Results

By type

          2021-05-28 23:36:38,674 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-05-28 23:36:43,275 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-05-28 23:36:46.282  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-05-28 23:36:59.185 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-05-28 23:37:00.467  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-05-28 23:37:01.267  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-05-28 23:37:16.787  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 40.715 seconds (JVM running for 48.767)
2021-05-28 23:38:24.768  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-28 23:38:24.868 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-28 23:38:24.982 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-28 23:38:24.986 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-28 23:38:25.071  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-28 23:38:25.075  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-28 23:38:25.080  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-28 23:38:25.081  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-28 23:38:25.082  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-28 23:38:25.172  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-28 23:38:25.175  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-28 23:38:25.373  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-28 23:38:25.377  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-28 23:38:25.378  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-28 23:38:25.469  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-28 23:38:26.711  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-28 23:38:26.715  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-28 23:38:26.716 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-28 23:38:26.764 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-28 23:38:26.766  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1680
2021-05-28 23:38:26.767  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-28 23:38:26.772  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-28 23:38:26.773  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-28 23:38:26.780  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-28 23:38:26.781  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-28 23:38:26.781 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-28 23:38:26.782 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-28 23:38:26.864 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-28 23:38:26.878 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-28 23:38:26.879 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-28 23:38:26.879 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-28 23:38:26.968 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-28 23:38:27.167 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 554880286818426390701532894652223652940088870757
             IssuerDN: UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 28 23:14:52 UTC 2021
           Final Date: Wed May 28 23:14:52 UTC 2031
            SubjectDN: UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [18:89:fb:22:3f:89:35:12:0c:e2:bf:2b:df:f1:27:17:c5:92:e8:41]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7c340cdcfa92e907d497473a4d57fe8820592ae2
                       a112dcd999200927eac3c987108f71c04d99b2ef
                       f7c475aecc7939c36d45e7db43f5a781748d5e02
                       f842c9fd00696656fc9255c21f2d5a6eb799e32a
                       ec69be73f64dbe90b154a8c4240f16b743c7aa75
                       213384393bd1f8d1664f7adfcce8b43ff628f7a6
                       280823924e53a391560ac6c3c047f3bc5b7fda5c
                       5577bef01d936ece4970a8c583001da9904e10b4
                       b7e9f26d4fdad493043914e8f9d454197c188b47
                       e0315ab36b3131026ca721ad47e70ab776f3c153
                       fc89bb072a10dea8f4aab4c39f520124263cf978
                       ab88e5ff1f26253460a41aabf3d7cb5f3235b095
                       e64c713768d443ec83ea1d9e1a1ecfc7de5248e1
                       aa500a5082a5de39980be3cb774ed29901a85be9
                       95cc1b26e11b4e0d5d175675df39e24c09b3861a
                       9e3ce647e870605f5b330d818da04fd455e1e857
                       e002b7c277bfe2e7e0e75c39cd00ccf7b2de658a
                       a865a2b2f4d269404ec8a84a70e98a0b4e63b0be
                       bd4f169775bfd3cfeec43caaf207b3769358e55e
                       fb03b5ee
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2b:33:57:b9:d1:7d:f2:0d:5b:08:43:d8:bd:a5:2d:1e:62:a3:0b:3b]
            modulus: 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
    public exponent: 10001

] 
2021-05-29 00:42:37.973  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-29 00:42:37.976 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-29 00:42:38.065 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-29 00:42:38.067 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-29 00:42:38.068  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-29 00:42:38.069  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-29 00:42:38.070  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-29 00:42:38.070  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-29 00:42:38.072  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-29 00:42:38.168  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-29 00:42:38.170  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-29 00:42:38.170  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-29 00:42:38.175  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-29 00:42:38.364  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-29 00:42:38.365  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-29 00:42:38.366 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-29 00:42:38.372 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-29 00:42:38.373  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1680
2021-05-29 00:42:38.374  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-29 00:42:38.377  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-29 00:42:38.378  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-29 00:42:38.378  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-29 00:42:38.379  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-29 00:42:38.379 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-29 00:42:38.380 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-29 00:42:38.380 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-29 00:42:38.381 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-29 00:42:38.381 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-29 00:42:38.381 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-29 00:42:38.466 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-29 00:42:38.471 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 554880286818426390701532894652223652940088870757
             IssuerDN: UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 28 23:14:52 UTC 2021
           Final Date: Wed May 28 23:14:52 UTC 2031
            SubjectDN: UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [18:89:fb:22:3f:89:35:12:0c:e2:bf:2b:df:f1:27:17:c5:92:e8:41]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7c340cdcfa92e907d497473a4d57fe8820592ae2
                       a112dcd999200927eac3c987108f71c04d99b2ef
                       f7c475aecc7939c36d45e7db43f5a781748d5e02
                       f842c9fd00696656fc9255c21f2d5a6eb799e32a
                       ec69be73f64dbe90b154a8c4240f16b743c7aa75
                       213384393bd1f8d1664f7adfcce8b43ff628f7a6
                       280823924e53a391560ac6c3c047f3bc5b7fda5c
                       5577bef01d936ece4970a8c583001da9904e10b4
                       b7e9f26d4fdad493043914e8f9d454197c188b47
                       e0315ab36b3131026ca721ad47e70ab776f3c153
                       fc89bb072a10dea8f4aab4c39f520124263cf978
                       ab88e5ff1f26253460a41aabf3d7cb5f3235b095
                       e64c713768d443ec83ea1d9e1a1ecfc7de5248e1
                       aa500a5082a5de39980be3cb774ed29901a85be9
                       95cc1b26e11b4e0d5d175675df39e24c09b3861a
                       9e3ce647e870605f5b330d818da04fd455e1e857
                       e002b7c277bfe2e7e0e75c39cd00ccf7b2de658a
                       a865a2b2f4d269404ec8a84a70e98a0b4e63b0be
                       bd4f169775bfd3cfeec43caaf207b3769358e55e
                       fb03b5ee
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5c:ad:f2:0c:58:39:d4:5f:e1:01:09:ad:2f:71:f6:9d:bf:d0:a2:e0]
            modulus: 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
    public exponent: 10001

