Results

By type

          2021-04-21 11:24:07,927 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-04-21 11:24:11,528 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-04-21 11:24:13.927  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-04-21 11:24:24.618 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-04-21 11:24:25.714  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-04-21 11:24:26.515  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-04-21 11:24:39.119  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 33.402 seconds (JVM running for 40.303)
2021-04-21 11:34:45.714  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-21 11:34:45.724 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-21 11:34:45.825 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-04-21 11:34:45.829 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-21 11:34:45.918  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-04-21 11:34:45.922  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-21 11:34:45.927  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-21 11:34:45.928  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-21 11:34:45.929  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-21 11:34:46.018  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-21 11:34:46.021  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-21 11:34:46.134  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-21 11:34:46.216  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-21 11:34:46.216  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-21 11:34:46.311  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-21 11:34:48.012  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-21 11:34:48.017  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-21 11:34:48.017 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-21 11:34:48.024 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-21 11:34:48.026  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1340
2021-04-21 11:34:48.026  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-21 11:34:48.113  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-21 11:34:48.114  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-21 11:34:48.220  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-21 11:34:48.221  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-21 11:34:48.222 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-21 11:34:48.223 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-21 11:34:48.223 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-21 11:34:48.325 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-21 11:34:48.412 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-21 11:34:48.412 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-21 11:34:48.419 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-21 11:34:48.717 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 132455808149188497089813792829113579957337273472
             IssuerDN: UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 21 11:17:12 UTC 2021
           Final Date: Mon Apr 21 11:17:12 UTC 2031
            SubjectDN: UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f9:0c:0e:b9:53:a6:ea:66:e3:2a:77:8b:27:17:05:66:3e:86:a9:c7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 81a49aef6ba4d140f3db2675de78c30f284f0f7c
                       87ecb2679329df7565e0d836c0c006afffb5ad98
                       fef5aa37043050f1e772554993bf7e54e30a123c
                       bd178ab46a95e1ca57bc11cd69d8416cfd8e306a
                       4c69f5c35c3d198e1c46e9a7f340fb8fe3caee28
                       7d47de5e194211fedcf7932c01d385c481a4d050
                       306877b512ea45f698102f448bf00411645b5035
                       e2463e5fd75f2b2f8855cf0f8850441904995b3a
                       f19efd5844ea3b100fb4d715a490c0f989cd67d2
                       d3a046546d7e770e22bc856fde82307448a8d947
                       2601b9e73bd3958643cd830d36f4cfd74e403839
                       e00c6d4854dacb4d7f6047b44a5446194a60e2df
                       e94d63b05797139864c7b5e12713c83757cd3833
                       34ca230bf94ba17555acc4a13cd519f282b4ad72
                       3ad845e675c5f57ac2491e425093e9669286f337
                       49063d379d92b861cdcced2b647bc36703129e7d
                       0b1ecc416b62f79d109f04bd9a38ee9fe00e9e91
                       d1ec82fcf6cc3d512cf2ea2508717fadda7caa19
                       5b7614980255de6ab85550dbc543416ba239d7bd
                       1f8c1ca6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [16:82:ea:88:3a:89:99:6f:5c:b6:78:6a:de:b3:31:b5:20:2c:20:13]
            modulus: 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
    public exponent: 10001

