Results

By type

          2021-05-19 01:06:54,763 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-05-19 01:06:58,862 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-05-19 01:07:01.856  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-05-19 01:07:14.159 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-05-19 01:07:15.365  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-05-19 01:07:16.268  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-05-19 01:07:30.361  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 38.186 seconds (JVM running for 45.73)
2021-05-19 01:19:47.165  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-19 01:19:47.262 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-19 01:19:47.470 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-19 01:19:47.475 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-19 01:19:47.562  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-19 01:19:47.567  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-19 01:19:47.571  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-19 01:19:47.652  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-19 01:19:47.654  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-19 01:19:47.663  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-19 01:19:47.666  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-19 01:19:47.776  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-19 01:19:47.857  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-19 01:19:47.859  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-19 01:19:47.962  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-19 01:19:49.464  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-19 01:19:49.555  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-19 01:19:49.556 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-19 01:19:49.565 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-19 01:19:49.566  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1929
2021-05-19 01:19:49.566  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-19 01:19:49.654  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-19 01:19:49.656  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-19 01:19:49.666  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-19 01:19:49.667  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-19 01:19:49.667 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-19 01:19:49.668 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-19 01:19:49.668 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-19 01:19:49.763 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-19 01:19:49.764 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-19 01:19:49.764 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-19 01:19:49.770 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-19 01:19:49.966 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 244078936576057277965132607979111043476583000166
             IssuerDN: UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 19 01:03:02 UTC 2021
           Final Date: Mon May 19 01:03:01 UTC 2031
            SubjectDN: UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [96:b3:03:37:18:b2:70:9f:8e:31:f6:52:3c:29:ea:8c:cc:cc:e3:f8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ac11a068e73b87566f9a9c199c14ecde0e58983c
                       3a10717f395c898758032ac4cf29c0484be2dcdc
                       ce86220630e1e43c5c1c0c607119d9a3e7b83210
                       f3909f5a12bf5b4c43ef8e27535b570ae98d0412
                       99ac00db0109b956601b25a6e7f48c9d171161e4
                       a95ce828d32b4ce968c9ba2055d3b55177c31b6d
                       7a7c06cb28a23f1683c482e2e973890fd60cc40d
                       546acd8f0e7b01b54ebc0640525a4adbebc0edb5
                       465006294214d3c71a1c3c572031609b1a251761
                       faeccb4dca8d9de119cdeadcd331fabb3b88e867
                       788f80be58cdf492808d8d37bc48975734255bb8
                       b5ef7afdf213f2483338f28a48bde28bf3cfe217
                       090a3b2c4ebbc9bf7d286a0ac01158c7c2383221
                       3cef4767e135f301864d3d01fdd0c68d194f649d
                       4a7d99b2de3edddf1e3221a1f25fb4b85729be92
                       5b8d2c78c65d7923c953ba94d79e864acf0ab25c
                       4ccf9bd511daa2ff3bd670dbd1a701c35dd2a74c
                       8512186acf46cc6e69f662793755160fab0201bf
                       1c6e2d7083b34a3c41438b1a83ef8ac93c524c51
                       dac1eeee
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [de:32:96:d0:ec:95:18:ac:09:1a:8f:e9:ae:f7:ea:49:1b:b6:e0:4a]
            modulus: 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
    public exponent: 10001

] 
2021-05-19 02:26:23.842  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-19 02:26:23.846 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-19 02:26:23.848 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-19 02:26:23.850 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-19 02:26:23.852  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-19 02:26:23.853  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-19 02:26:23.854  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-19 02:26:23.855  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-19 02:26:23.856  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-19 02:26:23.867  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-19 02:26:23.868  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-19 02:26:23.869  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-19 02:26:23.875  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-19 02:26:24.055  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-19 02:26:24.056  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-19 02:26:24.056 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-19 02:26:24.061 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-19 02:26:24.062  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1929
2021-05-19 02:26:24.062  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-19 02:26:24.069  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-19 02:26:24.070  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-19 02:26:24.070  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-19 02:26:24.071  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-19 02:26:24.071 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-19 02:26:24.072 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-19 02:26:24.072 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-19 02:26:24.152 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-19 02:26:24.153 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-19 02:26:24.154 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-19 02:26:24.156 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-19 02:26:24.163 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 244078936576057277965132607979111043476583000166
             IssuerDN: UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 19 01:03:02 UTC 2021
           Final Date: Mon May 19 01:03:01 UTC 2031
            SubjectDN: UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [96:b3:03:37:18:b2:70:9f:8e:31:f6:52:3c:29:ea:8c:cc:cc:e3:f8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ac11a068e73b87566f9a9c199c14ecde0e58983c
                       3a10717f395c898758032ac4cf29c0484be2dcdc
                       ce86220630e1e43c5c1c0c607119d9a3e7b83210
                       f3909f5a12bf5b4c43ef8e27535b570ae98d0412
                       99ac00db0109b956601b25a6e7f48c9d171161e4
                       a95ce828d32b4ce968c9ba2055d3b55177c31b6d
                       7a7c06cb28a23f1683c482e2e973890fd60cc40d
                       546acd8f0e7b01b54ebc0640525a4adbebc0edb5
                       465006294214d3c71a1c3c572031609b1a251761
                       faeccb4dca8d9de119cdeadcd331fabb3b88e867
                       788f80be58cdf492808d8d37bc48975734255bb8
                       b5ef7afdf213f2483338f28a48bde28bf3cfe217
                       090a3b2c4ebbc9bf7d286a0ac01158c7c2383221
                       3cef4767e135f301864d3d01fdd0c68d194f649d
                       4a7d99b2de3edddf1e3221a1f25fb4b85729be92
                       5b8d2c78c65d7923c953ba94d79e864acf0ab25c
                       4ccf9bd511daa2ff3bd670dbd1a701c35dd2a74c
                       8512186acf46cc6e69f662793755160fab0201bf
                       1c6e2d7083b34a3c41438b1a83ef8ac93c524c51
                       dac1eeee
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f1:e5:a5:9d:a0:58:e9:46:b6:e6:c5:95:02:51:ef:19:91:66:d6:29]
            modulus: a44e790ec93c82c371a93040c78ebef8928c1dde3a48c9f3c57b4dfe5faf3d51e6ccc6b12b838d0334a33a0bb9df1167ca3a18b245cc072084601fad7d8e2904d50f58e9d926f27b71d42a9b27cc19340698218f0d6cd1ac2d673b2352aea29562571477dc6311cf0f47811ec64317b67a5c94a6d73ab353fe96184a0ffb7496b2aeabb615a5d79d824e4728d10fd29ce3f8006ef508a9df9e9ab45de6b491bcb5177ab7d31cfd0f800fab9453ebc68b0222268b0f6802fd9b7ce858e89428b63290c8abc79dfb6382755a13d808345f0756bbe76242f93233fd5f33307e041e6fc359441b616647341441e0f8faa752c8af7927b57e387ce0d550a31ef0fb69
    public exponent: 10001