] 
2021-05-29 00:44:53.136  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-29 00:44:53.136 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-29 00:44:53.137 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-29 00:44:53.138 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-29 00:44:53.138  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-29 00:44:53.139  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-29 00:44:53.140  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-29 00:44:53.140  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-29 00:44:53.141  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-29 00:44:53.149  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-29 00:44:53.164  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-29 00:44:53.165  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-29 00:44:53.168  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-29 00:44:53.261  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-29 00:44:53.263  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-29 00:44:53.264 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-29 00:44:53.266 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-29 00:44:53.267  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1680
2021-05-29 00:44:53.267  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-29 00:44:53.272  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-29 00:44:53.273  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-29 00:44:53.274  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-29 00:44:53.275  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-29 00:44:53.276 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-29 00:44:53.276 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-29 00:44:53.276 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-29 00:44:53.277 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-29 00:44:53.277 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-29 00:44:53.278 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-29 00:44:53.279 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-29 00:44:53.365 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 554880286818426390701532894652223652940088870757
             IssuerDN: UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 28 23:14:52 UTC 2021
           Final Date: Wed May 28 23:14:52 UTC 2031
            SubjectDN: UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [18:89:fb:22:3f:89:35:12:0c:e2:bf:2b:df:f1:27:17:c5:92:e8:41]
            modulus: bc7f6059ed5edba8a9c71efcdb4403f0c73027841d610699e05b2d1ffc8dc69e801bf0ea633879de0a52a424a84598ecf04a92efb6b2365e57fac7b81ea253dc9ed09d908307b1b3cf7ffa162a4483fa2e5421e6f8a04563733a50c109d703e293a8a291a765c0c13e19680d050b536a23d86943e52646dd32ec3298b69ac8d057c7d64943a161e2887f98ff850254611a448cdb89d44e4abf1dfb48cc55882e3f226f2f3a280bd4a77140566835912aa158b0d9d63be66fa314cf379cc5d1b17af85bf150fbc34324fe11e984f6b5edde0f2b86bb81476d5a2f5caa4ad47f873220f27718b58d997e235d069d6f36a178b566f52116c24b9a306c902b029b24772494cc9bee5d412acf00424f44324fb660ef0b1b6b6504e9943b281bb5dd4f4f6705e08d55764e0bf158a43ff98b7639e2b8a46b22294892951d98275f98ea493940e59d50ac7722948de079b5cfebf98d545e43c9a61cbc948ec0da87ce312eb1409b2e0dda650a822bf970ce751302aa6bfc04c98a7f665dc2c324118dbb
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7c340cdcfa92e907d497473a4d57fe8820592ae2
                       a112dcd999200927eac3c987108f71c04d99b2ef
                       f7c475aecc7939c36d45e7db43f5a781748d5e02
                       f842c9fd00696656fc9255c21f2d5a6eb799e32a
                       ec69be73f64dbe90b154a8c4240f16b743c7aa75
                       213384393bd1f8d1664f7adfcce8b43ff628f7a6
                       280823924e53a391560ac6c3c047f3bc5b7fda5c
                       5577bef01d936ece4970a8c583001da9904e10b4
                       b7e9f26d4fdad493043914e8f9d454197c188b47
                       e0315ab36b3131026ca721ad47e70ab776f3c153
                       fc89bb072a10dea8f4aab4c39f520124263cf978
                       ab88e5ff1f26253460a41aabf3d7cb5f3235b095
                       e64c713768d443ec83ea1d9e1a1ecfc7de5248e1
                       aa500a5082a5de39980be3cb774ed29901a85be9
                       95cc1b26e11b4e0d5d175675df39e24c09b3861a
                       9e3ce647e870605f5b330d818da04fd455e1e857
                       e002b7c277bfe2e7e0e75c39cd00ccf7b2de658a
                       a865a2b2f4d269404ec8a84a70e98a0b4e63b0be
                       bd4f169775bfd3cfeec43caaf207b3769358e55e
                       fb03b5ee
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3e:f3:67:35:8c:e6:40:a7:55:fd:0e:9b:5b:cf:6f:da:69:11:78:f8]
            modulus: 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
    public exponent: 10001

