa5c284ffca0ced8aa0615c276f696bb217989367b676966034ea3dd33a89c89b0d3d70525759911f8d8ff43f87251e52f8dee08437b00d1681c425c01e71b0f6ce08ae5fa11f0dc5109acbad61aa10e391e9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9e5af217c3839468f22d17a611efcb7243384ada 2d682992bf7076950f94205fe23f6a1f107c6ee1 5a3b45ca0f379dbb2262e0bbf27b87f535e2c88e bc9598351001c23fc059731321f252d70869558b 038c74f3253fc73952746b671cc58ebe40f895a5 e2306bc94918e0a5cdcb7c009c910865d5b2c547 0a1fb587645eb5896b83c4dde94416122590bcda 65d920517af12f735f603cbde5d4ab8ac5cc5d61 0827be5af72765da107db521b96c0e585717c44f 12d4e800964320246290330ad040be9a2201871a bfcf6eef5fdb1f4ad35d490721e4e22f173e8633 298bbb8ebf539f5d8c1967031991958bfdb604ca 8ab494c8fc88eb7b5d11ff978b6438fb31ce8f86 7a116b5e8daec2c849d4b09dd1e905758edd7712 3c118a96805803d2841e8543686445b9386c792c ce469e494164896d9a455abf00201de4f059cdb9 78dffa9e9bd064b3292024e5bfd984088699ff47 aca6ecfbc95633c1868e90a89797188dd3464431 0a408edab7c0882cab8f5724b1262055179924d3 a1ba3afa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d5:2a:38:e2:e8:78:dc:11:6b:c5:33:c1:4c:7a:98:9c:13:14:5e:ae] modulus: 8c7a7390f95d813e6f3d4bff73453cbc0f88b2e4085a6e3120839f73a6b59616552c71bb7fee6324a77319c6f155ccfe4db1ecbc23edc287ad8cea4b55bb016654239fdab8ff3dd565347515d25dd5447b36d437035f9a0038b1782c65f940d13a70b4eadcf9a258d7ee150473bee73e7651d7136ca7fc92263a335b251278a036a5b65f6a63f19e4ca58ef3fd25165d8d06c160588d1bbddfedeb3859b96b533daa45b42913bacc0723a31b25fc297285da429f7d8a3ec87e73300d51f1b47f2ffecace01eff9b244655f39c106196ec70817c9e92676eba406ae277bd1184680cb2195a6a72409cbfff2c9ce28551e13ea6e49b994d0c7d64d63838195c1f3 public exponent: 10001 ] 2021-04-24 01:27:10.941  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-24 01:27:10.942 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-24 01:27:10.943 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-24 01:27:10.944 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-24 01:27:10.945  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-24 01:27:10.945  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-24 01:27:10.946  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-24 01:27:10.946  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-24 01:27:10.947  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-24 01:27:11.018  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-24 01:27:11.019  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-24 01:27:11.019  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-24 01:27:11.021  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-24 01:27:11.126  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-24 01:27:11.127  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-24 01:27:11.127 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-24 01:27:11.129 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-24 01:27:11.129  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1635 2021-04-24 01:27:11.130  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-24 01:27:11.131  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-24 01:27:11.131  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-24 01:27:11.132  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-24 01:27:11.132  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-24 01:27:11.133 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-24 01:27:11.133 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-24 01:27:11.133 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-24 01:27:11.134 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-24 01:27:11.134 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-24 01:27:11.135 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-24 01:27:11.135 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-24 01:27:11.138 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 166961891920327901474382146960586393097025796734 IssuerDN: UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 24 00:16:31 UTC 2021 Final Date: Thu Apr 24 00:16:31 UTC 2031 SubjectDN: UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:43:a4:1f:23:e9:97:53:1c:7e:76:0a:d9:fd:58:32:4c:a0:fd:e9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9e5af217c3839468f22d17a611efcb7243384ada 2d682992bf7076950f94205fe23f6a1f107c6ee1 5a3b45ca0f379dbb2262e0bbf27b87f535e2c88e bc9598351001c23fc059731321f252d70869558b 038c74f3253fc73952746b671cc58ebe40f895a5 e2306bc94918e0a5cdcb7c009c910865d5b2c547 0a1fb587645eb5896b83c4dde94416122590bcda 65d920517af12f735f603cbde5d4ab8ac5cc5d61 0827be5af72765da107db521b96c0e585717c44f 12d4e800964320246290330ad040be9a2201871a bfcf6eef5fdb1f4ad35d490721e4e22f173e8633 298bbb8ebf539f5d8c1967031991958bfdb604ca 8ab494c8fc88eb7b5d11ff978b6438fb31ce8f86 7a116b5e8daec2c849d4b09dd1e905758edd7712 3c118a96805803d2841e8543686445b9386c792c ce469e494164896d9a455abf00201de4f059cdb9 78dffa9e9bd064b3292024e5bfd984088699ff47 aca6ecfbc95633c1868e90a89797188dd3464431 0a408edab7c0882cab8f5724b1262055179924d3 a1ba3afa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bf:7e:bb:47:9c:b1:5d:b1:3b:52:03:7f:32:98:82:a1:3b:9c:3a:05] modulus: 