Results

By type

          2021-05-20 23:21:22,084 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-05-20 23:21:25,393 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-05-20 23:21:27.891  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-05-20 23:21:37.993 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-05-20 23:21:38.991  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-05-20 23:21:39.677  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-05-20 23:21:51.294  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 31.294 seconds (JVM running for 37.418)
2021-05-20 23:36:48.679  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-20 23:36:48.687 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-20 23:36:48.889 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-20 23:36:48.978 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-20 23:36:49.078  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-20 23:36:49.081  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-20 23:36:49.085  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-20 23:36:49.086  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-20 23:36:49.175  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-20 23:36:49.182  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-20 23:36:49.185  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-20 23:36:49.378  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-20 23:36:49.384  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-20 23:36:49.385  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-20 23:36:49.398  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-20 23:36:50.579  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-20 23:36:50.590  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-20 23:36:50.591 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-20 23:36:50.677 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-20 23:36:50.678  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1891
2021-05-20 23:36:50.679  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-20 23:36:50.684  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-20 23:36:50.685  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-20 23:36:50.691  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-20 23:36:50.691  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-20 23:36:50.692 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-20 23:36:50.693 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-20 23:36:50.693 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-20 23:36:50.785 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-20 23:36:50.785 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-20 23:36:50.786 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-20 23:36:50.792 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-20 23:36:50.894 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 58509140553283633806459028356730623574685875332
             IssuerDN: UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 20 23:17:55 UTC 2021
           Final Date: Tue May 20 23:17:55 UTC 2031
            SubjectDN: UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f3:90:55:67:ce:5b:6b:8f:ec:1a:4a:c3:48:51:59:5d:8f:a1:bd:5d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5132e46f100e7c0999401bdd7b2660ffd30fb44b
                       c95eff5e881d4b6f4db049466e19ec9d26c296a0
                       47bb5c468f00dc788283fc6a98ece57125adb163
                       1d73a2bd8468dda528763adfbe642572c7423d73
                       a2b038d4246999c9865361ed3f135a3b3493d533
                       b8801c2808aefd6ee181d07739937fa9c0d3f7b1
                       6f36b19b2974b087d9265377441e27d64753dae4
                       ec3b11fe14cc5d5c5a4f29790056a26dc85343f4
                       e33994babc834ee1f3b4d7921d77049a82c27c8b
                       e14802974335993c83c4f8f8073bae8c113c6e39
                       53dbd271d6c12959ac924fffd477273d389e6784
                       ad93f994323101dea4403307d3a97a633f2eaba7
                       c48bd1890df79baa495446138837a3eb4bcacf5a
                       7874bbd98b47f212dd0f78ed9eea38c07068b39a
                       482447da42f27912f690143af610c7c12519ca86
                       2ae4a82860a8aa5c0fd93665f75310afb0832ab2
                       7afe0bcc11cc1d4b7f62e82a1023d83705939961
                       bfc24ed283c91bb4101652187f318bfd52895983
                       9b14e0950c76f3e94c4c47807e4474d673bfda7b
                       3f24d5c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [97:02:0f:c4:02:2c:6b:09:dc:ad:2c:d8:09:69:7f:0f:ed:6f:53:43]
            modulus: be05a3dfabd9c7a2503734d67ccc070bbfe88add408f694b4483b3383149efd10410c5f5b51d1ea41383818996463d89bfb71e71d59527566512d9eb144de6de24ea72daaa67badf3a039883bfbdc4acddf58205a83232cfa2048b66328da6db160dd94c8419f47f3021d87432469754f1b8aa82665d718d1503daac20414e98040a8d4c6abb6a449a49d69f4791aaba7f0fab9261c344a3f9cbd91ee7a74a1cb9792f30372de2f619131dffc3ab9dcdfbc40a98b25c34f51ce5643260e0c6ba37520ac4b3854d22f955ce1e113717801e0cb9d2458af6c1dbd07b7d4f9441703ce6e2014c15ad13dfe5e7b7c3dd9d2db06014b6f6dc0e865f9cac870e95f7bb
    public exponent: 10001