] 
2021-05-29 00:47:52.172  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-29 00:47:52.174 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-29 00:47:52.175 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-29 00:47:52.175 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-29 00:47:52.176  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-29 00:47:52.176  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-29 00:47:52.177  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-29 00:47:52.177  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-29 00:47:52.178  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-29 00:47:52.183  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-29 00:47:52.264  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-29 00:47:52.264  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-29 00:47:52.267  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-29 00:47:52.361  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-29 00:47:52.363  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-29 00:47:52.364 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-29 00:47:52.367 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-29 00:47:52.368  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1680
2021-05-29 00:47:52.369  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-29 00:47:52.371  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-29 00:47:52.372  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-29 00:47:52.372  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-29 00:47:52.372  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-29 00:47:52.373 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-29 00:47:52.373 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-29 00:47:52.374 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-29 00:47:52.374 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-29 00:47:52.375 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-29 00:47:52.375 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-29 00:47:52.376 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-29 00:47:52.379 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 554880286818426390701532894652223652940088870757
             IssuerDN: UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 28 23:14:52 UTC 2021
           Final Date: Wed May 28 23:14:52 UTC 2031
            SubjectDN: UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [18:89:fb:22:3f:89:35:12:0c:e2:bf:2b:df:f1:27:17:c5:92:e8:41]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7c340cdcfa92e907d497473a4d57fe8820592ae2
                       a112dcd999200927eac3c987108f71c04d99b2ef
                       f7c475aecc7939c36d45e7db43f5a781748d5e02
                       f842c9fd00696656fc9255c21f2d5a6eb799e32a
                       ec69be73f64dbe90b154a8c4240f16b743c7aa75
                       213384393bd1f8d1664f7adfcce8b43ff628f7a6
                       280823924e53a391560ac6c3c047f3bc5b7fda5c
                       5577bef01d936ece4970a8c583001da9904e10b4
                       b7e9f26d4fdad493043914e8f9d454197c188b47
                       e0315ab36b3131026ca721ad47e70ab776f3c153
                       fc89bb072a10dea8f4aab4c39f520124263cf978
                       ab88e5ff1f26253460a41aabf3d7cb5f3235b095
                       e64c713768d443ec83ea1d9e1a1ecfc7de5248e1
                       aa500a5082a5de39980be3cb774ed29901a85be9
                       95cc1b26e11b4e0d5d175675df39e24c09b3861a
                       9e3ce647e870605f5b330d818da04fd455e1e857
                       e002b7c277bfe2e7e0e75c39cd00ccf7b2de658a
                       a865a2b2f4d269404ec8a84a70e98a0b4e63b0be
                       bd4f169775bfd3cfeec43caaf207b3769358e55e
                       fb03b5ee
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [12:e6:cc:88:16:7f:bb:7d:54:df:0b:5a:8d:38:9a:eb:10:a4:52:5e]
            modulus: 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
    public exponent: 10001

] 
2021-05-29 00:48:04.395  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-29 00:48:04.396 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-29 00:48:04.397 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-29 00:48:04.398 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-29 00:48:04.398  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-29 00:48:04.399  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-29 00:48:04.399  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-29 00:48:04.399  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-29 00:48:04.400  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-29 00:48:04.404  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-29 00:48:04.404  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-29 00:48:04.404  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-29 00:48:04.406  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-29 00:48:04.556  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-29 00:48:04.556  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-29 00:48:04.557 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-29 00:48:04.564 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-29 00:48:04.565  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1680
2021-05-29 00:48:04.565  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-29 00:48:04.567  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-29 00:48:04.568  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-29 00:48:04.568  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-29 00:48:04.569  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-29 00:48:04.569 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-29 00:48:04.570 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-29 00:48:04.570 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-29 00:48:04.571 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-29 00:48:04.571 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-29 00:48:04.572 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-29 00:48:04.572 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-29 00:48:04.575 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 554880286818426390701532894652223652940088870757
             IssuerDN: UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 28 23:14:52 UTC 2021
           Final Date: Wed May 28 23:14:52 UTC 2031
            SubjectDN: UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [18:89:fb:22:3f:89:35:12:0c:e2:bf:2b:df:f1:27:17:c5:92:e8:41]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7c340cdcfa92e907d497473a4d57fe8820592ae2
                       a112dcd999200927eac3c987108f71c04d99b2ef
                       f7c475aecc7939c36d45e7db43f5a781748d5e02
                       f842c9fd00696656fc9255c21f2d5a6eb799e32a
                       ec69be73f64dbe90b154a8c4240f16b743c7aa75
                       213384393bd1f8d1664f7adfcce8b43ff628f7a6
                       280823924e53a391560ac6c3c047f3bc5b7fda5c
                       5577bef01d936ece4970a8c583001da9904e10b4
                       b7e9f26d4fdad493043914e8f9d454197c188b47
                       e0315ab36b3131026ca721ad47e70ab776f3c153
                       fc89bb072a10dea8f4aab4c39f520124263cf978
                       ab88e5ff1f26253460a41aabf3d7cb5f3235b095
                       e64c713768d443ec83ea1d9e1a1ecfc7de5248e1
                       aa500a5082a5de39980be3cb774ed29901a85be9
                       95cc1b26e11b4e0d5d175675df39e24c09b3861a
                       9e3ce647e870605f5b330d818da04fd455e1e857
                       e002b7c277bfe2e7e0e75c39cd00ccf7b2de658a
                       a865a2b2f4d269404ec8a84a70e98a0b4e63b0be
                       bd4f169775bfd3cfeec43caaf207b3769358e55e
                       fb03b5ee
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [dc:de:b1:ea:3d:7b:df:f9:83:c4:56:ed:73:4c:4e:4b:44:e6:39:34]
            modulus: 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
    public exponent: 10001

