2021-05-02 00:10:01,679 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-05-02 00:10:06,167 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-05-02 00:10:09.283  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-05-02 00:10:22.367 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-05-02 00:10:23.576  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-05-02 00:10:24.278  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-05-02 00:10:40.488  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 41.411 seconds (JVM running for 49.428) 2021-05-02 00:24:17.483  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-02 00:24:17.565 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-02 00:24:17.865 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-02 00:24:17.871 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-02 00:24:17.973  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-02 00:24:17.977  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-02 00:24:18.069  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-02 00:24:18.071  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-02 00:24:18.072  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-02 00:24:18.165  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-02 00:24:18.171  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-02 00:24:18.568  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-02 00:24:18.576  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-02 00:24:18.577  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-02 00:24:18.868  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-02 00:24:20.128  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-02 00:24:20.131  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-02 00:24:20.132 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-02 00:24:20.137 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-02 00:24:20.139  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1862 2021-05-02 00:24:20.139  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-02 00:24:20.165  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-02 00:24:20.166  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-02 00:24:20.174  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-02 00:24:20.176  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-02 00:24:20.177 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-02 00:24:20.177 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-02 00:24:20.178 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-02 00:24:20.267 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-02 00:24:20.268 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-02 00:24:20.269 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-02 00:24:20.277 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-02 00:24:20.383 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 184536894123995479129426137609518679886773563462 IssuerDN: UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 02 00:01:47 UTC 2021 Final Date: Fri May 02 00:01:47 UTC 2031 SubjectDN: UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9b:93:ef:29:ae:7d:27:99:ae:44:b5:2c:fb:58:9f:b7:5f:09:4b:62] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a8c3f6c9a60d49d6ff3e81ae95945e69e3bbeb24 b3986d8d382aaedc21b26dced0382eeb50566402 7ecf07db5b93f162b4f1a6bcef606bea9393e694 98d05c53fb1ba59e77d7dbd4d618eb9f78ecba69 96eebd73f194d9816676f62b7ffa9cfe5fbb01cd 26b7acc6e755b666374943d7b09f01ccce51b623 67d6ddc01d681c37c3a7f76b5e5e5e4d2b28f12f 1a339d7d6b78bbf49e52a70361d1eeb952250083 c3fb70e083712b07e4d659a660fc728444efd878 999d7959a5a161403c4c0e269ba4f20a6f8a4cd2 d4d53edd02721954a724719aabf64f03a0c2fe82 187f7bd0a79bafa575e96f32db222f6bfd83db28 7ce82abbf639ee2cd8ac1c96886de05e99b8e6cc 6ed40b3838c8b9a8028e881e7580ba6d2a7b2de5 d1bde80e5bcf96342ef9246fa15302cbe6dc28c1 2afb2be702271e2f8105eef65a2b414c880d88ce 1bc1b180531e1f6d4f6563527d72755275266790 66e59e03b06178e5e78eb99aaefdcc1e36eacc46 812ce3a27a83444407480eb5427b93f772b7b897 49e192de Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f9:30:43:ac:e1:8b:6c:92:b9:e6:b3:83:93:36:ef:75:6d:50:3a:1e] modulus: 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 public exponent: 10001 ] 2021-05-02 01:17:30.065  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-02 01:17:30.067 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-02 01:17:30.068 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-02 01:17:30.069 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-02 01:17:30.070  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-02 01:17:30.071  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-02 01:17:30.071  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-02 01:17:30.072  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-02 01:17:30.073  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-02 01:17:30.079  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-02 01:17:30.079  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-02 01:17:30.080  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-02 01:17:30.170  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-02 01:17:30.272  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-02 01:17:30.273  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-02 01:17:30.273 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-02 01:17:30.277 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-02 01:17:30.277  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1862 2021-05-02 01:17:30.278  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-02 01:17:30.283  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-02 01:17:30.284  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-02 01:17:30.284  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-02 01:17:30.285  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-02 01:17:30.285 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-02 01:17:30.286 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-02 01:17:30.286 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-02 01:17:30.287 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-02 01:17:30.287 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-02 01:17:30.288 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-02 01:17:30.366 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-02 01:17:30.373 