] 
2021-05-19 02:27:47.210  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-19 02:27:47.212 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-19 02:27:47.216 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-19 02:27:47.217 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-19 02:27:47.218  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-19 02:27:47.219  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-19 02:27:47.220  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-19 02:27:47.221  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-19 02:27:47.221  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-19 02:27:47.226  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-19 02:27:47.254  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-19 02:27:47.255  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-19 02:27:47.258  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-19 02:27:47.353  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-19 02:27:47.354  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-19 02:27:47.354 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-19 02:27:47.357 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-19 02:27:47.359  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1929
2021-05-19 02:27:47.359  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-19 02:27:47.361  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-19 02:27:47.362  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-19 02:27:47.363  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-19 02:27:47.365  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-19 02:27:47.368 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-19 02:27:47.368 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-19 02:27:47.369 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-19 02:27:47.372 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-19 02:27:47.375 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-19 02:27:47.375 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-19 02:27:47.454 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-19 02:27:47.462 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 244078936576057277965132607979111043476583000166
             IssuerDN: UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 19 01:03:02 UTC 2021
           Final Date: Mon May 19 01:03:01 UTC 2031
            SubjectDN: UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [96:b3:03:37:18:b2:70:9f:8e:31:f6:52:3c:29:ea:8c:cc:cc:e3:f8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ac11a068e73b87566f9a9c199c14ecde0e58983c
                       3a10717f395c898758032ac4cf29c0484be2dcdc
                       ce86220630e1e43c5c1c0c607119d9a3e7b83210
                       f3909f5a12bf5b4c43ef8e27535b570ae98d0412
                       99ac00db0109b956601b25a6e7f48c9d171161e4
                       a95ce828d32b4ce968c9ba2055d3b55177c31b6d
                       7a7c06cb28a23f1683c482e2e973890fd60cc40d
                       546acd8f0e7b01b54ebc0640525a4adbebc0edb5
                       465006294214d3c71a1c3c572031609b1a251761
                       faeccb4dca8d9de119cdeadcd331fabb3b88e867
                       788f80be58cdf492808d8d37bc48975734255bb8
                       b5ef7afdf213f2483338f28a48bde28bf3cfe217
                       090a3b2c4ebbc9bf7d286a0ac01158c7c2383221
                       3cef4767e135f301864d3d01fdd0c68d194f649d
                       4a7d99b2de3edddf1e3221a1f25fb4b85729be92
                       5b8d2c78c65d7923c953ba94d79e864acf0ab25c
                       4ccf9bd511daa2ff3bd670dbd1a701c35dd2a74c
                       8512186acf46cc6e69f662793755160fab0201bf
                       1c6e2d7083b34a3c41438b1a83ef8ac93c524c51
                       dac1eeee
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [aa:15:b5:cf:dc:41:93:4e:c6:a0:61:79:7c:74:84:c0:42:af:61:b1]
            modulus: 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
    public exponent: 10001