] 
2021-05-29 00:48:44.675  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-29 00:48:44.676 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-29 00:48:44.677 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-29 00:48:44.678 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-29 00:48:44.679  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-29 00:48:44.680  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-29 00:48:44.680  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-29 00:48:44.681  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-29 00:48:44.681  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-29 00:48:44.686  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-29 00:48:44.686  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-29 00:48:44.687  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-29 00:48:44.688  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-29 00:48:44.863  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-29 00:48:44.864  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-29 00:48:44.865 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-29 00:48:44.868 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-29 00:48:44.869  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1680
2021-05-29 00:48:44.870  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-29 00:48:44.872  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-29 00:48:44.873  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-29 00:48:44.874  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-29 00:48:44.874  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-29 00:48:44.875 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-29 00:48:44.875 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-29 00:48:44.876 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-29 00:48:44.876 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-29 00:48:44.877 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-29 00:48:44.877 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-29 00:48:44.878 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-29 00:48:44.882 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 554880286818426390701532894652223652940088870757
             IssuerDN: UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 28 23:14:52 UTC 2021
           Final Date: Wed May 28 23:14:52 UTC 2031
            SubjectDN: UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [18:89:fb:22:3f:89:35:12:0c:e2:bf:2b:df:f1:27:17:c5:92:e8:41]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7c340cdcfa92e907d497473a4d57fe8820592ae2
                       a112dcd999200927eac3c987108f71c04d99b2ef
                       f7c475aecc7939c36d45e7db43f5a781748d5e02
                       f842c9fd00696656fc9255c21f2d5a6eb799e32a
                       ec69be73f64dbe90b154a8c4240f16b743c7aa75
                       213384393bd1f8d1664f7adfcce8b43ff628f7a6
                       280823924e53a391560ac6c3c047f3bc5b7fda5c
                       5577bef01d936ece4970a8c583001da9904e10b4
                       b7e9f26d4fdad493043914e8f9d454197c188b47
                       e0315ab36b3131026ca721ad47e70ab776f3c153
                       fc89bb072a10dea8f4aab4c39f520124263cf978
                       ab88e5ff1f26253460a41aabf3d7cb5f3235b095
                       e64c713768d443ec83ea1d9e1a1ecfc7de5248e1
                       aa500a5082a5de39980be3cb774ed29901a85be9
                       95cc1b26e11b4e0d5d175675df39e24c09b3861a
                       9e3ce647e870605f5b330d818da04fd455e1e857
                       e002b7c277bfe2e7e0e75c39cd00ccf7b2de658a
                       a865a2b2f4d269404ec8a84a70e98a0b4e63b0be
                       bd4f169775bfd3cfeec43caaf207b3769358e55e
                       fb03b5ee
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fa:bf:11:e4:bb:d8:da:f1:92:bd:7f:72:ce:06:01:db:e6:89:37:d6]
            modulus: 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
    public exponent: 10001

] 
2021-05-29 00:48:54.566  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-29 00:48:54.567 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-29 00:48:54.569 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-29 00:48:54.569 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-29 00:48:54.570  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-29 00:48:54.571  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-29 00:48:54.571  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-29 00:48:54.572  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-29 00:48:54.572  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-29 00:48:54.576  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-29 00:48:54.576  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-29 00:48:54.576  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-29 00:48:54.577  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-29 00:48:54.650  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-29 00:48:54.664  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-29 00:48:54.664 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-29 00:48:54.666 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-29 00:48:54.666  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1680
2021-05-29 00:48:54.667  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-29 00:48:54.669  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-29 00:48:54.670  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-29 00:48:54.670  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-29 00:48:54.670  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-29 00:48:54.671 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-29 00:48:54.671 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-29 00:48:54.672 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-29 00:48:54.673 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-29 00:48:54.673 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-29 00:48:54.673 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-29 00:48:54.674 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-29 00:48:54.676 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 554880286818426390701532894652223652940088870757
             IssuerDN: UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 28 23:14:52 UTC 2021
           Final Date: Wed May 28 23:14:52 UTC 2031
            SubjectDN: UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [18:89:fb:22:3f:89:35:12:0c:e2:bf:2b:df:f1:27:17:c5:92:e8:41]
            modulus: bc7f6059ed5edba8a9c71efcdb4403f0c73027841d610699e05b2d1ffc8dc69e801bf0ea633879de0a52a424a84598ecf04a92efb6b2365e57fac7b81ea253dc9ed09d908307b1b3cf7ffa162a4483fa2e5421e6f8a04563733a50c109d703e293a8a291a765c0c13e19680d050b536a23d86943e52646dd32ec3298b69ac8d057c7d64943a161e2887f98ff850254611a448cdb89d44e4abf1dfb48cc55882e3f226f2f3a280bd4a77140566835912aa158b0d9d63be66fa314cf379cc5d1b17af85bf150fbc34324fe11e984f6b5edde0f2b86bb81476d5a2f5caa4ad47f873220f27718b58d997e235d069d6f36a178b566f52116c24b9a306c902b029b24772494cc9bee5d412acf00424f44324fb660ef0b1b6b6504e9943b281bb5dd4f4f6705e08d55764e0bf158a43ff98b7639e2b8a46b22294892951d98275f98ea493940e59d50ac7722948de079b5cfebf98d545e43c9a61cbc948ec0da87ce312eb1409b2e0dda650a822bf970ce751302aa6bfc04c98a7f665dc2c324118dbb
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7c340cdcfa92e907d497473a4d57fe8820592ae2
                       a112dcd999200927eac3c987108f71c04d99b2ef
                       f7c475aecc7939c36d45e7db43f5a781748d5e02
                       f842c9fd00696656fc9255c21f2d5a6eb799e32a
                       ec69be73f64dbe90b154a8c4240f16b743c7aa75
                       213384393bd1f8d1664f7adfcce8b43ff628f7a6
                       280823924e53a391560ac6c3c047f3bc5b7fda5c
                       5577bef01d936ece4970a8c583001da9904e10b4
                       b7e9f26d4fdad493043914e8f9d454197c188b47
                       e0315ab36b3131026ca721ad47e70ab776f3c153
                       fc89bb072a10dea8f4aab4c39f520124263cf978
                       ab88e5ff1f26253460a41aabf3d7cb5f3235b095
                       e64c713768d443ec83ea1d9e1a1ecfc7de5248e1
                       aa500a5082a5de39980be3cb774ed29901a85be9
                       95cc1b26e11b4e0d5d175675df39e24c09b3861a
                       9e3ce647e870605f5b330d818da04fd455e1e857
                       e002b7c277bfe2e7e0e75c39cd00ccf7b2de658a
                       a865a2b2f4d269404ec8a84a70e98a0b4e63b0be
                       bd4f169775bfd3cfeec43caaf207b3769358e55e
                       fb03b5ee
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c3:cb:75:e7:5b:88:09:28:e7:5d:18:3f:71:78:1e:8c:45:6a:76:a6]
            modulus: 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
    public exponent: 10001