] 
2021-05-21 00:44:59.212  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-21 00:44:59.214 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-21 00:44:59.215 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-21 00:44:59.216 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-21 00:44:59.217  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-21 00:44:59.218  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-21 00:44:59.218  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-21 00:44:59.219  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-21 00:44:59.219  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-21 00:44:59.226  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-21 00:44:59.276  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-21 00:44:59.277  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-21 00:44:59.278  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-21 00:44:59.386  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-21 00:44:59.386  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-21 00:44:59.387 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-21 00:44:59.389 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-21 00:44:59.390  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1891
2021-05-21 00:44:59.391  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-21 00:44:59.392  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-21 00:44:59.393  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-21 00:44:59.393  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-21 00:44:59.394  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-21 00:44:59.394 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-21 00:44:59.394 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-21 00:44:59.395 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-21 00:44:59.475 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-21 00:44:59.476 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-21 00:44:59.476 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-21 00:44:59.477 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-21 00:44:59.482 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 58509140553283633806459028356730623574685875332
             IssuerDN: UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 20 23:17:55 UTC 2021
           Final Date: Tue May 20 23:17:55 UTC 2031
            SubjectDN: UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f3:90:55:67:ce:5b:6b:8f:ec:1a:4a:c3:48:51:59:5d:8f:a1:bd:5d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5132e46f100e7c0999401bdd7b2660ffd30fb44b
                       c95eff5e881d4b6f4db049466e19ec9d26c296a0
                       47bb5c468f00dc788283fc6a98ece57125adb163
                       1d73a2bd8468dda528763adfbe642572c7423d73
                       a2b038d4246999c9865361ed3f135a3b3493d533
                       b8801c2808aefd6ee181d07739937fa9c0d3f7b1
                       6f36b19b2974b087d9265377441e27d64753dae4
                       ec3b11fe14cc5d5c5a4f29790056a26dc85343f4
                       e33994babc834ee1f3b4d7921d77049a82c27c8b
                       e14802974335993c83c4f8f8073bae8c113c6e39
                       53dbd271d6c12959ac924fffd477273d389e6784
                       ad93f994323101dea4403307d3a97a633f2eaba7
                       c48bd1890df79baa495446138837a3eb4bcacf5a
                       7874bbd98b47f212dd0f78ed9eea38c07068b39a
                       482447da42f27912f690143af610c7c12519ca86
                       2ae4a82860a8aa5c0fd93665f75310afb0832ab2
                       7afe0bcc11cc1d4b7f62e82a1023d83705939961
                       bfc24ed283c91bb4101652187f318bfd52895983
                       9b14e0950c76f3e94c4c47807e4474d673bfda7b
                       3f24d5c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e8:34:6f:bb:62:86:73:d8:e7:c9:33:2c:3e:07:09:d4:fa:f6:41:6a]
            modulus: 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
    public exponent: 10001

] 
2021-05-21 00:46:14.667  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-21 00:46:14.667 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-21 00:46:14.669 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-21 00:46:14.669 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-21 00:46:14.670  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-21 00:46:14.670  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-21 00:46:14.671  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-21 00:46:14.671  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-21 00:46:14.671  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-21 00:46:14.676  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-21 00:46:14.676  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-21 00:46:14.677  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-21 00:46:14.678  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-21 00:46:14.777  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-21 00:46:14.778  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-21 00:46:14.779 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-21 00:46:14.781 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-21 00:46:14.782  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1891
2021-05-21 00:46:14.782  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-21 00:46:14.784  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-21 00:46:14.784  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-21 00:46:14.785  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-21 00:46:14.785  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-21 00:46:14.785 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-21 00:46:14.786 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-21 00:46:14.786 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-21 00:46:14.787 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-21 00:46:14.787 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-21 00:46:14.787 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-21 00:46:14.788 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-21 00:46:14.791 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 58509140553283633806459028356730623574685875332
             IssuerDN: UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 20 23:17:55 UTC 2021
           Final Date: Tue May 20 23:17:55 UTC 2031
            SubjectDN: UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f3:90:55:67:ce:5b:6b:8f:ec:1a:4a:c3:48:51:59:5d:8f:a1:bd:5d]
            modulus: 9309c985af9b150711e0991d56ea09bd03dac9f36d45f319e4547fc4623c94364b1c90193c1d2ef7175fc9cff6ab8398e38167cd05ea9ac57de43d312daa748293e611159d9e65a4889b4fb1a826bf0e4caa26a89027abdf7f7b8ef248f7cfa585c7c7278410b7e20964f382101bb97828df7c677cb57fbaf0247bece0a9a9a1a28ad46a1debb180bb6295b4adad2e89f98af80305cc61f4641c00e55655bc7fecb70138092c68298d097c5719ffbc2668f20db6bdcf26cc6e216da816d6c52aad764d59a3a22b461b59eb44f92ddb6c8eb3db750c2eeb89dd659c4430406fce4753604a56354dea2875e1bf096c416ed5ccb07c39e7ecf340c3e95f4ab94a095479b391ab1a8d2f52d5d43e7d5e1e5515af9912b6cf8b6530e74bf1e6c255bedfc5ee6bd6d401dae716ae4c3007fa9c4b0b4de57a80af5588b0a9be697f9b34aad2d7753b167079511cb68db36f63dde5b965463f91e583c53c4dec41f93fa42c231b69f20147dff68338247fe6d2b87674e3129aace51079e12210dbc2c327
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5132e46f100e7c0999401bdd7b2660ffd30fb44b
                       c95eff5e881d4b6f4db049466e19ec9d26c296a0
                       47bb5c468f00dc788283fc6a98ece57125adb163
                       1d73a2bd8468dda528763adfbe642572c7423d73
                       a2b038d4246999c9865361ed3f135a3b3493d533
                       b8801c2808aefd6ee181d07739937fa9c0d3f7b1
                       6f36b19b2974b087d9265377441e27d64753dae4
                       ec3b11fe14cc5d5c5a4f29790056a26dc85343f4
                       e33994babc834ee1f3b4d7921d77049a82c27c8b
                       e14802974335993c83c4f8f8073bae8c113c6e39
                       53dbd271d6c12959ac924fffd477273d389e6784
                       ad93f994323101dea4403307d3a97a633f2eaba7
                       c48bd1890df79baa495446138837a3eb4bcacf5a
                       7874bbd98b47f212dd0f78ed9eea38c07068b39a
                       482447da42f27912f690143af610c7c12519ca86
                       2ae4a82860a8aa5c0fd93665f75310afb0832ab2
                       7afe0bcc11cc1d4b7f62e82a1023d83705939961
                       bfc24ed283c91bb4101652187f318bfd52895983
                       9b14e0950c76f3e94c4c47807e4474d673bfda7b
                       3f24d5c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a0:b6:12:25:9b:dd:ee:5c:52:7d:2d:90:b8:86:15:f4:91:e9:92:27]
            modulus: 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
    public exponent: 10001