] 
2021-05-19 02:30:59.853  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-19 02:30:59.855 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-19 02:30:59.858 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-19 02:30:59.859 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-19 02:30:59.860  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-19 02:30:59.861  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-19 02:30:59.861  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-19 02:30:59.862  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-19 02:30:59.862  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-19 02:30:59.877  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-19 02:30:59.878  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-19 02:30:59.878  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-19 02:30:59.880  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-19 02:31:00.025  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-19 02:31:00.026  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-19 02:31:00.052 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-19 02:31:00.054 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-19 02:31:00.055  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1929
2021-05-19 02:31:00.055  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-19 02:31:00.058  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-19 02:31:00.058  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-19 02:31:00.059  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-19 02:31:00.059  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-19 02:31:00.060 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-19 02:31:00.060 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-19 02:31:00.060 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-19 02:31:00.061 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-19 02:31:00.062 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-19 02:31:00.062 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-19 02:31:00.063 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-19 02:31:00.068 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 244078936576057277965132607979111043476583000166
             IssuerDN: UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 19 01:03:02 UTC 2021
           Final Date: Mon May 19 01:03:01 UTC 2031
            SubjectDN: UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [96:b3:03:37:18:b2:70:9f:8e:31:f6:52:3c:29:ea:8c:cc:cc:e3:f8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ac11a068e73b87566f9a9c199c14ecde0e58983c
                       3a10717f395c898758032ac4cf29c0484be2dcdc
                       ce86220630e1e43c5c1c0c607119d9a3e7b83210
                       f3909f5a12bf5b4c43ef8e27535b570ae98d0412
                       99ac00db0109b956601b25a6e7f48c9d171161e4
                       a95ce828d32b4ce968c9ba2055d3b55177c31b6d
                       7a7c06cb28a23f1683c482e2e973890fd60cc40d
                       546acd8f0e7b01b54ebc0640525a4adbebc0edb5
                       465006294214d3c71a1c3c572031609b1a251761
                       faeccb4dca8d9de119cdeadcd331fabb3b88e867
                       788f80be58cdf492808d8d37bc48975734255bb8
                       b5ef7afdf213f2483338f28a48bde28bf3cfe217
                       090a3b2c4ebbc9bf7d286a0ac01158c7c2383221
                       3cef4767e135f301864d3d01fdd0c68d194f649d
                       4a7d99b2de3edddf1e3221a1f25fb4b85729be92
                       5b8d2c78c65d7923c953ba94d79e864acf0ab25c
                       4ccf9bd511daa2ff3bd670dbd1a701c35dd2a74c
                       8512186acf46cc6e69f662793755160fab0201bf
                       1c6e2d7083b34a3c41438b1a83ef8ac93c524c51
                       dac1eeee
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c3:12:f5:15:e6:31:af:69:a8:29:fc:34:fe:2d:4b:49:76:3c:36:6e]
            modulus: 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
    public exponent: 10001

] 
2021-05-19 02:31:16.528  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-19 02:31:16.529 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-19 02:31:16.531 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-19 02:31:16.532 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-19 02:31:16.532  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-19 02:31:16.533  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-19 02:31:16.533  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-19 02:31:16.534  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-19 02:31:16.534  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-19 02:31:16.554  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-19 02:31:16.555  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-19 02:31:16.555  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-19 02:31:16.558  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-19 02:31:16.625  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-19 02:31:16.626  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-19 02:31:16.652 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-19 02:31:16.654 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-19 02:31:16.654  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1929
2021-05-19 02:31:16.655  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-19 02:31:16.657  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-19 02:31:16.657  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-19 02:31:16.658  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-19 02:31:16.658  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-19 02:31:16.658 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-19 02:31:16.659 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-19 02:31:16.659 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-19 02:31:16.660 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-19 02:31:16.660 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-19 02:31:16.660 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-19 02:31:16.661 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-19 02:31:16.664 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 244078936576057277965132607979111043476583000166
             IssuerDN: UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 19 01:03:02 UTC 2021
           Final Date: Mon May 19 01:03:01 UTC 2031
            SubjectDN: UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [96:b3:03:37:18:b2:70:9f:8e:31:f6:52:3c:29:ea:8c:cc:cc:e3:f8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ac11a068e73b87566f9a9c199c14ecde0e58983c
                       3a10717f395c898758032ac4cf29c0484be2dcdc
                       ce86220630e1e43c5c1c0c607119d9a3e7b83210
                       f3909f5a12bf5b4c43ef8e27535b570ae98d0412
                       99ac00db0109b956601b25a6e7f48c9d171161e4
                       a95ce828d32b4ce968c9ba2055d3b55177c31b6d
                       7a7c06cb28a23f1683c482e2e973890fd60cc40d
                       546acd8f0e7b01b54ebc0640525a4adbebc0edb5
                       465006294214d3c71a1c3c572031609b1a251761
                       faeccb4dca8d9de119cdeadcd331fabb3b88e867
                       788f80be58cdf492808d8d37bc48975734255bb8
                       b5ef7afdf213f2483338f28a48bde28bf3cfe217
                       090a3b2c4ebbc9bf7d286a0ac01158c7c2383221
                       3cef4767e135f301864d3d01fdd0c68d194f649d
                       4a7d99b2de3edddf1e3221a1f25fb4b85729be92
                       5b8d2c78c65d7923c953ba94d79e864acf0ab25c
                       4ccf9bd511daa2ff3bd670dbd1a701c35dd2a74c
                       8512186acf46cc6e69f662793755160fab0201bf
                       1c6e2d7083b34a3c41438b1a83ef8ac93c524c51
                       dac1eeee
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [28:ad:64:b1:67:58:3a:d8:e2:58:6b:66:54:29:26:98:17:e4:63:e4]
            modulus: 85e694de0e12e3489c14b9d2f2ff14f2887fc8b670e37b0d86ff47fe5f68827858a7d3aca1f528bc5789246f68d7641ce8638f927d9ffaf67d3d0cd35acb7a0c48d260d95978ce0fa3f6db7bbfe17647ae927f97852251ed30dd619b192504b0f84cbd45058669d49f881c559d338565bf8182628bc437918d105eef015e9cc1c9f464d70b0ef81c79d153cb6ddcf6040ac64cabdbc865388baa3f69dcd5c544343ac8cf61bd0a0323263ea7713a94b135a63bde5bf731b6003dec8dabc8da9f3080b333ccb383271f40af88e0820b7b99a6400fcf6ddec73ce340cc64fb1b19b0102ed3cfddcd4ca0c6e99a127c3dd5109ca997aaa6890425f249feab4295cf
    public exponent: 10001