] 
2021-05-29 00:49:55.196  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-29 00:49:55.197 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-29 00:49:55.199 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-29 00:49:55.200 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-29 00:49:55.201  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-29 00:49:55.202  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-29 00:49:55.203  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-29 00:49:55.203  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-29 00:49:55.204  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-29 00:49:55.208  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-29 00:49:55.208  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-29 00:49:55.208  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-29 00:49:55.209  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-29 00:49:55.332  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-29 00:49:55.333  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-29 00:49:55.333 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-29 00:49:55.334 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-29 00:49:55.335  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1680
2021-05-29 00:49:55.335  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-29 00:49:55.337  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-29 00:49:55.337  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-29 00:49:55.338  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-29 00:49:55.338  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-29 00:49:55.338 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-29 00:49:55.339 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-29 00:49:55.339 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-29 00:49:55.339 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-29 00:49:55.340 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-29 00:49:55.340 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-29 00:49:55.340 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-29 00:49:55.343 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 554880286818426390701532894652223652940088870757
             IssuerDN: UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 28 23:14:52 UTC 2021
           Final Date: Wed May 28 23:14:52 UTC 2031
            SubjectDN: UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [18:89:fb:22:3f:89:35:12:0c:e2:bf:2b:df:f1:27:17:c5:92:e8:41]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7c340cdcfa92e907d497473a4d57fe8820592ae2
                       a112dcd999200927eac3c987108f71c04d99b2ef
                       f7c475aecc7939c36d45e7db43f5a781748d5e02
                       f842c9fd00696656fc9255c21f2d5a6eb799e32a
                       ec69be73f64dbe90b154a8c4240f16b743c7aa75
                       213384393bd1f8d1664f7adfcce8b43ff628f7a6
                       280823924e53a391560ac6c3c047f3bc5b7fda5c
                       5577bef01d936ece4970a8c583001da9904e10b4
                       b7e9f26d4fdad493043914e8f9d454197c188b47
                       e0315ab36b3131026ca721ad47e70ab776f3c153
                       fc89bb072a10dea8f4aab4c39f520124263cf978
                       ab88e5ff1f26253460a41aabf3d7cb5f3235b095
                       e64c713768d443ec83ea1d9e1a1ecfc7de5248e1
                       aa500a5082a5de39980be3cb774ed29901a85be9
                       95cc1b26e11b4e0d5d175675df39e24c09b3861a
                       9e3ce647e870605f5b330d818da04fd455e1e857
                       e002b7c277bfe2e7e0e75c39cd00ccf7b2de658a
                       a865a2b2f4d269404ec8a84a70e98a0b4e63b0be
                       bd4f169775bfd3cfeec43caaf207b3769358e55e
                       fb03b5ee
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2a:3f:59:7d:79:85:01:8a:b8:47:aa:ec:44:20:b2:4b:83:63:9e:50]
            modulus: 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
    public exponent: 10001

] 
2021-05-29 00:51:27.388  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-29 00:51:27.391 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-29 00:51:27.392 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-29 00:51:27.392 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-29 00:51:27.392  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-29 00:51:27.393  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-29 00:51:27.393  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-29 00:51:27.394  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-29 00:51:27.394  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-29 00:51:27.398  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-29 00:51:27.398  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-29 00:51:27.398  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-29 00:51:27.400  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-29 00:51:27.572  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-29 00:51:27.573  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-29 00:51:27.573 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-29 00:51:27.575 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-29 00:51:27.576  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1680
2021-05-29 00:51:27.577  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-29 00:51:27.579  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-29 00:51:27.580  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-29 00:51:27.580  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-29 00:51:27.580  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-29 00:51:27.581 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-29 00:51:27.581 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-29 00:51:27.581 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-29 00:51:27.582 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-29 00:51:27.582 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-29 00:51:27.583 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-29 00:51:27.584 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-29 00:51:27.587 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 554880286818426390701532894652223652940088870757
             IssuerDN: UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 28 23:14:52 UTC 2021
           Final Date: Wed May 28 23:14:52 UTC 2031
            SubjectDN: UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [18:89:fb:22:3f:89:35:12:0c:e2:bf:2b:df:f1:27:17:c5:92:e8:41]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7c340cdcfa92e907d497473a4d57fe8820592ae2
                       a112dcd999200927eac3c987108f71c04d99b2ef
                       f7c475aecc7939c36d45e7db43f5a781748d5e02
                       f842c9fd00696656fc9255c21f2d5a6eb799e32a
                       ec69be73f64dbe90b154a8c4240f16b743c7aa75
                       213384393bd1f8d1664f7adfcce8b43ff628f7a6
                       280823924e53a391560ac6c3c047f3bc5b7fda5c
                       5577bef01d936ece4970a8c583001da9904e10b4
                       b7e9f26d4fdad493043914e8f9d454197c188b47
                       e0315ab36b3131026ca721ad47e70ab776f3c153
                       fc89bb072a10dea8f4aab4c39f520124263cf978
                       ab88e5ff1f26253460a41aabf3d7cb5f3235b095
                       e64c713768d443ec83ea1d9e1a1ecfc7de5248e1
                       aa500a5082a5de39980be3cb774ed29901a85be9
                       95cc1b26e11b4e0d5d175675df39e24c09b3861a
                       9e3ce647e870605f5b330d818da04fd455e1e857
                       e002b7c277bfe2e7e0e75c39cd00ccf7b2de658a
                       a865a2b2f4d269404ec8a84a70e98a0b4e63b0be
                       bd4f169775bfd3cfeec43caaf207b3769358e55e
                       fb03b5ee
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [50:33:97:07:e9:50:e4:f7:20:69:db:e0:75:22:18:59:b5:1a:88:89]
            modulus: 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
    public exponent: 10001