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 184536894123995479129426137609518679886773563462 IssuerDN: UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 02 00:01:47 UTC 2021 Final Date: Fri May 02 00:01:47 UTC 2031 SubjectDN: UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9b:93:ef:29:ae:7d:27:99:ae:44:b5:2c:fb:58:9f:b7:5f:09:4b:62] modulus: c1fe058913c4d78d4b11033edf83ceb57d25fb68b05c40fda775823b802e0affcbf254c05ee2ff0d38c47fe35cea2e2fcc2b8e3876403dd36686f113d02895aae052cd32c054b23aaccdac162771cf610e98052a0321fd693a689db7ba0767e7a1256dc8a796c54e3479741e38cc4ebf0387458641936ae22126a8a65a71362aaa137a93e1eb4286103137dae9d7cd13e6b12fbc600b5d7fe2109e7606e2aa6eae6842c3cb3367e69f645654ef66d615dbcde9e775d15ad962a31502d5a1de3c8f13f3b66138bcefdb042ea730944e27062a347c3cd9811199a1cb0fbb709bff32620dba8bf7f8dd29c9412c883bb934b8893fad725691d8bf31734f224f45b7fb32c1680ae53ba856993188fe0eeee0bb71c2f2f1a1941c3c7c3fd194fb142394ebfa56fc2522a6a9341c1fc32e6e1867df519c20f5411706cc1840fa2f23365a98291c52b222bfe52bedb5c01cf4f7ca6253e5c4dd22805fe7d86dbf36f9894f4bbda645e27be9e391b479c6e32174a10c1d5308fa2c78de9d07f0f82c5dd7 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a8c3f6c9a60d49d6ff3e81ae95945e69e3bbeb24 b3986d8d382aaedc21b26dced0382eeb50566402 7ecf07db5b93f162b4f1a6bcef606bea9393e694 98d05c53fb1ba59e77d7dbd4d618eb9f78ecba69 96eebd73f194d9816676f62b7ffa9cfe5fbb01cd 26b7acc6e755b666374943d7b09f01ccce51b623 67d6ddc01d681c37c3a7f76b5e5e5e4d2b28f12f 1a339d7d6b78bbf49e52a70361d1eeb952250083 c3fb70e083712b07e4d659a660fc728444efd878 999d7959a5a161403c4c0e269ba4f20a6f8a4cd2 d4d53edd02721954a724719aabf64f03a0c2fe82 187f7bd0a79bafa575e96f32db222f6bfd83db28 7ce82abbf639ee2cd8ac1c96886de05e99b8e6cc 6ed40b3838c8b9a8028e881e7580ba6d2a7b2de5 d1bde80e5bcf96342ef9246fa15302cbe6dc28c1 2afb2be702271e2f8105eef65a2b414c880d88ce 1bc1b180531e1f6d4f6563527d72755275266790 66e59e03b06178e5e78eb99aaefdcc1e36eacc46 812ce3a27a83444407480eb5427b93f772b7b897 49e192de Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c3:5d:8d:90:33:85:44:33:10:6a:9f:2e:09:ac:3b:97:ca:b9:aa:cb] modulus: 81e0cb7167f3c7a4f1efda7e97fa6d0b5c9320167bea49137ec5b4c4f5f1701b10a4c5e98c68e0c60e050c9040b9a252237a7bb9845f57b55fea814dc77da0cd1187929e2b36804f347f60bb3ebd0f8b6d3d252e3460e4715821517f3eca2c1ef75eb519d5acd7b002b6d48be89bdaca4495636105015c407d25a8fbe3f29887614c86204aa44c93cc094f9f67d13ddda15b2a3cb5c32677175a4f5bd6544e4f0a756ada8a47af6a4a592d7f923468d0487c0a27027f82fdab3ef57fd6a8fd80ff9a5906f4c8cc7bfff3359b683210d8baeb4e72f3eeb8e43ca53a348156fe5e31685615d1ec9ad389fcf1bb652a717e61b1a7f2fe85498e2aeb852b0bbcd54d public exponent: 10001 ] 2021-05-02 01:19:01.637  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-02 01:19:01.638 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-02 01:19:01.639 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-05-02 01:19:01.639 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-02 01:19:01.640  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-05-02 01:19:01.640  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-02 01:19:01.641  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-02 01:19:01.641  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-02 01:19:01.641  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-02 01:19:01.646  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-02 01:19:01.646  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-02 01:19:01.647  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-02 01:19:01.666  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-02 01:19:01.747  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-02 01:19:01.748  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-02 01:19:01.765 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-02 01:19:01.770 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-02 01:19:01.771  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1862 2021-05-02 01:19:01.772  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-02 01:19:01.775  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-02 01:19:01.776  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-02 01:19:01.776  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-02 01:19:01.777  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-02 01:19:01.777 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-02 01:19:01.777 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-02 01:19:01.778 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-02 01:19:01.778 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-02 01:19:01.779 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-02 01:19:01.779 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-02 01:19:01.780 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-02 01:19:01.783 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 184536894123995479129426137609518679886773563462 IssuerDN: UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 02 00:01:47 UTC 2021 Final Date: Fri May 02 00:01:47 UTC 2031 SubjectDN: UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9b:93:ef:29:ae:7d:27:99:ae:44:b5:2c:fb:58:9f:b7:5f:09:4b:62] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a8c3f6c9a60d49d6ff3e81ae95945e69e3bbeb24 b3986d8d382aaedc21b26dced0382eeb50566402 7ecf07db5b93f162b4f1a6bcef606bea9393e694 98d05c53fb1ba59e77d7dbd4d618eb9f78ecba69 96eebd73f194d9816676f62b7ffa9cfe5fbb01cd 26b7acc6e755b666374943d7b09f01ccce51b623 67d6ddc01d681c37c3a7f76b5e5e5e4d2b28f12f 1a339d7d6b78bbf49e52a70361d1eeb952250083 c3fb70e083712b07e4d659a660fc728444efd878 999d7959a5a161403c4c0e269ba4f20a6f8a4cd2 d4d53edd02721954a724719aabf64f03a0c2fe82 187f7bd0a79bafa575e96f32db222f6bfd83db28 7ce82abbf639ee2cd8ac1c96886de05e99b8e6cc 6ed40b3838c8b9a8028e881e7580ba6d2a7b2de5 d1bde80e5bcf96342ef9246fa15302cbe6dc28c1 2afb2be702271e2f8105eef65a2b414c880d88ce 1bc1b180531e1f6d4f6563527d72755275266790 66e59e03b06178e5e78eb99aaefdcc1e36eacc46 812ce3a27a83444407480eb5427b93f772b7b897 49e192de Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2f:2e:58:34:ce:36:df:93:98:9a:ea:a8:59:f8:15:bd:97:1a:3f:86] modulus: 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 public exponent: 10001 ] 2021-05-02 01:22:13.158  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-02 01:22:13.159 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-02 01:22:13.161 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-02 01:22:13.162 