] 
2021-05-19 02:31:47.352  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-19 02:31:47.354 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-19 02:31:47.355 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-19 02:31:47.356 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-19 02:31:47.356  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-19 02:31:47.357  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-19 02:31:47.357  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-19 02:31:47.357  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-19 02:31:47.357  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-19 02:31:47.364  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-19 02:31:47.364  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-19 02:31:47.364  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-19 02:31:47.366  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-19 02:31:47.443  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-19 02:31:47.443  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-19 02:31:47.444 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-19 02:31:47.445 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-19 02:31:47.446  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1929
2021-05-19 02:31:47.452  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-19 02:31:47.454  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-19 02:31:47.454  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-19 02:31:47.455  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-19 02:31:47.455  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-19 02:31:47.455 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-19 02:31:47.456 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-19 02:31:47.456 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-19 02:31:47.457 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-19 02:31:47.457 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-19 02:31:47.457 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-19 02:31:47.458 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-19 02:31:47.461 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 244078936576057277965132607979111043476583000166
             IssuerDN: UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 19 01:03:02 UTC 2021
           Final Date: Mon May 19 01:03:01 UTC 2031
            SubjectDN: UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [96:b3:03:37:18:b2:70:9f:8e:31:f6:52:3c:29:ea:8c:cc:cc:e3:f8]
            modulus: add71ac43478b10d6ad5582ec6f23828df1f2a58035ea69b8ab5272fd23790099c1c115bf6a88caf8fbc195c3e8658e6cbf03ce52c76375b8aef4d9b5fa6352eaa4504ee04cce389531e37e3a0dc02122d877e6be5402a93ae1faf69da684a569e2800d60e0d5d4d244b88a626db0ba8160f032b228d976b7d9764ebe32a0561f7edb8e55843820714e18520244e56d280dda4358d1095224741efe7c717cbb82c36ac40ebb62abefa70884d01379ca760ad3887787ff6e7c24163d89eb96eae3aa2ee979b4c517453acb7eb0d93acd835a796ccbe5f29153ee9d8fa49c5ee279e79ed1321c19f7135a0a3c31617e75bd972a403b3f27d11530d2569f7d3895236dffad43e3407dc1744626dd11a13408ef941f6e1d9764e82c888beb52225c0a303d32d7930b48470fd394addea9c3287c26f36a27721cbbf84eae13a40afcd191a2c28c87f18c428d22aa55a81f38a144eae6b465888801bf2b45a589fbe12f62f1b8e5f9cdc1992e19faaaddce552145f3fd7fc23bcca5806455dee76db13
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ac11a068e73b87566f9a9c199c14ecde0e58983c
                       3a10717f395c898758032ac4cf29c0484be2dcdc
                       ce86220630e1e43c5c1c0c607119d9a3e7b83210
                       f3909f5a12bf5b4c43ef8e27535b570ae98d0412
                       99ac00db0109b956601b25a6e7f48c9d171161e4
                       a95ce828d32b4ce968c9ba2055d3b55177c31b6d
                       7a7c06cb28a23f1683c482e2e973890fd60cc40d
                       546acd8f0e7b01b54ebc0640525a4adbebc0edb5
                       465006294214d3c71a1c3c572031609b1a251761
                       faeccb4dca8d9de119cdeadcd331fabb3b88e867
                       788f80be58cdf492808d8d37bc48975734255bb8
                       b5ef7afdf213f2483338f28a48bde28bf3cfe217
                       090a3b2c4ebbc9bf7d286a0ac01158c7c2383221
                       3cef4767e135f301864d3d01fdd0c68d194f649d
                       4a7d99b2de3edddf1e3221a1f25fb4b85729be92
                       5b8d2c78c65d7923c953ba94d79e864acf0ab25c
                       4ccf9bd511daa2ff3bd670dbd1a701c35dd2a74c
                       8512186acf46cc6e69f662793755160fab0201bf
                       1c6e2d7083b34a3c41438b1a83ef8ac93c524c51
                       dac1eeee
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7f:ec:79:de:e0:91:a6:52:12:27:4c:d0:a9:64:d8:4b:32:38:51:bc]
            modulus: 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
    public exponent: 10001