] 
2021-05-21 00:49:08.381  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-21 00:49:08.383 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-21 00:49:08.384 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-21 00:49:08.386 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-21 00:49:08.387  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-21 00:49:08.388  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-21 00:49:08.388  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-21 00:49:08.389  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-21 00:49:08.389  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-21 00:49:08.485  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-21 00:49:08.485  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-21 00:49:08.486  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-21 00:49:08.488  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-21 00:49:08.675  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-21 00:49:08.675  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-21 00:49:08.676 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-21 00:49:08.679 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-21 00:49:08.681  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1891
2021-05-21 00:49:08.682  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-21 00:49:08.684  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-21 00:49:08.685  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-21 00:49:08.686  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-21 00:49:08.686  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-21 00:49:08.687 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-21 00:49:08.687 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-21 00:49:08.688 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-21 00:49:08.689 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-21 00:49:08.690 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-21 00:49:08.693 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-21 00:49:08.780 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-21 00:49:08.786 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 58509140553283633806459028356730623574685875332
             IssuerDN: UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 20 23:17:55 UTC 2021
           Final Date: Tue May 20 23:17:55 UTC 2031
            SubjectDN: UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f3:90:55:67:ce:5b:6b:8f:ec:1a:4a:c3:48:51:59:5d:8f:a1:bd:5d]
            modulus: 9309c985af9b150711e0991d56ea09bd03dac9f36d45f319e4547fc4623c94364b1c90193c1d2ef7175fc9cff6ab8398e38167cd05ea9ac57de43d312daa748293e611159d9e65a4889b4fb1a826bf0e4caa26a89027abdf7f7b8ef248f7cfa585c7c7278410b7e20964f382101bb97828df7c677cb57fbaf0247bece0a9a9a1a28ad46a1debb180bb6295b4adad2e89f98af80305cc61f4641c00e55655bc7fecb70138092c68298d097c5719ffbc2668f20db6bdcf26cc6e216da816d6c52aad764d59a3a22b461b59eb44f92ddb6c8eb3db750c2eeb89dd659c4430406fce4753604a56354dea2875e1bf096c416ed5ccb07c39e7ecf340c3e95f4ab94a095479b391ab1a8d2f52d5d43e7d5e1e5515af9912b6cf8b6530e74bf1e6c255bedfc5ee6bd6d401dae716ae4c3007fa9c4b0b4de57a80af5588b0a9be697f9b34aad2d7753b167079511cb68db36f63dde5b965463f91e583c53c4dec41f93fa42c231b69f20147dff68338247fe6d2b87674e3129aace51079e12210dbc2c327
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5132e46f100e7c0999401bdd7b2660ffd30fb44b
                       c95eff5e881d4b6f4db049466e19ec9d26c296a0
                       47bb5c468f00dc788283fc6a98ece57125adb163
                       1d73a2bd8468dda528763adfbe642572c7423d73
                       a2b038d4246999c9865361ed3f135a3b3493d533
                       b8801c2808aefd6ee181d07739937fa9c0d3f7b1
                       6f36b19b2974b087d9265377441e27d64753dae4
                       ec3b11fe14cc5d5c5a4f29790056a26dc85343f4
                       e33994babc834ee1f3b4d7921d77049a82c27c8b
                       e14802974335993c83c4f8f8073bae8c113c6e39
                       53dbd271d6c12959ac924fffd477273d389e6784
                       ad93f994323101dea4403307d3a97a633f2eaba7
                       c48bd1890df79baa495446138837a3eb4bcacf5a
                       7874bbd98b47f212dd0f78ed9eea38c07068b39a
                       482447da42f27912f690143af610c7c12519ca86
                       2ae4a82860a8aa5c0fd93665f75310afb0832ab2
                       7afe0bcc11cc1d4b7f62e82a1023d83705939961
                       bfc24ed283c91bb4101652187f318bfd52895983
                       9b14e0950c76f3e94c4c47807e4474d673bfda7b
                       3f24d5c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b3:b2:01:a6:78:46:09:fd:ef:3c:80:9c:e2:3c:6e:8b:81:b4:78:00]
            modulus: 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
    public exponent: 10001