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-02 01:22:13.162  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-02 01:22:13.163  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-02 01:22:13.164  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-02 01:22:13.164  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-02 01:22:13.165  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-02 01:22:13.173  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-02 01:22:13.174  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-02 01:22:13.174  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-02 01:22:13.176  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-02 01:22:13.274  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-02 01:22:13.275  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-02 01:22:13.275 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-02 01:22:13.278 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-02 01:22:13.279  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1862 2021-05-02 01:22:13.280  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-02 01:22:13.281  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-02 01:22:13.282  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-02 01:22:13.282  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-02 01:22:13.282  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-02 01:22:13.283 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-02 01:22:13.283 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-02 01:22:13.284 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-02 01:22:13.284 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-02 01:22:13.285 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-02 01:22:13.285 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-02 01:22:13.287 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-02 01:22:13.291 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 184536894123995479129426137609518679886773563462 IssuerDN: UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 02 00:01:47 UTC 2021 Final Date: Fri May 02 00:01:47 UTC 2031 SubjectDN: UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9b:93:ef:29:ae:7d:27:99:ae:44:b5:2c:fb:58:9f:b7:5f:09:4b:62] modulus: c1fe058913c4d78d4b11033edf83ceb57d25fb68b05c40fda775823b802e0affcbf254c05ee2ff0d38c47fe35cea2e2fcc2b8e3876403dd36686f113d02895aae052cd32c054b23aaccdac162771cf610e98052a0321fd693a689db7ba0767e7a1256dc8a796c54e3479741e38cc4ebf0387458641936ae22126a8a65a71362aaa137a93e1eb4286103137dae9d7cd13e6b12fbc600b5d7fe2109e7606e2aa6eae6842c3cb3367e69f645654ef66d615dbcde9e775d15ad962a31502d5a1de3c8f13f3b66138bcefdb042ea730944e27062a347c3cd9811199a1cb0fbb709bff32620dba8bf7f8dd29c9412c883bb934b8893fad725691d8bf31734f224f45b7fb32c1680ae53ba856993188fe0eeee0bb71c2f2f1a1941c3c7c3fd194fb142394ebfa56fc2522a6a9341c1fc32e6e1867df519c20f5411706cc1840fa2f23365a98291c52b222bfe52bedb5c01cf4f7ca6253e5c4dd22805fe7d86dbf36f9894f4bbda645e27be9e391b479c6e32174a10c1d5308fa2c78de9d07f0f82c5dd7 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a8c3f6c9a60d49d6ff3e81ae95945e69e3bbeb24 b3986d8d382aaedc21b26dced0382eeb50566402 7ecf07db5b93f162b4f1a6bcef606bea9393e694 98d05c53fb1ba59e77d7dbd4d618eb9f78ecba69 96eebd73f194d9816676f62b7ffa9cfe5fbb01cd 26b7acc6e755b666374943d7b09f01ccce51b623 67d6ddc01d681c37c3a7f76b5e5e5e4d2b28f12f 1a339d7d6b78bbf49e52a70361d1eeb952250083 c3fb70e083712b07e4d659a660fc728444efd878 999d7959a5a161403c4c0e269ba4f20a6f8a4cd2 d4d53edd02721954a724719aabf64f03a0c2fe82 187f7bd0a79bafa575e96f32db222f6bfd83db28 7ce82abbf639ee2cd8ac1c96886de05e99b8e6cc 6ed40b3838c8b9a8028e881e7580ba6d2a7b2de5 d1bde80e5bcf96342ef9246fa15302cbe6dc28c1 2afb2be702271e2f8105eef65a2b414c880d88ce 1bc1b180531e1f6d4f6563527d72755275266790 66e59e03b06178e5e78eb99aaefdcc1e36eacc46 812ce3a27a83444407480eb5427b93f772b7b897 49e192de Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d1:5d:7a:f6:07:06:d2:2f:a2:e9:fd:1d:69:a1:e0:28:05:22:6a:85] modulus: 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 public exponent: 10001 ] 2021-05-02 01:22:26.842  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-02 01:22:26.843 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-02 01:22:26.844 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-02 01:22:26.845 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-02 01:22:26.845  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-02 01:22:26.846  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-02 01:22:26.846  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-02 01:22:26.846  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-02 01:22:26.846  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-02 01:22:26.851  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-02 01:22:26.851  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-02 01:22:26.851  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-02 01:22:26.853  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-02 01:22:26.946  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-02 01:22:26.947  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-02 01:22:26.948 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-02 01:22:26.967 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-02 01:22:26.969  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1862 2021-05-02 01:22:26.969  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-02 01:22:26.971  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-02 01:22:26.971  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-02 01:22:26.972  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-02 01:22:26.973  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-02 01:22:26.973 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-02 01:22:26.973 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-02 01:22:26.974 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-02 01:22:26.974 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-02 01:22:26.975 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-02 01:22:26.975 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-02 01:22:26.976 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-02 01:22:26.980 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 184536894123995479129426137609518679886773563462 IssuerDN: UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 02 00:01:47 UTC 2021 Final