99f9f2d6934b1d80d3df275f70a2e92376a4ca6ce09c26cfc5be0bb72e285e2fab40f09a3ce8dbc9a1234e9cd076cdd004d77baec07aab96fc1637f939b1bbc00762e4f9ddcdb07c1fd10ef8ee18ac371c7e7a5895e69106511988fbb6d0e722eb1d5b71b81af58c99ddb3f94713cbf8560041d5b35e9b35741d2f5d14f42f7c20b3c9eae327aab12dffa48fb6e69a7ed58d2db9996db9c4acbf178ce2fac944a456ecfcbfcfe720982e25a636b6cc762fcb072ba9e85a37bb7a664507e3ba146fd592132490b2b2b720dc2dad85c9090ee1cb9eadee5995e44356adda66e0b4e923fc410d003495c18fcded0da314f168352722e594a8292b121ba6568e5b3b public exponent: 10001 ] 2021-04-24 01:27:49.313  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-24 01:27:49.314 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-24 01:27:49.315 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-04-24 01:27:49.315 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-24 01:27:49.316  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-04-24 01:27:49.316  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-24 01:27:49.316  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-24 01:27:49.317  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-24 01:27:49.317  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-24 01:27:49.321  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-24 01:27:49.322  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-24 01:27:49.322  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-24 01:27:49.324  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-24 01:27:49.437  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-24 01:27:49.438  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-24 01:27:49.438 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-24 01:27:49.439 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-24 01:27:49.440  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1635 2021-04-24 01:27:49.440  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-24 01:27:49.442  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-24 01:27:49.442  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-24 01:27:49.442  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-24 01:27:49.443  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-24 01:27:49.443 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-24 01:27:49.443 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-24 01:27:49.444 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-24 01:27:49.444 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-24 01:27:49.445 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-24 01:27:49.445 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-24 01:27:49.446 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-24 01:27:49.449 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 166961891920327901474382146960586393097025796734 IssuerDN: UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 24 00:16:31 UTC 2021 Final Date: Thu Apr 24 00:16:31 UTC 2031 SubjectDN: UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:43:a4:1f:23:e9:97:53:1c:7e:76:0a:d9:fd:58:32:4c:a0:fd:e9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9e5af217c3839468f22d17a611efcb7243384ada 2d682992bf7076950f94205fe23f6a1f107c6ee1 5a3b45ca0f379dbb2262e0bbf27b87f535e2c88e bc9598351001c23fc059731321f252d70869558b 038c74f3253fc73952746b671cc58ebe40f895a5 e2306bc94918e0a5cdcb7c009c910865d5b2c547 0a1fb587645eb5896b83c4dde94416122590bcda 65d920517af12f735f603cbde5d4ab8ac5cc5d61 0827be5af72765da107db521b96c0e585717c44f 12d4e800964320246290330ad040be9a2201871a bfcf6eef5fdb1f4ad35d490721e4e22f173e8633 298bbb8ebf539f5d8c1967031991958bfdb604ca 8ab494c8fc88eb7b5d11ff978b6438fb31ce8f86 7a116b5e8daec2c849d4b09dd1e905758edd7712 3c118a96805803d2841e8543686445b9386c792c ce469e494164896d9a455abf00201de4f059cdb9 78dffa9e9bd064b3292024e5bfd984088699ff47 aca6ecfbc95633c1868e90a89797188dd3464431 0a408edab7c0882cab8f5724b1262055179924d3 a1ba3afa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [03:fc:26:f9:f3:7b:bd:4e:09:b4:bc:6f:c2:9c:a6:4c:c9:23:73:7a] modulus: 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 public exponent: 10001 ] 2021-04-24 01:28:16.852  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-24 01:28:16.853 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-24 01:28:16.854 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-04-24 01:28:16.856 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-24 01:28:16.856  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-04-24 01:28:16.857  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-24 01:28:16.857  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-24 01:28:16.857  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-24 01:28:16.858  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-24 01:28:16.864  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-24 01:28:16.865  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-24 01:28:16.865  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-24 01:28:16.866  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-24 