] 
2021-05-19 02:32:34.049  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-19 02:32:34.050 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-19 02:32:34.051 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-19 02:32:34.052 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-19 02:32:34.052  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-19 02:32:34.052  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-19 02:32:34.053  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-19 02:32:34.053  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-19 02:32:34.053  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-19 02:32:34.058  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-19 02:32:34.058  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-19 02:32:34.059  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-19 02:32:34.060  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-19 02:32:34.466  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-19 02:32:34.467  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-19 02:32:34.467 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-19 02:32:34.469 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-19 02:32:34.469  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1929
2021-05-19 02:32:34.470  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-19 02:32:34.471  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-19 02:32:34.472  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-19 02:32:34.472  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-19 02:32:34.472  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-19 02:32:34.472 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-19 02:32:34.472 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-19 02:32:34.473 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-19 02:32:34.474 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-19 02:32:34.474 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-19 02:32:34.474 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-19 02:32:34.475 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-19 02:32:34.478 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 244078936576057277965132607979111043476583000166
             IssuerDN: UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 19 01:03:02 UTC 2021
           Final Date: Mon May 19 01:03:01 UTC 2031
            SubjectDN: UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [96:b3:03:37:18:b2:70:9f:8e:31:f6:52:3c:29:ea:8c:cc:cc:e3:f8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ac11a068e73b87566f9a9c199c14ecde0e58983c
                       3a10717f395c898758032ac4cf29c0484be2dcdc
                       ce86220630e1e43c5c1c0c607119d9a3e7b83210
                       f3909f5a12bf5b4c43ef8e27535b570ae98d0412
                       99ac00db0109b956601b25a6e7f48c9d171161e4
                       a95ce828d32b4ce968c9ba2055d3b55177c31b6d
                       7a7c06cb28a23f1683c482e2e973890fd60cc40d
                       546acd8f0e7b01b54ebc0640525a4adbebc0edb5
                       465006294214d3c71a1c3c572031609b1a251761
                       faeccb4dca8d9de119cdeadcd331fabb3b88e867
                       788f80be58cdf492808d8d37bc48975734255bb8
                       b5ef7afdf213f2483338f28a48bde28bf3cfe217
                       090a3b2c4ebbc9bf7d286a0ac01158c7c2383221
                       3cef4767e135f301864d3d01fdd0c68d194f649d
                       4a7d99b2de3edddf1e3221a1f25fb4b85729be92
                       5b8d2c78c65d7923c953ba94d79e864acf0ab25c
                       4ccf9bd511daa2ff3bd670dbd1a701c35dd2a74c
                       8512186acf46cc6e69f662793755160fab0201bf
                       1c6e2d7083b34a3c41438b1a83ef8ac93c524c51
                       dac1eeee
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2c:94:ab:32:06:98:ba:37:6a:50:47:5b:af:b7:60:85:f5:bd:0b:60]
            modulus: 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
    public exponent: 10001

] 
2021-05-19 02:33:14.127  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-19 02:33:14.128 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-19 02:33:14.129 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-19 02:33:14.130 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-19 02:33:14.130  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-19 02:33:14.130  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-19 02:33:14.131  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-19 02:33:14.131  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-19 02:33:14.131  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-19 02:33:14.135  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-19 02:33:14.136  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-19 02:33:14.136  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-19 02:33:14.138  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-19 02:33:14.225  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-19 02:33:14.225  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-19 02:33:14.225 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-19 02:33:14.226 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-19 02:33:14.227  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1929
2021-05-19 02:33:14.227  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-19 02:33:14.229  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-19 02:33:14.230  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-19 02:33:14.230  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-19 02:33:14.230  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-19 02:33:14.231 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-19 02:33:14.231 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-19 02:33:14.231 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-19 02:33:14.232 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-19 02:33:14.232 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-19 02:33:14.233 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-19 02:33:14.234 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-19 02:33:14.236 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 244078936576057277965132607979111043476583000166
             IssuerDN: UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 19 01:03:02 UTC 2021
           Final Date: Mon May 19 01:03:01 UTC 2031
            SubjectDN: UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [96:b3:03:37:18:b2:70:9f:8e:31:f6:52:3c:29:ea:8c:cc:cc:e3:f8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ac11a068e73b87566f9a9c199c14ecde0e58983c
                       3a10717f395c898758032ac4cf29c0484be2dcdc
                       ce86220630e1e43c5c1c0c607119d9a3e7b83210
                       f3909f5a12bf5b4c43ef8e27535b570ae98d0412
                       99ac00db0109b956601b25a6e7f48c9d171161e4
                       a95ce828d32b4ce968c9ba2055d3b55177c31b6d
                       7a7c06cb28a23f1683c482e2e973890fd60cc40d
                       546acd8f0e7b01b54ebc0640525a4adbebc0edb5
                       465006294214d3c71a1c3c572031609b1a251761
                       faeccb4dca8d9de119cdeadcd331fabb3b88e867
                       788f80be58cdf492808d8d37bc48975734255bb8
                       b5ef7afdf213f2483338f28a48bde28bf3cfe217
                       090a3b2c4ebbc9bf7d286a0ac01158c7c2383221
                       3cef4767e135f301864d3d01fdd0c68d194f649d
                       4a7d99b2de3edddf1e3221a1f25fb4b85729be92
                       5b8d2c78c65d7923c953ba94d79e864acf0ab25c
                       4ccf9bd511daa2ff3bd670dbd1a701c35dd2a74c
                       8512186acf46cc6e69f662793755160fab0201bf
                       1c6e2d7083b34a3c41438b1a83ef8ac93c524c51
                       dac1eeee
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [da:b8:9e:a1:29:61:f8:f2:fb:d7:5e:22:3a:94:1d:74:d8:6b:c4:93]
            modulus: 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
    public exponent: 10001