Date: Fri May 02 00:01:47 UTC 2031 SubjectDN: UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9b:93:ef:29:ae:7d:27:99:ae:44:b5:2c:fb:58:9f:b7:5f:09:4b:62] modulus: c1fe058913c4d78d4b11033edf83ceb57d25fb68b05c40fda775823b802e0affcbf254c05ee2ff0d38c47fe35cea2e2fcc2b8e3876403dd36686f113d02895aae052cd32c054b23aaccdac162771cf610e98052a0321fd693a689db7ba0767e7a1256dc8a796c54e3479741e38cc4ebf0387458641936ae22126a8a65a71362aaa137a93e1eb4286103137dae9d7cd13e6b12fbc600b5d7fe2109e7606e2aa6eae6842c3cb3367e69f645654ef66d615dbcde9e775d15ad962a31502d5a1de3c8f13f3b66138bcefdb042ea730944e27062a347c3cd9811199a1cb0fbb709bff32620dba8bf7f8dd29c9412c883bb934b8893fad725691d8bf31734f224f45b7fb32c1680ae53ba856993188fe0eeee0bb71c2f2f1a1941c3c7c3fd194fb142394ebfa56fc2522a6a9341c1fc32e6e1867df519c20f5411706cc1840fa2f23365a98291c52b222bfe52bedb5c01cf4f7ca6253e5c4dd22805fe7d86dbf36f9894f4bbda645e27be9e391b479c6e32174a10c1d5308fa2c78de9d07f0f82c5dd7 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a8c3f6c9a60d49d6ff3e81ae95945e69e3bbeb24 b3986d8d382aaedc21b26dced0382eeb50566402 7ecf07db5b93f162b4f1a6bcef606bea9393e694 98d05c53fb1ba59e77d7dbd4d618eb9f78ecba69 96eebd73f194d9816676f62b7ffa9cfe5fbb01cd 26b7acc6e755b666374943d7b09f01ccce51b623 67d6ddc01d681c37c3a7f76b5e5e5e4d2b28f12f 1a339d7d6b78bbf49e52a70361d1eeb952250083 c3fb70e083712b07e4d659a660fc728444efd878 999d7959a5a161403c4c0e269ba4f20a6f8a4cd2 d4d53edd02721954a724719aabf64f03a0c2fe82 187f7bd0a79bafa575e96f32db222f6bfd83db28 7ce82abbf639ee2cd8ac1c96886de05e99b8e6cc 6ed40b3838c8b9a8028e881e7580ba6d2a7b2de5 d1bde80e5bcf96342ef9246fa15302cbe6dc28c1 2afb2be702271e2f8105eef65a2b414c880d88ce 1bc1b180531e1f6d4f6563527d72755275266790 66e59e03b06178e5e78eb99aaefdcc1e36eacc46 812ce3a27a83444407480eb5427b93f772b7b897 49e192de Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [eb:74:33:ae:63:7e:4e:1d:1a:cb:fc:df:e7:b5:00:76:e7:95:5e:a1] modulus: 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 public exponent: 10001 ] 2021-05-02 01:22:27.873  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-02 01:22:27.874 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-02 01:22:27.876 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-05-02 01:22:27.877 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-02 01:22:27.877  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-05-02 01:22:27.877  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-02 01:22:27.878  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-02 01:22:27.964  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-02 01:22:27.965  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-02 01:22:27.976  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-02 01:22:27.977  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-02 01:22:27.977  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-02 01:22:27.979  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-02 01:22:28.120  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-02 01:22:28.165  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-02 01:22:28.166 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-02 01:22:28.167 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-02 01:22:28.168  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1862 2021-05-02 01:22:28.168  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-02 01:22:28.170  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-02 01:22:28.171  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-02 01:22:28.171  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-02 01:22:28.171  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-02 01:22:28.172 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-02 01:22:28.172 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-02 01:22:28.172 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-02 01:22:28.173 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-02 01:22:28.173 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-02 01:22:28.173 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-02 01:22:28.174 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-02 01:22:28.178 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 184536894123995479129426137609518679886773563462 IssuerDN: UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 02 00:01:47 UTC 2021 Final Date: Fri May 02 00:01:47 UTC 2031 SubjectDN: UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9b:93:ef:29:ae:7d:27:99:ae:44:b5:2c:fb:58:9f:b7:5f:09:4b:62] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a8c3f6c9a60d49d6ff3e81ae95945e69e3bbeb24 b3986d8d382aaedc21b26dced0382eeb50566402 7ecf07db5b93f162b4f1a6bcef606bea9393e694 98d05c53fb1ba59e77d7dbd4d618eb9f78ecba69 96eebd73f194d9816676f62b7ffa9cfe5fbb01cd 26b7acc6e755b666374943d7b09f01ccce51b623 67d6ddc01d681c37c3a7f76b5e5e5e4d2b28f12f 1a339d7d6b78bbf49e52a70361d1eeb952250083 c3fb70e083712b07e4d659a660fc728444efd878 999d7959a5a161403c4c0e269ba4f20a6f8a4cd2 d4d53edd02721954a724719aabf64f03a0c2fe82 187f7bd0a79bafa575e96f32db222f6bfd83db28 7ce82abbf639ee2cd8ac1c96886de05e99b8e6cc 6ed40b3838c8b9a8028e881e7580ba6d2a7b2de5 d1bde80e5bcf96342ef9246fa15302cbe6dc28c1 2afb2be702271e2f8105eef65a2b414c880d88ce 1bc1b180531e1f6d4f6563527d72755275266790 66e59e03b06178e5e78eb99aaefdcc1e36eacc46 812ce3a27a83444407480eb5427b93f772b7b897 49e192de Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c9:8a:15:df:1e:1a:a5:d7:5e:dd:c5:5a:aa:5c:5d:00:99:57:fa:ff] modulus: 8c23ce533314f69af1db9dc951f844e5557a2c022a0717038b63b23e8a0cc6400d58872cc34457aa07c15d80834d04f010ea7b5f77ef836aee00209abc3a5a521a8ca21cf78c725cfe64f2e6ff39d71106e5a9e104c0f1b06f36ed218fd5c037206e48b62bc2ae03c1bd4c67613fd7ac9d8b877bb8c69365b23155357cfb63027cb82b3ba93a328e772d7a8576b1ec7e881630a0c18ae45458dd5212372385737b89189bc40331a004c7ffa8745f8df6043551e310ca689dc46aa7c7081e27745d92375d2fbc54879fe036553b236b44467906ab474a9f8f08a9b23ae08b81ad6b3a2b444b1b79b4b6eaa7b570753c8adbce173a3be6ec37ddd9b907faec5bd1 public exponent: 10001 ] 2021-05-02 01:23:04.773  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-02 01:23:04.774 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-02 01:23:04.776 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-05-02 01:23:04.777 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-02 01:23:04.777  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-05-02 01:23:04.778  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-02 