01:28:16.969  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-24 01:28:16.970  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-24 01:28:16.970 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-24 01:28:16.972 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-24 01:28:16.972  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1635 2021-04-24 01:28:16.973  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-24 01:28:16.974  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-24 01:28:16.974  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-24 01:28:16.975  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-24 01:28:16.976  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-24 01:28:16.976 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-24 01:28:16.976 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-24 01:28:16.977 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-24 01:28:16.977 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-24 01:28:16.977 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-24 01:28:16.978 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-24 01:28:16.978 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-24 01:28:16.985 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 166961891920327901474382146960586393097025796734 IssuerDN: UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 24 00:16:31 UTC 2021 Final Date: Thu Apr 24 00:16:31 UTC 2031 SubjectDN: UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:43:a4:1f:23:e9:97:53:1c:7e:76:0a:d9:fd:58:32:4c:a0:fd:e9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9e5af217c3839468f22d17a611efcb7243384ada 2d682992bf7076950f94205fe23f6a1f107c6ee1 5a3b45ca0f379dbb2262e0bbf27b87f535e2c88e bc9598351001c23fc059731321f252d70869558b 038c74f3253fc73952746b671cc58ebe40f895a5 e2306bc94918e0a5cdcb7c009c910865d5b2c547 0a1fb587645eb5896b83c4dde94416122590bcda 65d920517af12f735f603cbde5d4ab8ac5cc5d61 0827be5af72765da107db521b96c0e585717c44f 12d4e800964320246290330ad040be9a2201871a bfcf6eef5fdb1f4ad35d490721e4e22f173e8633 298bbb8ebf539f5d8c1967031991958bfdb604ca 8ab494c8fc88eb7b5d11ff978b6438fb31ce8f86 7a116b5e8daec2c849d4b09dd1e905758edd7712 3c118a96805803d2841e8543686445b9386c792c ce469e494164896d9a455abf00201de4f059cdb9 78dffa9e9bd064b3292024e5bfd984088699ff47 aca6ecfbc95633c1868e90a89797188dd3464431 0a408edab7c0882cab8f5724b1262055179924d3 a1ba3afa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [08:15:a2:56:e7:fb:31:bd:fb:12:6f:98:5f:11:70:d5:60:75:e2:ce] modulus: a11635a69ad74e391095103bca65d9a5a164ffc3c13a68799f56397eb8882523433b83b6fc83087dca031b8624b1681ebc2f4b9adcf47c2b95b7b1e518ade462341a69a3f0e0fcb06c27134f183741cb54dc1c3d281cea6d2886d9a951dc7a811946391840cfce030c40ae7e0fc1ba4813f3cf0af7ee1ab998a0ce14cfc338d46a10b7d2332f479dd6210b9efa64c8764781c555a83b1b2f18463f254a97204d90fe354f6daf402db3cbc46b53a4a1ec15194d5f6f2502d1e2e9cc0d87ba74ae71e45f0c31c7453a5272da2d5f33eaddc66f068999a6c50b6bf97b1d2e4661357717a3b5c439b8365d6ceb0f5f8c33f58339f5f95284e31df68359bf8abf43ed public exponent: 10001 ] 2021-04-24 01:28:17.652  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-24 01:28:17.653 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-24 01:28:17.654 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-24 01:28:17.655 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-24 01:28:17.656  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-24 01:28:17.657  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-24 01:28:17.657  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-24 01:28:17.658  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-24 01:28:17.658  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-24 01:28:17.665  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-24 01:28:17.666  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-24 01:28:17.666  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-24 01:28:17.667  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-24 01:28:17.718  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-24 01:28:17.719  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-24 01:28:17.720 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-24 01:28:17.721 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-24 01:28:17.722  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1635 2021-04-24 01:28:17.722  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-24 01:28:17.724  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-24 01:28:17.725  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-24 01:28:17.725  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-24 01:28:17.726  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-24 01:28:17.726 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-24 01:28:17.726 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-24 01:28:17.727 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-24 01:28:17.728 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-24 01:28:17.729 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-24 