] 
2021-05-19 02:34:32.019  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-19 02:34:32.020 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-19 02:34:32.021 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-19 02:34:32.022 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-19 02:34:32.022  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-19 02:34:32.023  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-19 02:34:32.023  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-19 02:34:32.023  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-19 02:34:32.024  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-19 02:34:32.028  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-19 02:34:32.028  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-19 02:34:32.028  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-19 02:34:32.030  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-19 02:34:32.087  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-19 02:34:32.087  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-19 02:34:32.088 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-19 02:34:32.089 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-19 02:34:32.090  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1929
2021-05-19 02:34:32.090  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-19 02:34:32.092  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-19 02:34:32.152  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-19 02:34:32.153  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-19 02:34:32.153  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-19 02:34:32.154 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-19 02:34:32.154 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-19 02:34:32.155 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-19 02:34:32.155 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-19 02:34:32.156 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-19 02:34:32.156 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-19 02:34:32.157 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-19 02:34:32.162 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 244078936576057277965132607979111043476583000166
             IssuerDN: UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 19 01:03:02 UTC 2021
           Final Date: Mon May 19 01:03:01 UTC 2031
            SubjectDN: UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [96:b3:03:37:18:b2:70:9f:8e:31:f6:52:3c:29:ea:8c:cc:cc:e3:f8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ac11a068e73b87566f9a9c199c14ecde0e58983c
                       3a10717f395c898758032ac4cf29c0484be2dcdc
                       ce86220630e1e43c5c1c0c607119d9a3e7b83210
                       f3909f5a12bf5b4c43ef8e27535b570ae98d0412
                       99ac00db0109b956601b25a6e7f48c9d171161e4
                       a95ce828d32b4ce968c9ba2055d3b55177c31b6d
                       7a7c06cb28a23f1683c482e2e973890fd60cc40d
                       546acd8f0e7b01b54ebc0640525a4adbebc0edb5
                       465006294214d3c71a1c3c572031609b1a251761
                       faeccb4dca8d9de119cdeadcd331fabb3b88e867
                       788f80be58cdf492808d8d37bc48975734255bb8
                       b5ef7afdf213f2483338f28a48bde28bf3cfe217
                       090a3b2c4ebbc9bf7d286a0ac01158c7c2383221
                       3cef4767e135f301864d3d01fdd0c68d194f649d
                       4a7d99b2de3edddf1e3221a1f25fb4b85729be92
                       5b8d2c78c65d7923c953ba94d79e864acf0ab25c
                       4ccf9bd511daa2ff3bd670dbd1a701c35dd2a74c
                       8512186acf46cc6e69f662793755160fab0201bf
                       1c6e2d7083b34a3c41438b1a83ef8ac93c524c51
                       dac1eeee
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [72:48:39:04:df:33:65:d6:a7:c1:48:96:8b:cc:ed:45:5f:04:d4:a7]
            modulus: 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
    public exponent: 10001

] 
2021-05-19 02:37:23.455  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-19 02:37:23.457 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-19 02:37:23.458 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-19 02:37:23.459 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-19 02:37:23.459  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-19 02:37:23.460  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-19 02:37:23.461  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-19 02:37:23.461  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-19 02:37:23.462  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-19 02:37:23.467  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-19 02:37:23.467  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-19 02:37:23.468  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-19 02:37:23.469  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-19 02:37:23.562  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-19 02:37:23.563  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-19 02:37:23.565 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-19 02:37:23.567 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-19 02:37:23.567  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1929
2021-05-19 02:37:23.567  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-19 02:37:23.569  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-19 02:37:23.569  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-19 02:37:23.571  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-19 02:37:23.572  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-19 02:37:23.572 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-19 02:37:23.573 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-19 02:37:23.573 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-19 02:37:23.574 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-19 02:37:23.574 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-19 02:37:23.575 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-19 02:37:23.576 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-19 02:37:23.653 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 244078936576057277965132607979111043476583000166
             IssuerDN: UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 19 01:03:02 UTC 2021
           Final Date: Mon May 19 01:03:01 UTC 2031
            SubjectDN: UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [96:b3:03:37:18:b2:70:9f:8e:31:f6:52:3c:29:ea:8c:cc:cc:e3:f8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ac11a068e73b87566f9a9c199c14ecde0e58983c
                       3a10717f395c898758032ac4cf29c0484be2dcdc
                       ce86220630e1e43c5c1c0c607119d9a3e7b83210
                       f3909f5a12bf5b4c43ef8e27535b570ae98d0412
                       99ac00db0109b956601b25a6e7f48c9d171161e4
                       a95ce828d32b4ce968c9ba2055d3b55177c31b6d
                       7a7c06cb28a23f1683c482e2e973890fd60cc40d
                       546acd8f0e7b01b54ebc0640525a4adbebc0edb5
                       465006294214d3c71a1c3c572031609b1a251761
                       faeccb4dca8d9de119cdeadcd331fabb3b88e867
                       788f80be58cdf492808d8d37bc48975734255bb8
                       b5ef7afdf213f2483338f28a48bde28bf3cfe217
                       090a3b2c4ebbc9bf7d286a0ac01158c7c2383221
                       3cef4767e135f301864d3d01fdd0c68d194f649d
                       4a7d99b2de3edddf1e3221a1f25fb4b85729be92
                       5b8d2c78c65d7923c953ba94d79e864acf0ab25c
                       4ccf9bd511daa2ff3bd670dbd1a701c35dd2a74c
                       8512186acf46cc6e69f662793755160fab0201bf
                       1c6e2d7083b34a3c41438b1a83ef8ac93c524c51
                       dac1eeee
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ae:7c:bd:43:f8:e0:b9:6c:31:37:50:2c:9b:ac:01:01:bc:e6:50:e5]
            modulus: 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
    public exponent: 10001