01:23:04.778  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-02 01:23:04.778  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-02 01:23:04.779  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-02 01:23:04.866  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-02 01:23:04.867  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-02 01:23:04.868  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-02 01:23:04.870  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-02 01:23:05.055  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-02 01:23:05.055  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-02 01:23:05.055 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-02 01:23:05.066 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-02 01:23:05.067  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1862 2021-05-02 01:23:05.067  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-02 01:23:05.070  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-02 01:23:05.070  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-02 01:23:05.070  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-02 01:23:05.071  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-02 01:23:05.071 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-02 01:23:05.071 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-02 01:23:05.072 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-02 01:23:05.073 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-02 01:23:05.073 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-02 01:23:05.074 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-02 01:23:05.075 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-02 01:23:05.078 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 184536894123995479129426137609518679886773563462 IssuerDN: UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 02 00:01:47 UTC 2021 Final Date: Fri May 02 00:01:47 UTC 2031 SubjectDN: UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9b:93:ef:29:ae:7d:27:99:ae:44:b5:2c:fb:58:9f:b7:5f:09:4b:62] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a8c3f6c9a60d49d6ff3e81ae95945e69e3bbeb24 b3986d8d382aaedc21b26dced0382eeb50566402 7ecf07db5b93f162b4f1a6bcef606bea9393e694 98d05c53fb1ba59e77d7dbd4d618eb9f78ecba69 96eebd73f194d9816676f62b7ffa9cfe5fbb01cd 26b7acc6e755b666374943d7b09f01ccce51b623 67d6ddc01d681c37c3a7f76b5e5e5e4d2b28f12f 1a339d7d6b78bbf49e52a70361d1eeb952250083 c3fb70e083712b07e4d659a660fc728444efd878 999d7959a5a161403c4c0e269ba4f20a6f8a4cd2 d4d53edd02721954a724719aabf64f03a0c2fe82 187f7bd0a79bafa575e96f32db222f6bfd83db28 7ce82abbf639ee2cd8ac1c96886de05e99b8e6cc 6ed40b3838c8b9a8028e881e7580ba6d2a7b2de5 d1bde80e5bcf96342ef9246fa15302cbe6dc28c1 2afb2be702271e2f8105eef65a2b414c880d88ce 1bc1b180531e1f6d4f6563527d72755275266790 66e59e03b06178e5e78eb99aaefdcc1e36eacc46 812ce3a27a83444407480eb5427b93f772b7b897 49e192de Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2e:c1:00:72:04:31:97:b1:4f:bf:72:d7:72:03:b8:58:64:62:ff:df] modulus: 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 public exponent: 10001 ] 2021-05-02 01:24:10.801  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-02 01:24:10.802 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-02 01:24:10.865 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-05-02 01:24:10.866 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-02 01:24:10.866  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-05-02 01:24:10.867  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-02 01:24:10.867  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-02 01:24:10.868  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-02 01:24:10.868  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-02 01:24:10.874  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-02 01:24:10.875  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-02 01:24:10.875  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-02 01:24:10.877  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-02 01:24:11.091  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-02 01:24:11.092  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-02 01:24:11.092 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-02 01:24:11.099 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-02 01:24:11.100  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1862 2021-05-02 01:24:11.100  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-02 01:24:11.104  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-02 01:24:11.105  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-02 01:24:11.105  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-02 01:24:11.106  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-02 01:24:11.106 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-02 01:24:11.107 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-02 01:24:11.107 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-02 01:24:11.108 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-02 01:24:11.108 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-02 01:24:11.108 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-02 01:24:11.109 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-02 01:24:11.165 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 184536894123995479129426137609518679886773563462 IssuerDN: UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 02 00:01:47 UTC 2021 Final Date: Fri May 02 00:01:47 UTC 2031 SubjectDN: UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9b:93:ef:29:ae:7d:27:99:ae:44:b5:2c:fb:58:9f:b7:5f:09:4b:62] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a8c3f6c9a60d49d6ff3e81ae95945e69e3bbeb24 b3986d8d382aaedc21b26dced0382eeb50566402 7ecf07db5b93f162b4f1a6bcef606bea9393e694 98d05c53fb1ba59e77d7dbd4d618eb9f78ecba69 96eebd73f194d9816676f62b7ffa9cfe5fbb01cd 26b7acc6e755b666374943d7b09f01ccce51b623 67d6ddc01d681c37c3a7f76b5e5e5e4d2b28f12f 1a339d7d6b78bbf49e52a70361d1eeb952250083 c3fb70e083712b07e4d659a660fc728444efd878 999d7959a5a161403c4c0e269ba4f20a6f8a4cd2 d4d53edd02721954a724719aabf64f03a0c2fe82 187f7bd0a79bafa575e96f32db222f6bfd83db28 7ce82abbf639ee2cd8ac1c96886de05e99b8e6cc 6ed40b3838c8b9a8028e881e7580ba6d2a7b2de5 d1bde80e5bcf96342ef9246fa15302cbe6dc28c1 2afb2be702271e2f8105eef65a2b414c880d88ce 1bc1b180531e1f6d4f6563527d72755275266790 66e59e03b06178e5e78eb99aaefdcc1e36eacc46 