] 
2021-05-21 00:49:44.047  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-21 00:49:44.048 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-21 00:49:44.049 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-21 00:49:44.049 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-21 00:49:44.049  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-21 00:49:44.050  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-21 00:49:44.050  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-21 00:49:44.051  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-21 00:49:44.051  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-21 00:49:44.055  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-21 00:49:44.055  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-21 00:49:44.056  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-21 00:49:44.057  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-21 00:49:44.151  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-21 00:49:44.152  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-21 00:49:44.152 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-21 00:49:44.153 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-21 00:49:44.154  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1891
2021-05-21 00:49:44.154  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-21 00:49:44.155  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-21 00:49:44.156  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-21 00:49:44.156  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-21 00:49:44.156  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-21 00:49:44.157 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-21 00:49:44.157 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-21 00:49:44.157 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-21 00:49:44.158 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-21 00:49:44.158 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-21 00:49:44.158 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-21 00:49:44.159 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-21 00:49:44.162 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 58509140553283633806459028356730623574685875332
             IssuerDN: UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 20 23:17:55 UTC 2021
           Final Date: Tue May 20 23:17:55 UTC 2031
            SubjectDN: UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f3:90:55:67:ce:5b:6b:8f:ec:1a:4a:c3:48:51:59:5d:8f:a1:bd:5d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5132e46f100e7c0999401bdd7b2660ffd30fb44b
                       c95eff5e881d4b6f4db049466e19ec9d26c296a0
                       47bb5c468f00dc788283fc6a98ece57125adb163
                       1d73a2bd8468dda528763adfbe642572c7423d73
                       a2b038d4246999c9865361ed3f135a3b3493d533
                       b8801c2808aefd6ee181d07739937fa9c0d3f7b1
                       6f36b19b2974b087d9265377441e27d64753dae4
                       ec3b11fe14cc5d5c5a4f29790056a26dc85343f4
                       e33994babc834ee1f3b4d7921d77049a82c27c8b
                       e14802974335993c83c4f8f8073bae8c113c6e39
                       53dbd271d6c12959ac924fffd477273d389e6784
                       ad93f994323101dea4403307d3a97a633f2eaba7
                       c48bd1890df79baa495446138837a3eb4bcacf5a
                       7874bbd98b47f212dd0f78ed9eea38c07068b39a
                       482447da42f27912f690143af610c7c12519ca86
                       2ae4a82860a8aa5c0fd93665f75310afb0832ab2
                       7afe0bcc11cc1d4b7f62e82a1023d83705939961
                       bfc24ed283c91bb4101652187f318bfd52895983
                       9b14e0950c76f3e94c4c47807e4474d673bfda7b
                       3f24d5c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [15:a2:16:2c:8f:72:e1:da:72:63:95:0a:cb:d3:6b:45:bb:02:c9:d3]
            modulus: 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
    public exponent: 10001

] 
2021-05-21 00:50:35.602  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-21 00:50:35.603 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-21 00:50:35.604 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-21 00:50:35.604 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-21 00:50:35.605  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-21 00:50:35.605  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-21 00:50:35.605  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-21 00:50:35.606  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-21 00:50:35.606  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-21 00:50:35.610  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-21 00:50:35.611  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-21 00:50:35.611  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-21 00:50:35.613  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-21 00:50:35.702  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-21 00:50:35.703  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-21 00:50:35.703 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-21 00:50:35.704 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-21 00:50:35.705  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1891
2021-05-21 00:50:35.705  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-21 00:50:35.706  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-21 00:50:35.707  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-21 00:50:35.707  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-21 00:50:35.707  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-21 00:50:35.708 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-21 00:50:35.708 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-21 00:50:35.708 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-21 00:50:35.709 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-21 00:50:35.709 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-21 00:50:35.709 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-21 00:50:35.710 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-21 00:50:35.712 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 58509140553283633806459028356730623574685875332
             IssuerDN: UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 20 23:17:55 UTC 2021
           Final Date: Tue May 20 23:17:55 UTC 2031
            SubjectDN: UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f3:90:55:67:ce:5b:6b:8f:ec:1a:4a:c3:48:51:59:5d:8f:a1:bd:5d]
            modulus: 9309c985af9b150711e0991d56ea09bd03dac9f36d45f319e4547fc4623c94364b1c90193c1d2ef7175fc9cff6ab8398e38167cd05ea9ac57de43d312daa748293e611159d9e65a4889b4fb1a826bf0e4caa26a89027abdf7f7b8ef248f7cfa585c7c7278410b7e20964f382101bb97828df7c677cb57fbaf0247bece0a9a9a1a28ad46a1debb180bb6295b4adad2e89f98af80305cc61f4641c00e55655bc7fecb70138092c68298d097c5719ffbc2668f20db6bdcf26cc6e216da816d6c52aad764d59a3a22b461b59eb44f92ddb6c8eb3db750c2eeb89dd659c4430406fce4753604a56354dea2875e1bf096c416ed5ccb07c39e7ecf340c3e95f4ab94a095479b391ab1a8d2f52d5d43e7d5e1e5515af9912b6cf8b6530e74bf1e6c255bedfc5ee6bd6d401dae716ae4c3007fa9c4b0b4de57a80af5588b0a9be697f9b34aad2d7753b167079511cb68db36f63dde5b965463f91e583c53c4dec41f93fa42c231b69f20147dff68338247fe6d2b87674e3129aace51079e12210dbc2c327
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5132e46f100e7c0999401bdd7b2660ffd30fb44b
                       c95eff5e881d4b6f4db049466e19ec9d26c296a0
                       47bb5c468f00dc788283fc6a98ece57125adb163
                       1d73a2bd8468dda528763adfbe642572c7423d73
                       a2b038d4246999c9865361ed3f135a3b3493d533
                       b8801c2808aefd6ee181d07739937fa9c0d3f7b1
                       6f36b19b2974b087d9265377441e27d64753dae4
                       ec3b11fe14cc5d5c5a4f29790056a26dc85343f4
                       e33994babc834ee1f3b4d7921d77049a82c27c8b
                       e14802974335993c83c4f8f8073bae8c113c6e39
                       53dbd271d6c12959ac924fffd477273d389e6784
                       ad93f994323101dea4403307d3a97a633f2eaba7
                       c48bd1890df79baa495446138837a3eb4bcacf5a
                       7874bbd98b47f212dd0f78ed9eea38c07068b39a
                       482447da42f27912f690143af610c7c12519ca86
                       2ae4a82860a8aa5c0fd93665f75310afb0832ab2
                       7afe0bcc11cc1d4b7f62e82a1023d83705939961
                       bfc24ed283c91bb4101652187f318bfd52895983
                       9b14e0950c76f3e94c4c47807e4474d673bfda7b
                       3f24d5c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2b:b3:c3:52:31:19:d3:33:9e:e2:60:73:74:32:4d:d9:c4:75:82:b7]
            modulus: 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
    public exponent: 10001