01:28:17.729 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-24 01:28:17.730 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-24 01:28:17.734 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 166961891920327901474382146960586393097025796734 IssuerDN: UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 24 00:16:31 UTC 2021 Final Date: Thu Apr 24 00:16:31 UTC 2031 SubjectDN: UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:43:a4:1f:23:e9:97:53:1c:7e:76:0a:d9:fd:58:32:4c:a0:fd:e9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9e5af217c3839468f22d17a611efcb7243384ada 2d682992bf7076950f94205fe23f6a1f107c6ee1 5a3b45ca0f379dbb2262e0bbf27b87f535e2c88e bc9598351001c23fc059731321f252d70869558b 038c74f3253fc73952746b671cc58ebe40f895a5 e2306bc94918e0a5cdcb7c009c910865d5b2c547 0a1fb587645eb5896b83c4dde94416122590bcda 65d920517af12f735f603cbde5d4ab8ac5cc5d61 0827be5af72765da107db521b96c0e585717c44f 12d4e800964320246290330ad040be9a2201871a bfcf6eef5fdb1f4ad35d490721e4e22f173e8633 298bbb8ebf539f5d8c1967031991958bfdb604ca 8ab494c8fc88eb7b5d11ff978b6438fb31ce8f86 7a116b5e8daec2c849d4b09dd1e905758edd7712 3c118a96805803d2841e8543686445b9386c792c ce469e494164896d9a455abf00201de4f059cdb9 78dffa9e9bd064b3292024e5bfd984088699ff47 aca6ecfbc95633c1868e90a89797188dd3464431 0a408edab7c0882cab8f5724b1262055179924d3 a1ba3afa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e1:61:40:09:3e:7b:90:45:27:e4:d4:ab:40:a5:e4:22:fb:1b:c6:50] modulus: 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 public exponent: 10001 ] 2021-04-24 01:29:49.298  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-24 01:29:49.299 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-24 01:29:49.301 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-04-24 01:29:49.301 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-24 01:29:49.301  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-04-24 01:29:49.302  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-24 01:29:49.302  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-24 01:29:49.303  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-24 01:29:49.303  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-24 01:29:49.307  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-24 01:29:49.308  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-24 01:29:49.308  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-24 01:29:49.309  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-24 01:29:49.411  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-24 01:29:49.411  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-24 01:29:49.411 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-24 01:29:49.413 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-24 01:29:49.413  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1635 2021-04-24 01:29:49.413  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-24 01:29:49.415  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-24 01:29:49.416  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-24 01:29:49.416  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-24 01:29:49.416  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-24 01:29:49.417 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-24 01:29:49.417 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-24 01:29:49.417 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-24 01:29:49.418 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-24 01:29:49.418 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-24 01:29:49.418 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-24 01:29:49.419 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-24 01:29:49.422 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 166961891920327901474382146960586393097025796734 IssuerDN: UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 24 00:16:31 UTC 2021 Final Date: Thu Apr 24 00:16:31 UTC 2031 SubjectDN: UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:43:a4:1f:23:e9:97:53:1c:7e:76:0a:d9:fd:58:32:4c:a0:fd:e9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9e5af217c3839468f22d17a611efcb7243384ada 2d682992bf7076950f94205fe23f6a1f107c6ee1 5a3b45ca0f379dbb2262e0bbf27b87f535e2c88e bc9598351001c23fc059731321f252d70869558b 038c74f3253fc73952746b671cc58ebe40f895a5 e2306bc94918e0a5cdcb7c009c910865d5b2c547 0a1fb587645eb5896b83c4dde94416122590bcda 65d920517af12f735f603cbde5d4ab8ac5cc5d61 0827be5af72765da107db521b96c0e585717c44f 12d4e800964320246290330ad040be9a2201871a bfcf6eef5fdb1f4ad35d490721e4e22f173e8633 298bbb8ebf539f5d8c1967031991958bfdb604ca 8ab494c8fc88eb7b5d11ff978b6438fb31ce8f86 7a116b5e8daec2c849d4b09dd1e905758edd7712 3c118a96805803d2841e8543686445b9386c792c ce469e494164896d9a455abf00201de4f059cdb9 78dffa9e9bd064b3292024e5bfd984088699ff47 aca6ecfbc95633c1868e90a89797188dd3464431 0a408edab7c0882cab8f5724b1262055179924d3 a1ba3afa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4b:2f:28:c0:6d:3d:74:a0:de:2b:21:e4:46:b9:62:5e:ba:24:b5:6a] modulus: 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 