] 
2021-05-29 00:53:50.255  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-29 00:53:50.257 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-29 00:53:50.259 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-29 00:53:50.259 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-29 00:53:50.260  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-29 00:53:50.260  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-29 00:53:50.261  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-29 00:53:50.261  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-29 00:53:50.262  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-29 00:53:50.266  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-29 00:53:50.266  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-29 00:53:50.267  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-29 00:53:50.268  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-29 00:53:50.372  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-29 00:53:50.373  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-29 00:53:50.373 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-29 00:53:50.374 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-29 00:53:50.375  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1680
2021-05-29 00:53:50.375  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-29 00:53:50.376  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-29 00:53:50.377  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-29 00:53:50.377  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-29 00:53:50.377  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-29 00:53:50.377 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-29 00:53:50.378 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-29 00:53:50.378 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-29 00:53:50.378 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-29 00:53:50.378 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-29 00:53:50.379 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-29 00:53:50.379 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-29 00:53:50.381 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 554880286818426390701532894652223652940088870757
             IssuerDN: UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 28 23:14:52 UTC 2021
           Final Date: Wed May 28 23:14:52 UTC 2031
            SubjectDN: UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [18:89:fb:22:3f:89:35:12:0c:e2:bf:2b:df:f1:27:17:c5:92:e8:41]
            modulus: bc7f6059ed5edba8a9c71efcdb4403f0c73027841d610699e05b2d1ffc8dc69e801bf0ea633879de0a52a424a84598ecf04a92efb6b2365e57fac7b81ea253dc9ed09d908307b1b3cf7ffa162a4483fa2e5421e6f8a04563733a50c109d703e293a8a291a765c0c13e19680d050b536a23d86943e52646dd32ec3298b69ac8d057c7d64943a161e2887f98ff850254611a448cdb89d44e4abf1dfb48cc55882e3f226f2f3a280bd4a77140566835912aa158b0d9d63be66fa314cf379cc5d1b17af85bf150fbc34324fe11e984f6b5edde0f2b86bb81476d5a2f5caa4ad47f873220f27718b58d997e235d069d6f36a178b566f52116c24b9a306c902b029b24772494cc9bee5d412acf00424f44324fb660ef0b1b6b6504e9943b281bb5dd4f4f6705e08d55764e0bf158a43ff98b7639e2b8a46b22294892951d98275f98ea493940e59d50ac7722948de079b5cfebf98d545e43c9a61cbc948ec0da87ce312eb1409b2e0dda650a822bf970ce751302aa6bfc04c98a7f665dc2c324118dbb
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7c340cdcfa92e907d497473a4d57fe8820592ae2
                       a112dcd999200927eac3c987108f71c04d99b2ef
                       f7c475aecc7939c36d45e7db43f5a781748d5e02
                       f842c9fd00696656fc9255c21f2d5a6eb799e32a
                       ec69be73f64dbe90b154a8c4240f16b743c7aa75
                       213384393bd1f8d1664f7adfcce8b43ff628f7a6
                       280823924e53a391560ac6c3c047f3bc5b7fda5c
                       5577bef01d936ece4970a8c583001da9904e10b4
                       b7e9f26d4fdad493043914e8f9d454197c188b47
                       e0315ab36b3131026ca721ad47e70ab776f3c153
                       fc89bb072a10dea8f4aab4c39f520124263cf978
                       ab88e5ff1f26253460a41aabf3d7cb5f3235b095
                       e64c713768d443ec83ea1d9e1a1ecfc7de5248e1
                       aa500a5082a5de39980be3cb774ed29901a85be9
                       95cc1b26e11b4e0d5d175675df39e24c09b3861a
                       9e3ce647e870605f5b330d818da04fd455e1e857
                       e002b7c277bfe2e7e0e75c39cd00ccf7b2de658a
                       a865a2b2f4d269404ec8a84a70e98a0b4e63b0be
                       bd4f169775bfd3cfeec43caaf207b3769358e55e
                       fb03b5ee
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d0:07:c0:7a:2c:1a:7a:70:c6:5a:13:22:56:7b:bc:91:76:fa:60:cd]
            modulus: 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
    public exponent: 10001