] 
2021-05-21 00:50:39.861  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-21 00:50:39.862 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-21 00:50:39.864 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-21 00:50:39.864 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-21 00:50:39.865  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-21 00:50:39.865  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-21 00:50:39.866  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-21 00:50:39.866  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-21 00:50:39.867  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-21 00:50:39.870  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-21 00:50:39.871  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-21 00:50:39.871  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-21 00:50:39.872  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-21 00:50:39.938  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-21 00:50:39.939  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-21 00:50:39.939 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-21 00:50:39.940 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-21 00:50:39.941  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1891
2021-05-21 00:50:39.941  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-21 00:50:39.942  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-21 00:50:39.943  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-21 00:50:39.943  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-21 00:50:39.943  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-21 00:50:39.944 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-21 00:50:39.944 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-21 00:50:39.944 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-21 00:50:39.945 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-21 00:50:39.945 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-21 00:50:39.945 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-21 00:50:39.946 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-21 00:50:39.948 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 58509140553283633806459028356730623574685875332
             IssuerDN: UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 20 23:17:55 UTC 2021
           Final Date: Tue May 20 23:17:55 UTC 2031
            SubjectDN: UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f3:90:55:67:ce:5b:6b:8f:ec:1a:4a:c3:48:51:59:5d:8f:a1:bd:5d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5132e46f100e7c0999401bdd7b2660ffd30fb44b
                       c95eff5e881d4b6f4db049466e19ec9d26c296a0
                       47bb5c468f00dc788283fc6a98ece57125adb163
                       1d73a2bd8468dda528763adfbe642572c7423d73
                       a2b038d4246999c9865361ed3f135a3b3493d533
                       b8801c2808aefd6ee181d07739937fa9c0d3f7b1
                       6f36b19b2974b087d9265377441e27d64753dae4
                       ec3b11fe14cc5d5c5a4f29790056a26dc85343f4
                       e33994babc834ee1f3b4d7921d77049a82c27c8b
                       e14802974335993c83c4f8f8073bae8c113c6e39
                       53dbd271d6c12959ac924fffd477273d389e6784
                       ad93f994323101dea4403307d3a97a633f2eaba7
                       c48bd1890df79baa495446138837a3eb4bcacf5a
                       7874bbd98b47f212dd0f78ed9eea38c07068b39a
                       482447da42f27912f690143af610c7c12519ca86
                       2ae4a82860a8aa5c0fd93665f75310afb0832ab2
                       7afe0bcc11cc1d4b7f62e82a1023d83705939961
                       bfc24ed283c91bb4101652187f318bfd52895983
                       9b14e0950c76f3e94c4c47807e4474d673bfda7b
                       3f24d5c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [58:74:3a:fa:64:a9:0e:b8:e9:2b:cb:ab:56:81:58:ab:27:0e:bd:09]
            modulus: 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
    public exponent: 10001

] 
2021-05-21 00:51:08.192  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-21 00:51:08.193 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-21 00:51:08.194 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-21 00:51:08.195 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-21 00:51:08.195  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-21 00:51:08.195  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-21 00:51:08.196  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-21 00:51:08.196  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-21 00:51:08.197  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-21 00:51:08.276  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-21 00:51:08.277  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-21 00:51:08.277  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-21 00:51:08.279  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-21 00:51:08.378  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-21 00:51:08.379  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-21 00:51:08.379 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-21 00:51:08.380 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-21 00:51:08.381  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1891
2021-05-21 00:51:08.381  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-21 00:51:08.383  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-21 00:51:08.384  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-21 00:51:08.384  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-21 00:51:08.384  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-21 00:51:08.385 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-21 00:51:08.385 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-21 00:51:08.385 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-21 00:51:08.386 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-21 00:51:08.386 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-21 00:51:08.386 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-21 00:51:08.387 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-21 00:51:08.389 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 58509140553283633806459028356730623574685875332
             IssuerDN: UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 20 23:17:55 UTC 2021
           Final Date: Tue May 20 23:17:55 UTC 2031
            SubjectDN: UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f3:90:55:67:ce:5b:6b:8f:ec:1a:4a:c3:48:51:59:5d:8f:a1:bd:5d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5132e46f100e7c0999401bdd7b2660ffd30fb44b
                       c95eff5e881d4b6f4db049466e19ec9d26c296a0
                       47bb5c468f00dc788283fc6a98ece57125adb163
                       1d73a2bd8468dda528763adfbe642572c7423d73
                       a2b038d4246999c9865361ed3f135a3b3493d533
                       b8801c2808aefd6ee181d07739937fa9c0d3f7b1
                       6f36b19b2974b087d9265377441e27d64753dae4
                       ec3b11fe14cc5d5c5a4f29790056a26dc85343f4
                       e33994babc834ee1f3b4d7921d77049a82c27c8b
                       e14802974335993c83c4f8f8073bae8c113c6e39
                       53dbd271d6c12959ac924fffd477273d389e6784
                       ad93f994323101dea4403307d3a97a633f2eaba7
                       c48bd1890df79baa495446138837a3eb4bcacf5a
                       7874bbd98b47f212dd0f78ed9eea38c07068b39a
                       482447da42f27912f690143af610c7c12519ca86
                       2ae4a82860a8aa5c0fd93665f75310afb0832ab2
                       7afe0bcc11cc1d4b7f62e82a1023d83705939961
                       bfc24ed283c91bb4101652187f318bfd52895983
                       9b14e0950c76f3e94c4c47807e4474d673bfda7b
                       3f24d5c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [32:ee:f9:fe:46:ce:c9:d3:99:1f:21:44:0d:f1:cb:94:ec:b0:7f:ae]
            modulus: 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
    public exponent: 10001