public exponent: 10001 ] 2021-04-24 01:30:22.381  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-24 01:30:22.383 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-24 01:30:22.384 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-04-24 01:30:22.384 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-24 01:30:22.385  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-04-24 01:30:22.385  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-24 01:30:22.386  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-24 01:30:22.386  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-24 01:30:22.387  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-24 01:30:22.391  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-24 01:30:22.391  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-24 01:30:22.392  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-24 01:30:22.393  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-24 01:30:22.518  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-24 01:30:22.519  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-24 01:30:22.519 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-24 01:30:22.520 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-24 01:30:22.521  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1635 2021-04-24 01:30:22.521  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-24 01:30:22.522  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-24 01:30:22.523  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-24 01:30:22.523  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-24 01:30:22.523  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-24 01:30:22.524 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-24 01:30:22.524 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-24 01:30:22.524 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-24 01:30:22.525 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-24 01:30:22.525 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-24 01:30:22.526 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-24 01:30:22.526 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-24 01:30:22.529 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 166961891920327901474382146960586393097025796734 IssuerDN: UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 24 00:16:31 UTC 2021 Final Date: Thu Apr 24 00:16:31 UTC 2031 SubjectDN: UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:43:a4:1f:23:e9:97:53:1c:7e:76:0a:d9:fd:58:32:4c:a0:fd:e9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9e5af217c3839468f22d17a611efcb7243384ada 2d682992bf7076950f94205fe23f6a1f107c6ee1 5a3b45ca0f379dbb2262e0bbf27b87f535e2c88e bc9598351001c23fc059731321f252d70869558b 038c74f3253fc73952746b671cc58ebe40f895a5 e2306bc94918e0a5cdcb7c009c910865d5b2c547 0a1fb587645eb5896b83c4dde94416122590bcda 65d920517af12f735f603cbde5d4ab8ac5cc5d61 0827be5af72765da107db521b96c0e585717c44f 12d4e800964320246290330ad040be9a2201871a bfcf6eef5fdb1f4ad35d490721e4e22f173e8633 298bbb8ebf539f5d8c1967031991958bfdb604ca 8ab494c8fc88eb7b5d11ff978b6438fb31ce8f86 7a116b5e8daec2c849d4b09dd1e905758edd7712 3c118a96805803d2841e8543686445b9386c792c ce469e494164896d9a455abf00201de4f059cdb9 78dffa9e9bd064b3292024e5bfd984088699ff47 aca6ecfbc95633c1868e90a89797188dd3464431 0a408edab7c0882cab8f5724b1262055179924d3 a1ba3afa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c6:cf:3d:80:5d:fa:8c:f1:45:e6:f2:6d:3d:b0:e0:e5:7d:0c:18:d7] modulus: 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 public exponent: 10001 ] 2021-04-24 01:32:31.379  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-24 01:32:31.380 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-24 01:32:31.381 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-24 01:32:31.381 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-24 01:32:31.382  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-24 01:32:31.382  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-24 01:32:31.382  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-24 01:32:31.383  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-24 01:32:31.383  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-24 01:32:31.387  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-24 01:32:31.388  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-24 01:32:31.388  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-24 01:32:31.389  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-24 01:32:31.487  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-24 01:32:31.488  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-24 01:32:31.488 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-24 01:32:31.490 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-24 01:32:31.491  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1635 2021-04-24 01:32:31.491  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-24 01:32:31.493  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-24 01:32:31.493  