812ce3a27a83444407480eb5427b93f772b7b897 49e192de Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ef:01:83:fd:3d:da:d2:ab:b1:a9:f1:8e:8d:20:fc:9c:2f:b0:61:a6] modulus: 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 public exponent: 10001 ] 2021-05-02 01:25:19.129  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-02 01:25:19.130 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-02 01:25:19.132 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-05-02 01:25:19.133 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-02 01:25:19.133  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-05-02 01:25:19.134  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-02 01:25:19.135  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-02 01:25:19.135  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-02 01:25:19.135  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-02 01:25:19.139  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-02 01:25:19.140  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-02 01:25:19.140  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-02 01:25:19.141  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-02 01:25:19.236  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-02 01:25:19.237  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-02 01:25:19.237 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-02 01:25:19.239 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-02 01:25:19.240  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1862 2021-05-02 01:25:19.265  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-02 01:25:19.267  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-02 01:25:19.268  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-02 01:25:19.268  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-02 01:25:19.269  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-02 01:25:19.269 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-02 01:25:19.269 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-02 01:25:19.270 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-02 01:25:19.270 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-02 01:25:19.271 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-02 01:25:19.271 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-02 01:25:19.272 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-02 01:25:19.275 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 184536894123995479129426137609518679886773563462 IssuerDN: UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 02 00:01:47 UTC 2021 Final Date: Fri May 02 00:01:47 UTC 2031 SubjectDN: UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9b:93:ef:29:ae:7d:27:99:ae:44:b5:2c:fb:58:9f:b7:5f:09:4b:62] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a8c3f6c9a60d49d6ff3e81ae95945e69e3bbeb24 b3986d8d382aaedc21b26dced0382eeb50566402 7ecf07db5b93f162b4f1a6bcef606bea9393e694 98d05c53fb1ba59e77d7dbd4d618eb9f78ecba69 96eebd73f194d9816676f62b7ffa9cfe5fbb01cd 26b7acc6e755b666374943d7b09f01ccce51b623 67d6ddc01d681c37c3a7f76b5e5e5e4d2b28f12f 1a339d7d6b78bbf49e52a70361d1eeb952250083 c3fb70e083712b07e4d659a660fc728444efd878 999d7959a5a161403c4c0e269ba4f20a6f8a4cd2 d4d53edd02721954a724719aabf64f03a0c2fe82 187f7bd0a79bafa575e96f32db222f6bfd83db28 7ce82abbf639ee2cd8ac1c96886de05e99b8e6cc 6ed40b3838c8b9a8028e881e7580ba6d2a7b2de5 d1bde80e5bcf96342ef9246fa15302cbe6dc28c1 2afb2be702271e2f8105eef65a2b414c880d88ce 1bc1b180531e1f6d4f6563527d72755275266790 66e59e03b06178e5e78eb99aaefdcc1e36eacc46 812ce3a27a83444407480eb5427b93f772b7b897 49e192de Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [09:e4:b2:9f:19:19:59:cb:29:5d:3a:63:0a:cf:12:42:71:00:24:a5] modulus: 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 public exponent: 10001 ] 2021-05-02 01:27:36.045  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-02 01:27:36.046 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-02 01:27:36.047 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-02 01:27:36.047 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-02 01:27:36.048  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-02 01:27:36.048  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-02 01:27:36.048  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-02 01:27:36.049  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-02 01:27:36.049  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-02 01:27:36.052  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-02 01:27:36.053  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-02 01:27:36.053  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-02 01:27:36.054  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-02 01:27:36.166  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-02 01:27:36.166  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-02 01:27:36.167 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-02 01:27:36.168 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-02 01:27:36.169  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1862 2021-05-02 01:27:36.170  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-02 01:27:36.171  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-02 01:27:36.172  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-02 01:27:36.172  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-02 01:27:36.173  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-02 01:27:36.173 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-02 01:27:36.173 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-02 01:27:36.173 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-02 01:27:36.174 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-02 01:27:36.174 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-02 01:27:36.175 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-02 01:27:36.175 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-02 01:27:36.182 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 184536894123995479129426137609518679886773563462 IssuerDN: UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 02 00:01:47 UTC 2021 Final Date: Fri May 02 00:01:47 UTC 2031 SubjectDN: UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9b:93:ef:29:ae:7d:27:99:ae:44:b5:2c:fb:58:9f:b7:5f:09:4b:62] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a8c3f6c9a60d49d6ff3e81ae95945e69e3bbeb24 