] 
2021-05-21 00:52:46.597  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-21 00:52:46.598 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-21 00:52:46.599 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-21 00:52:46.600 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-21 00:52:46.600  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-21 00:52:46.600  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-21 00:52:46.601  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-21 00:52:46.601  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-21 00:52:46.601  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-21 00:52:46.605  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-21 00:52:46.606  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-21 00:52:46.606  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-21 00:52:46.607  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-21 00:52:46.696  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-21 00:52:46.697  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-21 00:52:46.697 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-21 00:52:46.698 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-21 00:52:46.699  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1891
2021-05-21 00:52:46.699  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-21 00:52:46.700  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-21 00:52:46.700  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-21 00:52:46.701  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-21 00:52:46.701  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-21 00:52:46.701 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-21 00:52:46.701 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-21 00:52:46.702 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-21 00:52:46.702 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-21 00:52:46.702 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-21 00:52:46.703 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-21 00:52:46.703 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-21 00:52:46.706 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 58509140553283633806459028356730623574685875332
             IssuerDN: UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 20 23:17:55 UTC 2021
           Final Date: Tue May 20 23:17:55 UTC 2031
            SubjectDN: UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f3:90:55:67:ce:5b:6b:8f:ec:1a:4a:c3:48:51:59:5d:8f:a1:bd:5d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5132e46f100e7c0999401bdd7b2660ffd30fb44b
                       c95eff5e881d4b6f4db049466e19ec9d26c296a0
                       47bb5c468f00dc788283fc6a98ece57125adb163
                       1d73a2bd8468dda528763adfbe642572c7423d73
                       a2b038d4246999c9865361ed3f135a3b3493d533
                       b8801c2808aefd6ee181d07739937fa9c0d3f7b1
                       6f36b19b2974b087d9265377441e27d64753dae4
                       ec3b11fe14cc5d5c5a4f29790056a26dc85343f4
                       e33994babc834ee1f3b4d7921d77049a82c27c8b
                       e14802974335993c83c4f8f8073bae8c113c6e39
                       53dbd271d6c12959ac924fffd477273d389e6784
                       ad93f994323101dea4403307d3a97a633f2eaba7
                       c48bd1890df79baa495446138837a3eb4bcacf5a
                       7874bbd98b47f212dd0f78ed9eea38c07068b39a
                       482447da42f27912f690143af610c7c12519ca86
                       2ae4a82860a8aa5c0fd93665f75310afb0832ab2
                       7afe0bcc11cc1d4b7f62e82a1023d83705939961
                       bfc24ed283c91bb4101652187f318bfd52895983
                       9b14e0950c76f3e94c4c47807e4474d673bfda7b
                       3f24d5c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [59:de:72:e9:36:a6:ce:55:d9:f4:41:6f:cd:60:45:25:92:44:3b:df]
            modulus: 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
    public exponent: 10001

] 
2021-05-21 00:55:27.802  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-21 00:55:27.803 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-21 00:55:27.804 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-21 00:55:27.804 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-21 00:55:27.804  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-21 00:55:27.805  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-21 00:55:27.805  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-21 00:55:27.805  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-21 00:55:27.805  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-21 00:55:27.809  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-21 00:55:27.810  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-21 00:55:27.810  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-21 00:55:27.811  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-21 00:55:27.885  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-21 00:55:27.886  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-21 00:55:27.886 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-21 00:55:27.887 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-21 00:55:27.888  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1891
2021-05-21 00:55:27.888  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-21 00:55:27.890  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-21 00:55:27.890  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-21 00:55:27.890  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-21 00:55:27.890  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-21 00:55:27.891 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-21 00:55:27.891 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-21 00:55:27.891 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-21 00:55:27.892 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-21 00:55:27.892 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-21 00:55:27.892 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-21 00:55:27.893 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-21 00:55:27.895 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 58509140553283633806459028356730623574685875332
             IssuerDN: UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 20 23:17:55 UTC 2021
           Final Date: Tue May 20 23:17:55 UTC 2031
            SubjectDN: UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f3:90:55:67:ce:5b:6b:8f:ec:1a:4a:c3:48:51:59:5d:8f:a1:bd:5d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5132e46f100e7c0999401bdd7b2660ffd30fb44b
                       c95eff5e881d4b6f4db049466e19ec9d26c296a0
                       47bb5c468f00dc788283fc6a98ece57125adb163
                       1d73a2bd8468dda528763adfbe642572c7423d73
                       a2b038d4246999c9865361ed3f135a3b3493d533
                       b8801c2808aefd6ee181d07739937fa9c0d3f7b1
                       6f36b19b2974b087d9265377441e27d64753dae4
                       ec3b11fe14cc5d5c5a4f29790056a26dc85343f4
                       e33994babc834ee1f3b4d7921d77049a82c27c8b
                       e14802974335993c83c4f8f8073bae8c113c6e39
                       53dbd271d6c12959ac924fffd477273d389e6784
                       ad93f994323101dea4403307d3a97a633f2eaba7
                       c48bd1890df79baa495446138837a3eb4bcacf5a
                       7874bbd98b47f212dd0f78ed9eea38c07068b39a
                       482447da42f27912f690143af610c7c12519ca86
                       2ae4a82860a8aa5c0fd93665f75310afb0832ab2
                       7afe0bcc11cc1d4b7f62e82a1023d83705939961
                       bfc24ed283c91bb4101652187f318bfd52895983
                       9b14e0950c76f3e94c4c47807e4474d673bfda7b
                       3f24d5c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [83:76:32:00:92:c7:bc:a0:7f:d6:83:9d:da:bc:a3:2d:89:c9:b6:39]
            modulus: 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
    public exponent: 10001