] 
2021-05-19 02:40:11.003  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-19 02:40:11.004 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-19 02:40:11.005 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-19 02:40:11.006 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-19 02:40:11.006  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-19 02:40:11.007  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-19 02:40:11.007  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-19 02:40:11.008  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-19 02:40:11.008  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-19 02:40:11.012  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-19 02:40:11.013  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-19 02:40:11.013  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-19 02:40:11.015  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-19 02:40:11.097  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-19 02:40:11.098  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-19 02:40:11.098 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-19 02:40:11.099 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-19 02:40:11.100  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1929
2021-05-19 02:40:11.100  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-19 02:40:11.103  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-19 02:40:11.104  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-19 02:40:11.104  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-19 02:40:11.105  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-19 02:40:11.105 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-19 02:40:11.105 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-19 02:40:11.106 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-19 02:40:11.106 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-19 02:40:11.107 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-19 02:40:11.107 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-19 02:40:11.108 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-19 02:40:11.111 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 244078936576057277965132607979111043476583000166
             IssuerDN: UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 19 01:03:02 UTC 2021
           Final Date: Mon May 19 01:03:01 UTC 2031
            SubjectDN: UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [96:b3:03:37:18:b2:70:9f:8e:31:f6:52:3c:29:ea:8c:cc:cc:e3:f8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ac11a068e73b87566f9a9c199c14ecde0e58983c
                       3a10717f395c898758032ac4cf29c0484be2dcdc
                       ce86220630e1e43c5c1c0c607119d9a3e7b83210
                       f3909f5a12bf5b4c43ef8e27535b570ae98d0412
                       99ac00db0109b956601b25a6e7f48c9d171161e4
                       a95ce828d32b4ce968c9ba2055d3b55177c31b6d
                       7a7c06cb28a23f1683c482e2e973890fd60cc40d
                       546acd8f0e7b01b54ebc0640525a4adbebc0edb5
                       465006294214d3c71a1c3c572031609b1a251761
                       faeccb4dca8d9de119cdeadcd331fabb3b88e867
                       788f80be58cdf492808d8d37bc48975734255bb8
                       b5ef7afdf213f2483338f28a48bde28bf3cfe217
                       090a3b2c4ebbc9bf7d286a0ac01158c7c2383221
                       3cef4767e135f301864d3d01fdd0c68d194f649d
                       4a7d99b2de3edddf1e3221a1f25fb4b85729be92
                       5b8d2c78c65d7923c953ba94d79e864acf0ab25c
                       4ccf9bd511daa2ff3bd670dbd1a701c35dd2a74c
                       8512186acf46cc6e69f662793755160fab0201bf
                       1c6e2d7083b34a3c41438b1a83ef8ac93c524c51
                       dac1eeee
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e0:fb:17:87:bf:56:bc:73:e0:29:f0:56:b2:46:10:ce:6d:9f:ac:ff]
            modulus: 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
    public exponent: 10001

] 
2021-05-19 02:42:08.656  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-19 02:42:08.657 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-19 02:42:08.658 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-19 02:42:08.659 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-19 02:42:08.659  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-19 02:42:08.659  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-19 02:42:08.660  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-19 02:42:08.660  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-19 02:42:08.661  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-19 02:42:08.664  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-19 02:42:08.665  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-19 02:42:08.665  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-19 02:42:08.666  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-19 02:42:08.747  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-19 02:42:08.748  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-19 02:42:08.748 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-19 02:42:08.749 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-19 02:42:08.750  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1929
2021-05-19 02:42:08.750  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-19 02:42:08.752  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-19 02:42:08.753  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-19 02:42:08.753  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-19 02:42:08.754  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-19 02:42:08.754 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-19 02:42:08.754 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-19 02:42:08.755 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-19 02:42:08.755 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-19 02:42:08.755 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-19 02:42:08.756 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-19 02:42:08.758 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-19 02:42:08.761 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 244078936576057277965132607979111043476583000166
             IssuerDN: UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 19 01:03:02 UTC 2021
           Final Date: Mon May 19 01:03:01 UTC 2031
            SubjectDN: UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [96:b3:03:37:18:b2:70:9f:8e:31:f6:52:3c:29:ea:8c:cc:cc:e3:f8]
            modulus: add71ac43478b10d6ad5582ec6f23828df1f2a58035ea69b8ab5272fd23790099c1c115bf6a88caf8fbc195c3e8658e6cbf03ce52c76375b8aef4d9b5fa6352eaa4504ee04cce389531e37e3a0dc02122d877e6be5402a93ae1faf69da684a569e2800d60e0d5d4d244b88a626db0ba8160f032b228d976b7d9764ebe32a0561f7edb8e55843820714e18520244e56d280dda4358d1095224741efe7c717cbb82c36ac40ebb62abefa70884d01379ca760ad3887787ff6e7c24163d89eb96eae3aa2ee979b4c517453acb7eb0d93acd835a796ccbe5f29153ee9d8fa49c5ee279e79ed1321c19f7135a0a3c31617e75bd972a403b3f27d11530d2569f7d3895236dffad43e3407dc1744626dd11a13408ef941f6e1d9764e82c888beb52225c0a303d32d7930b48470fd394addea9c3287c26f36a27721cbbf84eae13a40afcd191a2c28c87f18c428d22aa55a81f38a144eae6b465888801bf2b45a589fbe12f62f1b8e5f9cdc1992e19faaaddce552145f3fd7fc23bcca5806455dee76db13
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ac11a068e73b87566f9a9c199c14ecde0e58983c
                       3a10717f395c898758032ac4cf29c0484be2dcdc
                       ce86220630e1e43c5c1c0c607119d9a3e7b83210
                       f3909f5a12bf5b4c43ef8e27535b570ae98d0412
                       99ac00db0109b956601b25a6e7f48c9d171161e4
                       a95ce828d32b4ce968c9ba2055d3b55177c31b6d
                       7a7c06cb28a23f1683c482e2e973890fd60cc40d
                       546acd8f0e7b01b54ebc0640525a4adbebc0edb5
                       465006294214d3c71a1c3c572031609b1a251761
                       faeccb4dca8d9de119cdeadcd331fabb3b88e867
                       788f80be58cdf492808d8d37bc48975734255bb8
                       b5ef7afdf213f2483338f28a48bde28bf3cfe217
                       090a3b2c4ebbc9bf7d286a0ac01158c7c2383221
                       3cef4767e135f301864d3d01fdd0c68d194f649d
                       4a7d99b2de3edddf1e3221a1f25fb4b85729be92
                       5b8d2c78c65d7923c953ba94d79e864acf0ab25c
                       4ccf9bd511daa2ff3bd670dbd1a701c35dd2a74c
                       8512186acf46cc6e69f662793755160fab0201bf
                       1c6e2d7083b34a3c41438b1a83ef8ac93c524c51
                       dac1eeee
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [01:9c:d3:63:94:f1:81:c1:59:4a:cc:e3:10:b7:8f:32:07:6d:7e:22]
            modulus: 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
    public exponent: 10001