b3986d8d382aaedc21b26dced0382eeb50566402 7ecf07db5b93f162b4f1a6bcef606bea9393e694 98d05c53fb1ba59e77d7dbd4d618eb9f78ecba69 96eebd73f194d9816676f62b7ffa9cfe5fbb01cd 26b7acc6e755b666374943d7b09f01ccce51b623 67d6ddc01d681c37c3a7f76b5e5e5e4d2b28f12f 1a339d7d6b78bbf49e52a70361d1eeb952250083 c3fb70e083712b07e4d659a660fc728444efd878 999d7959a5a161403c4c0e269ba4f20a6f8a4cd2 d4d53edd02721954a724719aabf64f03a0c2fe82 187f7bd0a79bafa575e96f32db222f6bfd83db28 7ce82abbf639ee2cd8ac1c96886de05e99b8e6cc 6ed40b3838c8b9a8028e881e7580ba6d2a7b2de5 d1bde80e5bcf96342ef9246fa15302cbe6dc28c1 2afb2be702271e2f8105eef65a2b414c880d88ce 1bc1b180531e1f6d4f6563527d72755275266790 66e59e03b06178e5e78eb99aaefdcc1e36eacc46 812ce3a27a83444407480eb5427b93f772b7b897 49e192de Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d5:b0:e1:5a:81:94:d4:68:a9:0e:d1:ee:e8:5f:2a:24:a9:18:4d:0b] modulus: af5ffa36a3932699d9593ab0083d1fca4f694d83a52a5fc62bcd232e84d148ff5a1c17fcaa5a7666151b16345b4b8b3fa798a5eb33a0c33596823538a368f4e4d34b03965155fb05d6b3d6cb4d45c42123325638de6ff71378fecdcdf84985cfd2a7b4734afb65900fc9e97cf9093067319ae3cf0a3e0d0967d8dee1dc2820cc3fcf75e478ba9dffe58b35df025a6bade81184ffa73d31280b9a1024de754ad9fd2cf1746b9b22d1a342e1b74f179cb9a82967850d83c347cb13f1a86a9c022e8578cb26387e701034709db2b29cbe61507ad3c07ed88d7248bf4fea32a58ad70a434264b176fe55af0d998f6412152cd01ad5cad72bdb315223c69c2c61757d public exponent: 10001 ] 2021-05-02 01:30:21.155  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-02 01:30:21.156 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-02 01:30:21.157 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-02 01:30:21.157 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-02 01:30:21.157  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-02 01:30:21.157  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-02 01:30:21.158  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-02 01:30:21.158  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-02 01:30:21.158  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-02 01:30:21.162  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-02 01:30:21.162  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-02 01:30:21.162  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-02 01:30:21.163  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-02 01:30:21.310  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-02 01:30:21.311  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-02 01:30:21.311 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-02 01:30:21.313 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-02 01:30:21.313  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1862 2021-05-02 01:30:21.313  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-02 01:30:21.314  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-02 01:30:21.314  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-02 01:30:21.315  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-02 01:30:21.315  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-02 01:30:21.315 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-02 01:30:21.315 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-02 01:30:21.315 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-02 01:30:21.316 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-02 01:30:21.316 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-02 01:30:21.316 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-02 01:30:21.317 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-02 01:30:21.319 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 184536894123995479129426137609518679886773563462 IssuerDN: UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 02 00:01:47 UTC 2021 Final Date: Fri May 02 00:01:47 UTC 2031 SubjectDN: UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9b:93:ef:29:ae:7d:27:99:ae:44:b5:2c:fb:58:9f:b7:5f:09:4b:62] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a8c3f6c9a60d49d6ff3e81ae95945e69e3bbeb24 b3986d8d382aaedc21b26dced0382eeb50566402 7ecf07db5b93f162b4f1a6bcef606bea9393e694 98d05c53fb1ba59e77d7dbd4d618eb9f78ecba69 96eebd73f194d9816676f62b7ffa9cfe5fbb01cd 26b7acc6e755b666374943d7b09f01ccce51b623 67d6ddc01d681c37c3a7f76b5e5e5e4d2b28f12f 1a339d7d6b78bbf49e52a70361d1eeb952250083 c3fb70e083712b07e4d659a660fc728444efd878 999d7959a5a161403c4c0e269ba4f20a6f8a4cd2 d4d53edd02721954a724719aabf64f03a0c2fe82 187f7bd0a79bafa575e96f32db222f6bfd83db28 7ce82abbf639ee2cd8ac1c96886de05e99b8e6cc 6ed40b3838c8b9a8028e881e7580ba6d2a7b2de5 d1bde80e5bcf96342ef9246fa15302cbe6dc28c1 2afb2be702271e2f8105eef65a2b414c880d88ce 1bc1b180531e1f6d4f6563527d72755275266790 66e59e03b06178e5e78eb99aaefdcc1e36eacc46 812ce3a27a83444407480eb5427b93f772b7b897 49e192de Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fd:f4:0b:89:94:2b:84:65:f7:8b:9c:bb:f8:d6:2e:c3:ea:ff:3b:30] modulus: 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 public exponent: 10001 ] 2021-05-02 01:32:18.109  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-02 01:32:18.110 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-02 01:32:18.111 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-02 01:32:18.111 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-02 01:32:18.112  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-02 01:32:18.112  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-02 01:32:18.112  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-02 01:32:18.112  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-02 01:32:18.113  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-02 01:32:18.117  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-02 01:32:18.117  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-02 01:32:18.117  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-02 01:32:18.119  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-02 01:32:18.210  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-02 01:32:18.211  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-02 01:32:18.211 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-02 01:32:18.213 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-02 01:32:18.214  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1862 2021-05-02 01:32:18.214  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-02 01:32:18.216  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-02 01:32:18.216  