] 
2021-05-21 00:58:03.999  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-21 00:58:04.001 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-21 00:58:04.002 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-21 00:58:04.002 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-21 00:58:04.002  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-21 00:58:04.003  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-21 00:58:04.003  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-21 00:58:04.003  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-21 00:58:04.004  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-21 00:58:04.008  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-21 00:58:04.008  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-21 00:58:04.009  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-21 00:58:04.010  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-21 00:58:04.102  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-21 00:58:04.103  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-21 00:58:04.103 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-21 00:58:04.104 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-21 00:58:04.104  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1891
2021-05-21 00:58:04.105  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-21 00:58:04.106  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-21 00:58:04.106  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-21 00:58:04.106  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-21 00:58:04.107  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-21 00:58:04.107 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-21 00:58:04.107 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-21 00:58:04.107 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-21 00:58:04.108 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-21 00:58:04.108 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-21 00:58:04.108 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-21 00:58:04.109 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-21 00:58:04.111 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 58509140553283633806459028356730623574685875332
             IssuerDN: UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 20 23:17:55 UTC 2021
           Final Date: Tue May 20 23:17:55 UTC 2031
            SubjectDN: UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f3:90:55:67:ce:5b:6b:8f:ec:1a:4a:c3:48:51:59:5d:8f:a1:bd:5d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5132e46f100e7c0999401bdd7b2660ffd30fb44b
                       c95eff5e881d4b6f4db049466e19ec9d26c296a0
                       47bb5c468f00dc788283fc6a98ece57125adb163
                       1d73a2bd8468dda528763adfbe642572c7423d73
                       a2b038d4246999c9865361ed3f135a3b3493d533
                       b8801c2808aefd6ee181d07739937fa9c0d3f7b1
                       6f36b19b2974b087d9265377441e27d64753dae4
                       ec3b11fe14cc5d5c5a4f29790056a26dc85343f4
                       e33994babc834ee1f3b4d7921d77049a82c27c8b
                       e14802974335993c83c4f8f8073bae8c113c6e39
                       53dbd271d6c12959ac924fffd477273d389e6784
                       ad93f994323101dea4403307d3a97a633f2eaba7
                       c48bd1890df79baa495446138837a3eb4bcacf5a
                       7874bbd98b47f212dd0f78ed9eea38c07068b39a
                       482447da42f27912f690143af610c7c12519ca86
                       2ae4a82860a8aa5c0fd93665f75310afb0832ab2
                       7afe0bcc11cc1d4b7f62e82a1023d83705939961
                       bfc24ed283c91bb4101652187f318bfd52895983
                       9b14e0950c76f3e94c4c47807e4474d673bfda7b
                       3f24d5c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [12:60:76:0a:53:c6:44:85:3c:26:b6:d3:90:71:ce:d3:c9:8b:76:05]
            modulus: 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
    public exponent: 10001

] 
2021-05-21 00:59:59.507  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-21 00:59:59.508 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-21 00:59:59.509 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-21 00:59:59.509 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-21 00:59:59.510  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-21 00:59:59.510  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-21 00:59:59.510  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-21 00:59:59.510  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-21 00:59:59.511  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-21 00:59:59.514  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-21 00:59:59.515  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-21 00:59:59.515  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-21 00:59:59.516  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-21 00:59:59.616  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-21 00:59:59.616  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-21 00:59:59.617 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-21 00:59:59.618 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-21 00:59:59.618  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1891
2021-05-21 00:59:59.618  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-21 00:59:59.619  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-21 00:59:59.620  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-21 00:59:59.620  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-21 00:59:59.620  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-21 00:59:59.621 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-21 00:59:59.621 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-21 00:59:59.621 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-21 00:59:59.622 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-21 00:59:59.622 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-21 00:59:59.622 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-21 00:59:59.623 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-21 00:59:59.625 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 58509140553283633806459028356730623574685875332
             IssuerDN: UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 20 23:17:55 UTC 2021
           Final Date: Tue May 20 23:17:55 UTC 2031
            SubjectDN: UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f3:90:55:67:ce:5b:6b:8f:ec:1a:4a:c3:48:51:59:5d:8f:a1:bd:5d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5132e46f100e7c0999401bdd7b2660ffd30fb44b
                       c95eff5e881d4b6f4db049466e19ec9d26c296a0
                       47bb5c468f00dc788283fc6a98ece57125adb163
                       1d73a2bd8468dda528763adfbe642572c7423d73
                       a2b038d4246999c9865361ed3f135a3b3493d533
                       b8801c2808aefd6ee181d07739937fa9c0d3f7b1
                       6f36b19b2974b087d9265377441e27d64753dae4
                       ec3b11fe14cc5d5c5a4f29790056a26dc85343f4
                       e33994babc834ee1f3b4d7921d77049a82c27c8b
                       e14802974335993c83c4f8f8073bae8c113c6e39
                       53dbd271d6c12959ac924fffd477273d389e6784
                       ad93f994323101dea4403307d3a97a633f2eaba7
                       c48bd1890df79baa495446138837a3eb4bcacf5a
                       7874bbd98b47f212dd0f78ed9eea38c07068b39a
                       482447da42f27912f690143af610c7c12519ca86
                       2ae4a82860a8aa5c0fd93665f75310afb0832ab2
                       7afe0bcc11cc1d4b7f62e82a1023d83705939961
                       bfc24ed283c91bb4101652187f318bfd52895983
                       9b14e0950c76f3e94c4c47807e4474d673bfda7b
                       3f24d5c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3c:26:8a:fc:19:24:bc:43:a1:31:a5:7a:f2:75:c4:9f:2b:31:68:a4]
            modulus: 981802c749790315368d2eaf385a2764d9eeb7e51c6a8e9b6f2b3738a115a28a9d847648063dc3e030b321858727f5572e8b71f8f7e950bfc62c05a65b744ac815902d3a253f5cb67a768a4ad69f9457050db7a25c5275ae0ddeec5ddceb356abe61d7e9de6a3658d8c65ad9ae0f77b7d8f7fb7f1001c96ad74f35d3ac27fdfdfc0989d7fff255d7aaf192d6d95753dd9adcfdcdf81f8c7372606ae0860767f306bdeb10968c5ff5834de71639128f12aad6465f31f701d5033dc7c2d4f10ce4e8c15bff9a2792747a00e3ddcc62d83a2945f188aed77dc27fc6292308bdd8d91bd17de66da2d191ee7372acfc4c05f1dc66919e39724273b6d93304d90d4c2d
    public exponent: 10001