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-24 01:32:31.494  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-24 01:32:31.494  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-24 01:32:31.495 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-24 01:32:31.495 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-24 01:32:31.495 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-24 01:32:31.496 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-24 01:32:31.496 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-24 01:32:31.496 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-24 01:32:31.497 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-24 01:32:31.499 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 166961891920327901474382146960586393097025796734 IssuerDN: UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 24 00:16:31 UTC 2021 Final Date: Thu Apr 24 00:16:31 UTC 2031 SubjectDN: UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:43:a4:1f:23:e9:97:53:1c:7e:76:0a:d9:fd:58:32:4c:a0:fd:e9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9e5af217c3839468f22d17a611efcb7243384ada 2d682992bf7076950f94205fe23f6a1f107c6ee1 5a3b45ca0f379dbb2262e0bbf27b87f535e2c88e bc9598351001c23fc059731321f252d70869558b 038c74f3253fc73952746b671cc58ebe40f895a5 e2306bc94918e0a5cdcb7c009c910865d5b2c547 0a1fb587645eb5896b83c4dde94416122590bcda 65d920517af12f735f603cbde5d4ab8ac5cc5d61 0827be5af72765da107db521b96c0e585717c44f 12d4e800964320246290330ad040be9a2201871a bfcf6eef5fdb1f4ad35d490721e4e22f173e8633 298bbb8ebf539f5d8c1967031991958bfdb604ca 8ab494c8fc88eb7b5d11ff978b6438fb31ce8f86 7a116b5e8daec2c849d4b09dd1e905758edd7712 3c118a96805803d2841e8543686445b9386c792c ce469e494164896d9a455abf00201de4f059cdb9 78dffa9e9bd064b3292024e5bfd984088699ff47 aca6ecfbc95633c1868e90a89797188dd3464431 0a408edab7c0882cab8f5724b1262055179924d3 a1ba3afa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b8:ff:d3:19:29:3c:20:a7:ca:47:87:6d:8a:c5:4d:06:4d:0c:8a:67] modulus: c251918f650226c3d30985cbacc05da443b7de97dae984108f7996289a0897b25e07e59ff4ecf7b36699980009ddbd9f835960570dbc2aa6a35d87f3859ad7041f44df9adfb628dc7bed96de8a6ba179f19211dc9968d4f0a15e3d2ce77df337e96bc0aa359df0f1bdfc62d0ee5d49bebd2bf851527cba289d238fba0266ed676a14b7ce163bed92b79ebbc51530f4d2217e6ef9abede118587fa059c76e4a202e792740ace115e5fdd5841bd5493e8ef94e8ad79bd7d3e0ab4e59114b8c72ea29e5e9cda8cb29d5c4d796c1cba945aeb912a6980caa7a66ce9a010c23b1136d0e576d05fb765bde3684d3d4160f922564ee5816fe70fe7a7004be3c8a541347 public exponent: 10001 ] 2021-04-24 01:34:57.310  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-24 01:34:57.311 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-24 01:34:57.312 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-24 01:34:57.312 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-24 01:34:57.312  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-24 01:34:57.313  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-24 01:34:57.313  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-24 01:34:57.313  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-24 01:34:57.314  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-24 01:34:57.318  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-24 01:34:57.318  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-24 01:34:57.318  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-24 01:34:57.319  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-24 01:34:57.407  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-24 01:34:57.408  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-24 01:34:57.408 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-24 01:34:57.410 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-24 01:34:57.410  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1635 2021-04-24 01:34:57.410  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-24 01:34:57.412  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-24 01:34:57.412  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-24 01:34:57.412  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-24 01:34:57.412  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-24 01:34:57.413 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-24 01:34:57.413 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-24 01:34:57.413 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-24 01:34:57.414 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-24 01:34:57.414 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-24 01:34:57.414 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-24 01:34:57.414 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-24 01:34:57.417 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 166961891920327901474382146960586393097025796734 IssuerDN: UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 24 00:16:31 UTC 2021 Final Date: Thu Apr 24 00:16:31 UTC 2031 SubjectDN: UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:43:a4:1f:23:e9:97:53:1c:7e:76:0a:d9:fd:58:32:4c:a0:fd:e9] modulus: af4fd22265e522708a259124391619c2f4e3d0d8424d479ab9b8cbb903f69d5b7364ebe717bd5838d4dc35e371ea762892b299c4a16f824a3ff362a8b4be974e71195b30e81cbb0edf46b1165a7147c2e9d89dfacbebe798c84050f1d6f5185a4438f14b30ec6b8a2dae97bc5151c506c3528d9a271d44ce025c7ecfd03197c069d089315340e102e835df51c03b3f58b6c51b56d9ef7f261b8e529d8981a3e394e14b9f58a7b40cea0d244af0f98a28a98f5e72f9e880f1d7a604135bc6b9f14021f60e8dbb9c001e1439c317c7985cbc9a35081d81b2991720256fafd8ffab9706440a0aece1e7feb8e8450c941532288bf4c5c8155359d384e4ccdaec986243b4b36ce68760669b65ff774b999f1641dd1bea9a87789d47a36cf54e4e7ad14ace8218dff63595315317b90b8aa5c284ffca0ced8aa0615c276f696bb217989367b676966034ea3dd33a89c89b0d3d70525759911f8d8ff43f87251e52f8dee08437b00d1681c425c01e71b0f6ce08ae5fa11f0dc5109acbad61aa10e391e9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9e5af217c3839468f22d17a611efcb7243384ada 2d682992bf7076950f94205fe23f6a1f107c6ee1 5a3b45ca0f379dbb2262e0bbf27b87f535e2c88e bc9598351001c23fc059731321f252d70869558b 038c74f3253fc73952746b671cc58ebe40f895a5 e2306bc94918e0a5cdcb7c009c910865d5b2c547 0a1fb587645eb5896b83c4dde94416122590bcda 65d920517af12f735f603cbde5d4ab8ac5cc5d61 0827be5af72765da107db521b96c0e585717c44f 12d4e800964320246290330ad040be9a2201871a bfcf6eef5fdb1f4ad35d490721e4e22f173e8633 298bbb8ebf539f5d8c1967031991958bfdb604ca 8ab494c8fc88eb7b5d11ff978b6438fb31ce8f86 7a116b5e8daec2c849d4b09dd1e905758edd7712 3c118a96805803d2841e8543686445b9386c792c ce469e494164896d9a455abf00201de4f059cdb9 78dffa9e9bd064b3292024e5bfd984088699ff47 aca6ecfbc95633c1868e90a89797188dd3464431 0a408edab7c0882cab8f5724b1262055179924d3 a1ba3afa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2e:dc:bb:32:54:8d:b5:3d:27:a5:04:29:f8:c8:da:3d:b7:a0:2d:80] modulus: 8a529c710faafff34b5a9266faf62e4d1bd57f8375c3fc3d151c38f07eca93462b28b3410a5e9b9ad8d3d3fdea7af37619bb478878c981a3c54fc0fe3d60acce9608dfb5b9b26bd3b559431cdc312d6e76cee8f7d9d90755528aea9327eb35afbe05e38c72468b95fe752cf7f65582e9b793fd04e5dd79dd3744cc9ee774476bf6b398ddf69e2f43e9bc3c718a09bf5d9d3025440cb16cfe02fba8ac910c0f6bb97cc3ab1c8175f3bfc49354d5454ef610897476ac6529f17a567950ece16ff646612fa95fed9eb35f22b55518e849de86464620a8c8cb0f87f363f82cbb76f92eda15f3682e0e38366a2c6392be554abe3075a5caff0bd97794505c6a33fc7d public exponent: 10001 ] 2021-04-24 01:36:32.497  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-24 01:36:32.498 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-24 01:36:32.500 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-24 01:36:32.500 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-24 01:36:32.500  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-24 01:36:32.501  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-24 01:36:32.501  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-24 01:36:32.501  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-24 01:36:32.502  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-24 01:36:32.507  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-24 01:36:32.507  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-24 01:36:32.507  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-24 01:36:32.509  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-24 01:36:32.612  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-24 01:36:32.612  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-24 01:36:32.613 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-24 01:36:32.618 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-24 01:36:32.618  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1635 2021-04-24 01:36:32.619  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-24 01:36:32.620  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-24 01:36:32.620  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-24 01:36:32.621  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-24 01:36:32.621  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-24 01:36:32.622 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-24 01:36:32.622 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-24 01:36:32.622 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-24 01:36:32.623 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-24 01:36:32.623 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-24 01:36:32.623 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-24 01:36:32.624 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-24 01:36:32.626 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 166961891920327901474382146960586393097025796734 IssuerDN: UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 24 00:16:31 UTC 2021 Final Date: Thu Apr 24 00:16:31 UTC 2031 SubjectDN: UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:43:a4:1f:23:e9:97:53:1c:7e:76:0a:d9:fd:58:32:4c:a0:fd:e9] modulus: af4fd22265e522708a259124391619c2f4e3d0d8424d479ab9b8cbb903f69d5b7364ebe717bd5838d4dc35e371ea762892b299c4a16f824a3ff362a8b4be974e71195b30e81cbb0edf46b1165a7147c2e9d89dfacbebe798c84050f1d6f5185a4438f14b30ec6b8a2dae97bc5151c506c3528d9a271d44ce025c7ecfd03197c069d089315340e102e835df51c03b3f58b6c51b56d9ef7f261b8e529d8981a3e394e14b9f58a7b40cea0d244af0f98a28a98f5e72f9e880f1d7a604135bc6b9f14021f60e8dbb9c001e1439c317c7985cbc9a35081d81b2991720256fafd8ffab9706440a0aece1e7feb8e8450c941532288bf4c5c8155359d384e4ccdaec986243b4b36ce68760669b65ff774b999f1641dd1bea9a87789d47a36cf54e4e7ad14ace8218dff63595315317b90b8aa5c284ffca0ced8aa0615c276f696bb217989367b676966034ea3dd33a89c89b0d3d70525759911f8d8ff43f87251e52f8dee08437b00d1681c425c01e71b0f6ce08ae5fa11f0dc5109acbad61aa10e391e9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9e5af217c3839468f22d17a611efcb7243384ada 2d682992bf7076950f94205fe23f6a1f107c6ee1 5a3b45ca0f379dbb2262e0bbf27b87f535e2c88e bc9598351001c23fc059731321f252d70869558b 038c74f3253fc73952746b671cc58ebe40f895a5 e2306bc94918e0a5cdcb7c009c910865d5b2c547 0a1fb587645eb5896b83c4dde94416122590bcda 65d920517af12f735f603cbde5d4ab8ac5cc5d61 0827be5af72765da107db521b96c0e585717c44f 12d4e800964320246290330ad040be9a2201871a bfcf6eef5fdb1f4ad35d490721e4e22f173e8633 298bbb8ebf539f5d8c1967031991958bfdb604ca 8ab494c8fc88eb7b5d11ff978b6438fb31ce8f86 7a116b5e8daec2c849d4b09dd1e905758edd7712 3c118a96805803d2841e8543686445b9386c792c ce469e494164896d9a455abf00201de4f059cdb9 78dffa9e9bd064b3292024e5bfd984088699ff47 aca6ecfbc95633c1868e90a89797188dd3464431 0a408edab7c0882cab8f5724b1262055179924d3 a1ba3afa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f5:3c:69:09:69:b7:d3:9a:e4:12:aa:62:c4:52:98:b2:c7:30:79:98] modulus: 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 public exponent: 10001 ] 2021-04-24 01:37:55.349  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-24 01:37:55.352 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-24 01:37:55.355 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-24 01:37:55.357 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-24 01:37:55.357  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-24 01:37:55.362  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-24 01:37:55.363  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-24 01:37:55.365  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-24 01:37:55.365  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-24 01:37:55.369  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-24 01:37:55.417  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-24 01:37:55.418  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-24 01:37:55.420  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-24 01:37:55.495  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-24 01:37:55.495  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-24 01:37:55.496 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-24 01:37:55.497 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-24 01:37:55.497  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1635 2021-04-24 01:37:55.498  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-24 01:37:55.499  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-24 01:37:55.500  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-24 01:37:55.500  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-24 01:37:55.517  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-24 01:37:55.518 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-24 01:37:55.518 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-24 01:37:55.519 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-24 01:37:55.519 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-24 01:37:55.520 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-24 01:37:55.520 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-24 01:37:55.521 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-24 01:37:55.524 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 166961891920327901474382146960586393097025796734 IssuerDN: UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 24 00:16:31 UTC 2021 Final Date: Thu Apr 24 00:16:31 UTC 2031 SubjectDN: UID=c-0dace803557152a93,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:43:a4:1f:23:e9:97:53:1c:7e:76:0a:d9:fd:58:32:4c:a0:fd:e9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9e5af217c3839468f22d17a611efcb7243384ada 2d682992bf7076950f94205fe23f6a1f107c6ee1 5a3b45ca0f379dbb2262e0bbf27b87f535e2c88e bc9598351001c23fc059731321f252d70869558b 038c74f3253fc73952746b671cc58ebe40f895a5 e2306bc94918e0a5cdcb7c009c910865d5b2c547 0a1fb587645eb5896b83c4dde94416122590bcda 65d920517af12f735f603cbde5d4ab8ac5cc5d61 0827be5af72765da107db521b96c0e585717c44f 12d4e800964320246290330ad040be9a2201871a bfcf6eef5fdb1f4ad35d490721e4e22f173e8633 298bbb8ebf539f5d8c1967031991958bfdb604ca 8ab494c8fc88eb7b5d11ff978b6438fb31ce8f86 7a116b5e8daec2c849d4b09dd1e905758edd7712 3c118a96805803d2841e8543686445b9386c792c ce469e494164896d9a455abf00201de4f059cdb9 78dffa9e9bd064b3292024e5bfd984088699ff47 aca6ecfbc95633c1868e90a89797188dd3464431 0a408edab7c0882cab8f5724b1262055179924d3 a1ba3afa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d8:2b:24:ed:8e:df:23:00:9b:ea:72:cd:70:44:f8:0c:84:7e:c2:ed] modulus: 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 public exponent: 10001 ]