] 
2021-05-29 00:56:27.345  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-29 00:56:27.347 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-29 00:56:27.348 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-29 00:56:27.349 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-29 00:56:27.349  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-29 00:56:27.350  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-29 00:56:27.351  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-29 00:56:27.351  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-29 00:56:27.352  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-29 00:56:27.357  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-29 00:56:27.358  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-29 00:56:27.358  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-29 00:56:27.359  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-29 00:56:27.476  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-29 00:56:27.476  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-29 00:56:27.477 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-29 00:56:27.478 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-29 00:56:27.479  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1680
2021-05-29 00:56:27.479  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-29 00:56:27.481  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-29 00:56:27.482  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-29 00:56:27.482  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-29 00:56:27.482  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-29 00:56:27.483 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-29 00:56:27.483 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-29 00:56:27.483 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-29 00:56:27.484 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-29 00:56:27.484 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-29 00:56:27.485 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-29 00:56:27.485 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-29 00:56:27.488 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 554880286818426390701532894652223652940088870757
             IssuerDN: UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 28 23:14:52 UTC 2021
           Final Date: Wed May 28 23:14:52 UTC 2031
            SubjectDN: UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [18:89:fb:22:3f:89:35:12:0c:e2:bf:2b:df:f1:27:17:c5:92:e8:41]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7c340cdcfa92e907d497473a4d57fe8820592ae2
                       a112dcd999200927eac3c987108f71c04d99b2ef
                       f7c475aecc7939c36d45e7db43f5a781748d5e02
                       f842c9fd00696656fc9255c21f2d5a6eb799e32a
                       ec69be73f64dbe90b154a8c4240f16b743c7aa75
                       213384393bd1f8d1664f7adfcce8b43ff628f7a6
                       280823924e53a391560ac6c3c047f3bc5b7fda5c
                       5577bef01d936ece4970a8c583001da9904e10b4
                       b7e9f26d4fdad493043914e8f9d454197c188b47
                       e0315ab36b3131026ca721ad47e70ab776f3c153
                       fc89bb072a10dea8f4aab4c39f520124263cf978
                       ab88e5ff1f26253460a41aabf3d7cb5f3235b095
                       e64c713768d443ec83ea1d9e1a1ecfc7de5248e1
                       aa500a5082a5de39980be3cb774ed29901a85be9
                       95cc1b26e11b4e0d5d175675df39e24c09b3861a
                       9e3ce647e870605f5b330d818da04fd455e1e857
                       e002b7c277bfe2e7e0e75c39cd00ccf7b2de658a
                       a865a2b2f4d269404ec8a84a70e98a0b4e63b0be
                       bd4f169775bfd3cfeec43caaf207b3769358e55e
                       fb03b5ee
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [31:5f:73:96:0f:b8:81:8d:43:4f:fe:55:25:c0:2c:25:ab:2b:87:3f]
            modulus: 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
    public exponent: 10001

] 
2021-05-29 00:58:26.149  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-29 00:58:26.150 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-29 00:58:26.151 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-29 00:58:26.151 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-29 00:58:26.151  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-29 00:58:26.152  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-29 00:58:26.152  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-29 00:58:26.152  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-29 00:58:26.153  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-29 00:58:26.157  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-29 00:58:26.157  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-29 00:58:26.157  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-29 00:58:26.158  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-29 00:58:26.264  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-29 00:58:26.264  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-29 00:58:26.265 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-29 00:58:26.267 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-29 00:58:26.268  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1680
2021-05-29 00:58:26.268  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-29 00:58:26.270  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-29 00:58:26.270  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-29 00:58:26.271  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-29 00:58:26.271  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-29 00:58:26.271 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-29 00:58:26.272 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-29 00:58:26.272 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-29 00:58:26.273 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-29 00:58:26.273 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-29 00:58:26.273 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-29 00:58:26.274 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-29 00:58:26.278 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 554880286818426390701532894652223652940088870757
             IssuerDN: UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 28 23:14:52 UTC 2021
           Final Date: Wed May 28 23:14:52 UTC 2031
            SubjectDN: UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [18:89:fb:22:3f:89:35:12:0c:e2:bf:2b:df:f1:27:17:c5:92:e8:41]
            modulus: bc7f6059ed5edba8a9c71efcdb4403f0c73027841d610699e05b2d1ffc8dc69e801bf0ea633879de0a52a424a84598ecf04a92efb6b2365e57fac7b81ea253dc9ed09d908307b1b3cf7ffa162a4483fa2e5421e6f8a04563733a50c109d703e293a8a291a765c0c13e19680d050b536a23d86943e52646dd32ec3298b69ac8d057c7d64943a161e2887f98ff850254611a448cdb89d44e4abf1dfb48cc55882e3f226f2f3a280bd4a77140566835912aa158b0d9d63be66fa314cf379cc5d1b17af85bf150fbc34324fe11e984f6b5edde0f2b86bb81476d5a2f5caa4ad47f873220f27718b58d997e235d069d6f36a178b566f52116c24b9a306c902b029b24772494cc9bee5d412acf00424f44324fb660ef0b1b6b6504e9943b281bb5dd4f4f6705e08d55764e0bf158a43ff98b7639e2b8a46b22294892951d98275f98ea493940e59d50ac7722948de079b5cfebf98d545e43c9a61cbc948ec0da87ce312eb1409b2e0dda650a822bf970ce751302aa6bfc04c98a7f665dc2c324118dbb
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7c340cdcfa92e907d497473a4d57fe8820592ae2
                       a112dcd999200927eac3c987108f71c04d99b2ef
                       f7c475aecc7939c36d45e7db43f5a781748d5e02
                       f842c9fd00696656fc9255c21f2d5a6eb799e32a
                       ec69be73f64dbe90b154a8c4240f16b743c7aa75
                       213384393bd1f8d1664f7adfcce8b43ff628f7a6
                       280823924e53a391560ac6c3c047f3bc5b7fda5c
                       5577bef01d936ece4970a8c583001da9904e10b4
                       b7e9f26d4fdad493043914e8f9d454197c188b47
                       e0315ab36b3131026ca721ad47e70ab776f3c153
                       fc89bb072a10dea8f4aab4c39f520124263cf978
                       ab88e5ff1f26253460a41aabf3d7cb5f3235b095
                       e64c713768d443ec83ea1d9e1a1ecfc7de5248e1
                       aa500a5082a5de39980be3cb774ed29901a85be9
                       95cc1b26e11b4e0d5d175675df39e24c09b3861a
                       9e3ce647e870605f5b330d818da04fd455e1e857
                       e002b7c277bfe2e7e0e75c39cd00ccf7b2de658a
                       a865a2b2f4d269404ec8a84a70e98a0b4e63b0be
                       bd4f169775bfd3cfeec43caaf207b3769358e55e
                       fb03b5ee
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d0:71:b5:41:d3:1c:99:fa:01:b7:2f:45:3c:2f:6e:7e:3f:ed:85:45]
            modulus: 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
    public exponent: 10001