] 
2021-05-19 02:43:29.261  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-19 02:43:29.263 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-19 02:43:29.264 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-19 02:43:29.265 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-19 02:43:29.265  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-19 02:43:29.266  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-19 02:43:29.266  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-19 02:43:29.266  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-19 02:43:29.267  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-19 02:43:29.273  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-19 02:43:29.274  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-19 02:43:29.274  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-19 02:43:29.276  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-19 02:43:29.421  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-19 02:43:29.422  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-19 02:43:29.422 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-19 02:43:29.423 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-19 02:43:29.423  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1929
2021-05-19 02:43:29.423  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-19 02:43:29.425  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-19 02:43:29.425  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-19 02:43:29.426  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-19 02:43:29.426  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-19 02:43:29.426 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-19 02:43:29.426 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-19 02:43:29.427 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-19 02:43:29.427 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-19 02:43:29.427 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-19 02:43:29.427 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-19 02:43:29.428 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-19 02:43:29.431 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 244078936576057277965132607979111043476583000166
             IssuerDN: UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 19 01:03:02 UTC 2021
           Final Date: Mon May 19 01:03:01 UTC 2031
            SubjectDN: UID=c-0e53ejpexbfpxj4ft,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [96:b3:03:37:18:b2:70:9f:8e:31:f6:52:3c:29:ea:8c:cc:cc:e3:f8]
            modulus: add71ac43478b10d6ad5582ec6f23828df1f2a58035ea69b8ab5272fd23790099c1c115bf6a88caf8fbc195c3e8658e6cbf03ce52c76375b8aef4d9b5fa6352eaa4504ee04cce389531e37e3a0dc02122d877e6be5402a93ae1faf69da684a569e2800d60e0d5d4d244b88a626db0ba8160f032b228d976b7d9764ebe32a0561f7edb8e55843820714e18520244e56d280dda4358d1095224741efe7c717cbb82c36ac40ebb62abefa70884d01379ca760ad3887787ff6e7c24163d89eb96eae3aa2ee979b4c517453acb7eb0d93acd835a796ccbe5f29153ee9d8fa49c5ee279e79ed1321c19f7135a0a3c31617e75bd972a403b3f27d11530d2569f7d3895236dffad43e3407dc1744626dd11a13408ef941f6e1d9764e82c888beb52225c0a303d32d7930b48470fd394addea9c3287c26f36a27721cbbf84eae13a40afcd191a2c28c87f18c428d22aa55a81f38a144eae6b465888801bf2b45a589fbe12f62f1b8e5f9cdc1992e19faaaddce552145f3fd7fc23bcca5806455dee76db13
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ac11a068e73b87566f9a9c199c14ecde0e58983c
                       3a10717f395c898758032ac4cf29c0484be2dcdc
                       ce86220630e1e43c5c1c0c607119d9a3e7b83210
                       f3909f5a12bf5b4c43ef8e27535b570ae98d0412
                       99ac00db0109b956601b25a6e7f48c9d171161e4
                       a95ce828d32b4ce968c9ba2055d3b55177c31b6d
                       7a7c06cb28a23f1683c482e2e973890fd60cc40d
                       546acd8f0e7b01b54ebc0640525a4adbebc0edb5
                       465006294214d3c71a1c3c572031609b1a251761
                       faeccb4dca8d9de119cdeadcd331fabb3b88e867
                       788f80be58cdf492808d8d37bc48975734255bb8
                       b5ef7afdf213f2483338f28a48bde28bf3cfe217
                       090a3b2c4ebbc9bf7d286a0ac01158c7c2383221
                       3cef4767e135f301864d3d01fdd0c68d194f649d
                       4a7d99b2de3edddf1e3221a1f25fb4b85729be92
                       5b8d2c78c65d7923c953ba94d79e864acf0ab25c
                       4ccf9bd511daa2ff3bd670dbd1a701c35dd2a74c
                       8512186acf46cc6e69f662793755160fab0201bf
                       1c6e2d7083b34a3c41438b1a83ef8ac93c524c51
                       dac1eeee
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fe:32:1b:45:7c:40:e8:49:08:a4:ec:40:20:02:21:9c:da:7c:84:2f]
            modulus: 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
    public exponent: 10001

]