] 
2021-05-21 01:01:35.954  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-21 01:01:35.956 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-21 01:01:35.957 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-21 01:01:35.958 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-21 01:01:35.958  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-21 01:01:35.959  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-21 01:01:35.959  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-21 01:01:35.959  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-21 01:01:35.959  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-21 01:01:35.963  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-21 01:01:35.964  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-21 01:01:35.964  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-21 01:01:35.965  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-21 01:01:36.078  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-21 01:01:36.078  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-21 01:01:36.078 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-21 01:01:36.079 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-21 01:01:36.080  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1891
2021-05-21 01:01:36.080  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-21 01:01:36.081  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-21 01:01:36.081  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-21 01:01:36.082  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-21 01:01:36.082  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-21 01:01:36.082 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-21 01:01:36.083 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-21 01:01:36.083 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-21 01:01:36.084 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-21 01:01:36.084 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-21 01:01:36.084 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-21 01:01:36.085 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-21 01:01:36.087 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 58509140553283633806459028356730623574685875332
             IssuerDN: UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 20 23:17:55 UTC 2021
           Final Date: Tue May 20 23:17:55 UTC 2031
            SubjectDN: UID=c-00ce4ba43dba38626,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f3:90:55:67:ce:5b:6b:8f:ec:1a:4a:c3:48:51:59:5d:8f:a1:bd:5d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5132e46f100e7c0999401bdd7b2660ffd30fb44b
                       c95eff5e881d4b6f4db049466e19ec9d26c296a0
                       47bb5c468f00dc788283fc6a98ece57125adb163
                       1d73a2bd8468dda528763adfbe642572c7423d73
                       a2b038d4246999c9865361ed3f135a3b3493d533
                       b8801c2808aefd6ee181d07739937fa9c0d3f7b1
                       6f36b19b2974b087d9265377441e27d64753dae4
                       ec3b11fe14cc5d5c5a4f29790056a26dc85343f4
                       e33994babc834ee1f3b4d7921d77049a82c27c8b
                       e14802974335993c83c4f8f8073bae8c113c6e39
                       53dbd271d6c12959ac924fffd477273d389e6784
                       ad93f994323101dea4403307d3a97a633f2eaba7
                       c48bd1890df79baa495446138837a3eb4bcacf5a
                       7874bbd98b47f212dd0f78ed9eea38c07068b39a
                       482447da42f27912f690143af610c7c12519ca86
                       2ae4a82860a8aa5c0fd93665f75310afb0832ab2
                       7afe0bcc11cc1d4b7f62e82a1023d83705939961
                       bfc24ed283c91bb4101652187f318bfd52895983
                       9b14e0950c76f3e94c4c47807e4474d673bfda7b
                       3f24d5c8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bd:59:ed:86:4d:e2:97:0c:00:1c:6d:f2:2f:49:ad:72:a0:0a:b5:d6]
            modulus: 8184f9b8273b07241b6bb6b852a2ec4b9326cad4bfa7a2d70ee5e9b7de0d88f839d99e1ec86d6f78ace8c84dd9cb0555783b3712c10ad4e54b41ade9152421bd33317ea170e3fb9e90ff2045c17e9658118c6fd808294ca15ac136c5dbefa2aa3ef6c07be2c9ecbc90efd1eef6b2280227e21570ecab494477e7e60f6fec2e3c382ee52fd78a49e35f981ec31a10aad747bbde6e18ca02e0baff0fe0b41922777a1ce0fb012532162dda4334bddf2667ad9902e1dcf78fc6aa11662577b86a0cb459b30c9f9681634b38490bdc7000d03541660b995983b2454dac936f41e5660dd11d0088740f041d7f96724ef9bde01ac007c66d8411ca7e89c74790fdfdd3
    public exponent: 10001

]