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-02 01:32:18.217  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-02 01:32:18.217  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-02 01:32:18.218 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-02 01:32:18.222 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-02 01:32:18.222 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-02 01:32:18.222 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-02 01:32:18.222 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-02 01:32:18.222 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-02 01:32:18.223 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-02 01:32:18.225 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 184536894123995479129426137609518679886773563462 IssuerDN: UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 02 00:01:47 UTC 2021 Final Date: Fri May 02 00:01:47 UTC 2031 SubjectDN: UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9b:93:ef:29:ae:7d:27:99:ae:44:b5:2c:fb:58:9f:b7:5f:09:4b:62] modulus: c1fe058913c4d78d4b11033edf83ceb57d25fb68b05c40fda775823b802e0affcbf254c05ee2ff0d38c47fe35cea2e2fcc2b8e3876403dd36686f113d02895aae052cd32c054b23aaccdac162771cf610e98052a0321fd693a689db7ba0767e7a1256dc8a796c54e3479741e38cc4ebf0387458641936ae22126a8a65a71362aaa137a93e1eb4286103137dae9d7cd13e6b12fbc600b5d7fe2109e7606e2aa6eae6842c3cb3367e69f645654ef66d615dbcde9e775d15ad962a31502d5a1de3c8f13f3b66138bcefdb042ea730944e27062a347c3cd9811199a1cb0fbb709bff32620dba8bf7f8dd29c9412c883bb934b8893fad725691d8bf31734f224f45b7fb32c1680ae53ba856993188fe0eeee0bb71c2f2f1a1941c3c7c3fd194fb142394ebfa56fc2522a6a9341c1fc32e6e1867df519c20f5411706cc1840fa2f23365a98291c52b222bfe52bedb5c01cf4f7ca6253e5c4dd22805fe7d86dbf36f9894f4bbda645e27be9e391b479c6e32174a10c1d5308fa2c78de9d07f0f82c5dd7 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a8c3f6c9a60d49d6ff3e81ae95945e69e3bbeb24 b3986d8d382aaedc21b26dced0382eeb50566402 7ecf07db5b93f162b4f1a6bcef606bea9393e694 98d05c53fb1ba59e77d7dbd4d618eb9f78ecba69 96eebd73f194d9816676f62b7ffa9cfe5fbb01cd 26b7acc6e755b666374943d7b09f01ccce51b623 67d6ddc01d681c37c3a7f76b5e5e5e4d2b28f12f 1a339d7d6b78bbf49e52a70361d1eeb952250083 c3fb70e083712b07e4d659a660fc728444efd878 999d7959a5a161403c4c0e269ba4f20a6f8a4cd2 d4d53edd02721954a724719aabf64f03a0c2fe82 187f7bd0a79bafa575e96f32db222f6bfd83db28 7ce82abbf639ee2cd8ac1c96886de05e99b8e6cc 6ed40b3838c8b9a8028e881e7580ba6d2a7b2de5 d1bde80e5bcf96342ef9246fa15302cbe6dc28c1 2afb2be702271e2f8105eef65a2b414c880d88ce 1bc1b180531e1f6d4f6563527d72755275266790 66e59e03b06178e5e78eb99aaefdcc1e36eacc46 812ce3a27a83444407480eb5427b93f772b7b897 49e192de Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b3:b9:4b:31:b8:28:fd:f9:2d:68:41:39:d2:e4:a9:37:77:79:bc:92] modulus: 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 public exponent: 10001 ] 2021-05-02 01:33:40.409  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-02 01:33:40.411 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-02 01:33:40.412 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-02 01:33:40.413 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-02 01:33:40.414  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-02 01:33:40.414  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-02 01:33:40.415  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-02 01:33:40.415  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-02 01:33:40.415  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-02 01:33:40.421  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-02 01:33:40.422  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-02 01:33:40.422  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-02 01:33:40.423  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-02 01:33:40.553  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-02 01:33:40.554  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-02 01:33:40.554 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-02 01:33:40.556 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-02 01:33:40.556  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1862 2021-05-02 01:33:40.557  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-02 01:33:40.558  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-02 01:33:40.559  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-02 01:33:40.559  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-02 01:33:40.559  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-02 01:33:40.560 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-02 01:33:40.560 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-02 01:33:40.560 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-02 01:33:40.560 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-02 01:33:40.561 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-02 01:33:40.561 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-02 01:33:40.561 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-02 01:33:40.563 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 184536894123995479129426137609518679886773563462 IssuerDN: UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 02 00:01:47 UTC 2021 Final Date: Fri May 02 00:01:47 UTC 2031 SubjectDN: UID=c-05672e4f455eaf9c3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9b:93:ef:29:ae:7d:27:99:ae:44:b5:2c:fb:58:9f:b7:5f:09:4b:62] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a8c3f6c9a60d49d6ff3e81ae95945e69e3bbeb24 b3986d8d382aaedc21b26dced0382eeb50566402 7ecf07db5b93f162b4f1a6bcef606bea9393e694 98d05c53fb1ba59e77d7dbd4d618eb9f78ecba69 96eebd73f194d9816676f62b7ffa9cfe5fbb01cd 26b7acc6e755b666374943d7b09f01ccce51b623 67d6ddc01d681c37c3a7f76b5e5e5e4d2b28f12f 1a339d7d6b78bbf49e52a70361d1eeb952250083 c3fb70e083712b07e4d659a660fc728444efd878 999d7959a5a161403c4c0e269ba4f20a6f8a4cd2 d4d53edd02721954a724719aabf64f03a0c2fe82 187f7bd0a79bafa575e96f32db222f6bfd83db28 7ce82abbf639ee2cd8ac1c96886de05e99b8e6cc 6ed40b3838c8b9a8028e881e7580ba6d2a7b2de5 d1bde80e5bcf96342ef9246fa15302cbe6dc28c1 2afb2be702271e2f8105eef65a2b414c880d88ce 1bc1b180531e1f6d4f6563527d72755275266790 66e59e03b06178e5e78eb99aaefdcc1e36eacc46 812ce3a27a83444407480eb5427b93f772b7b897 49e192de Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fa:7d:eb:18:59:b1:06:79:a8:8a:17:2d:dc:ab:f4:45:6b:db:45:5b] modulus: 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 public exponent: 10001 ]