] 
2021-05-29 00:59:59.159  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-29 00:59:59.160 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-29 00:59:59.161 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-29 00:59:59.162 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-29 00:59:59.163  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-29 00:59:59.163  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-29 00:59:59.163  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-29 00:59:59.164  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-29 00:59:59.164  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-29 00:59:59.169  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-29 00:59:59.169  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-29 00:59:59.169  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-29 00:59:59.170  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-29 00:59:59.265  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-29 00:59:59.266  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-29 00:59:59.267 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-29 00:59:59.269 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-29 00:59:59.270  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1680
2021-05-29 00:59:59.270  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-29 00:59:59.272  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-29 00:59:59.272  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-29 00:59:59.273  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-29 00:59:59.273  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-29 00:59:59.273 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-29 00:59:59.273 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-29 00:59:59.274 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-29 00:59:59.274 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-29 00:59:59.274 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-29 00:59:59.274 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-29 00:59:59.275 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-29 00:59:59.277 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 554880286818426390701532894652223652940088870757
             IssuerDN: UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 28 23:14:52 UTC 2021
           Final Date: Wed May 28 23:14:52 UTC 2031
            SubjectDN: UID=c-0d40b32b2b54f8db0,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [18:89:fb:22:3f:89:35:12:0c:e2:bf:2b:df:f1:27:17:c5:92:e8:41]
            modulus: bc7f6059ed5edba8a9c71efcdb4403f0c73027841d610699e05b2d1ffc8dc69e801bf0ea633879de0a52a424a84598ecf04a92efb6b2365e57fac7b81ea253dc9ed09d908307b1b3cf7ffa162a4483fa2e5421e6f8a04563733a50c109d703e293a8a291a765c0c13e19680d050b536a23d86943e52646dd32ec3298b69ac8d057c7d64943a161e2887f98ff850254611a448cdb89d44e4abf1dfb48cc55882e3f226f2f3a280bd4a77140566835912aa158b0d9d63be66fa314cf379cc5d1b17af85bf150fbc34324fe11e984f6b5edde0f2b86bb81476d5a2f5caa4ad47f873220f27718b58d997e235d069d6f36a178b566f52116c24b9a306c902b029b24772494cc9bee5d412acf00424f44324fb660ef0b1b6b6504e9943b281bb5dd4f4f6705e08d55764e0bf158a43ff98b7639e2b8a46b22294892951d98275f98ea493940e59d50ac7722948de079b5cfebf98d545e43c9a61cbc948ec0da87ce312eb1409b2e0dda650a822bf970ce751302aa6bfc04c98a7f665dc2c324118dbb
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7c340cdcfa92e907d497473a4d57fe8820592ae2
                       a112dcd999200927eac3c987108f71c04d99b2ef
                       f7c475aecc7939c36d45e7db43f5a781748d5e02
                       f842c9fd00696656fc9255c21f2d5a6eb799e32a
                       ec69be73f64dbe90b154a8c4240f16b743c7aa75
                       213384393bd1f8d1664f7adfcce8b43ff628f7a6
                       280823924e53a391560ac6c3c047f3bc5b7fda5c
                       5577bef01d936ece4970a8c583001da9904e10b4
                       b7e9f26d4fdad493043914e8f9d454197c188b47
                       e0315ab36b3131026ca721ad47e70ab776f3c153
                       fc89bb072a10dea8f4aab4c39f520124263cf978
                       ab88e5ff1f26253460a41aabf3d7cb5f3235b095
                       e64c713768d443ec83ea1d9e1a1ecfc7de5248e1
                       aa500a5082a5de39980be3cb774ed29901a85be9
                       95cc1b26e11b4e0d5d175675df39e24c09b3861a
                       9e3ce647e870605f5b330d818da04fd455e1e857
                       e002b7c277bfe2e7e0e75c39cd00ccf7b2de658a
                       a865a2b2f4d269404ec8a84a70e98a0b4e63b0be
                       bd4f169775bfd3cfeec43caaf207b3769358e55e
                       fb03b5ee
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ea:83:56:0b:8d:8a:25:18:0f:a4:bc:27:1b:73:f3:b4:c1:38:e5:d6]
            modulus: 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
    public exponent: 10001

]