] 
2021-04-21 13:01:59.733  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-21 13:01:59.735 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-21 13:01:59.737 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-21 13:01:59.738 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-21 13:01:59.739  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-21 13:01:59.740  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-21 13:01:59.740  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-21 13:01:59.741  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-21 13:01:59.742  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-21 13:01:59.751  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-21 13:01:59.752  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-21 13:01:59.753  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-21 13:01:59.815  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-21 13:02:00.031  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-21 13:02:00.032  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-21 13:02:00.032 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-21 13:02:00.036 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-21 13:02:00.037  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1340
2021-04-21 13:02:00.038  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-21 13:02:00.039  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-21 13:02:00.040  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-21 13:02:00.040  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-21 13:02:00.041  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-21 13:02:00.041 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-21 13:02:00.042 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-21 13:02:00.042 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-21 13:02:00.111 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-21 13:02:00.112 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-21 13:02:00.113 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-21 13:02:00.116 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-21 13:02:00.120 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 132455808149188497089813792829113579957337273472
             IssuerDN: UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 21 11:17:12 UTC 2021
           Final Date: Mon Apr 21 11:17:12 UTC 2031
            SubjectDN: UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f9:0c:0e:b9:53:a6:ea:66:e3:2a:77:8b:27:17:05:66:3e:86:a9:c7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 81a49aef6ba4d140f3db2675de78c30f284f0f7c
                       87ecb2679329df7565e0d836c0c006afffb5ad98
                       fef5aa37043050f1e772554993bf7e54e30a123c
                       bd178ab46a95e1ca57bc11cd69d8416cfd8e306a
                       4c69f5c35c3d198e1c46e9a7f340fb8fe3caee28
                       7d47de5e194211fedcf7932c01d385c481a4d050
                       306877b512ea45f698102f448bf00411645b5035
                       e2463e5fd75f2b2f8855cf0f8850441904995b3a
                       f19efd5844ea3b100fb4d715a490c0f989cd67d2
                       d3a046546d7e770e22bc856fde82307448a8d947
                       2601b9e73bd3958643cd830d36f4cfd74e403839
                       e00c6d4854dacb4d7f6047b44a5446194a60e2df
                       e94d63b05797139864c7b5e12713c83757cd3833
                       34ca230bf94ba17555acc4a13cd519f282b4ad72
                       3ad845e675c5f57ac2491e425093e9669286f337
                       49063d379d92b861cdcced2b647bc36703129e7d
                       0b1ecc416b62f79d109f04bd9a38ee9fe00e9e91
                       d1ec82fcf6cc3d512cf2ea2508717fadda7caa19
                       5b7614980255de6ab85550dbc543416ba239d7bd
                       1f8c1ca6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [64:ed:df:ed:10:da:f4:41:f9:a3:56:b0:53:72:e6:5b:00:f5:4f:9a]
            modulus: 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
    public exponent: 10001

] 
2021-04-21 13:03:53.263  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-21 13:03:53.264 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-21 13:03:53.266 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-04-21 13:03:53.267 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-21 13:03:53.267  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-04-21 13:03:53.268  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-21 13:03:53.268  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-21 13:03:53.269  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-21 13:03:53.269  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-21 13:03:53.276  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-21 13:03:53.277  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-21 13:03:53.278  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-21 13:03:53.279  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-21 13:03:53.442  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-21 13:03:53.444  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-21 13:03:53.444 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-21 13:03:53.446 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-21 13:03:53.447  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1340
2021-04-21 13:03:53.447  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-21 13:03:53.448  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-21 13:03:53.449  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-21 13:03:53.449  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-21 13:03:53.450  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-21 13:03:53.450 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-21 13:03:53.451 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-21 13:03:53.451 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-21 13:03:53.452 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-21 13:03:53.452 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-21 13:03:53.453 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-21 13:03:53.453 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-21 13:03:53.456 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 132455808149188497089813792829113579957337273472
             IssuerDN: UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 21 11:17:12 UTC 2021
           Final Date: Mon Apr 21 11:17:12 UTC 2031
            SubjectDN: UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f9:0c:0e:b9:53:a6:ea:66:e3:2a:77:8b:27:17:05:66:3e:86:a9:c7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 81a49aef6ba4d140f3db2675de78c30f284f0f7c
                       87ecb2679329df7565e0d836c0c006afffb5ad98
                       fef5aa37043050f1e772554993bf7e54e30a123c
                       bd178ab46a95e1ca57bc11cd69d8416cfd8e306a
                       4c69f5c35c3d198e1c46e9a7f340fb8fe3caee28
                       7d47de5e194211fedcf7932c01d385c481a4d050
                       306877b512ea45f698102f448bf00411645b5035
                       e2463e5fd75f2b2f8855cf0f8850441904995b3a
                       f19efd5844ea3b100fb4d715a490c0f989cd67d2
                       d3a046546d7e770e22bc856fde82307448a8d947
                       2601b9e73bd3958643cd830d36f4cfd74e403839
                       e00c6d4854dacb4d7f6047b44a5446194a60e2df
                       e94d63b05797139864c7b5e12713c83757cd3833
                       34ca230bf94ba17555acc4a13cd519f282b4ad72
                       3ad845e675c5f57ac2491e425093e9669286f337
                       49063d379d92b861cdcced2b647bc36703129e7d
                       0b1ecc416b62f79d109f04bd9a38ee9fe00e9e91
                       d1ec82fcf6cc3d512cf2ea2508717fadda7caa19
                       5b7614980255de6ab85550dbc543416ba239d7bd
                       1f8c1ca6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [27:35:cf:34:e7:9e:53:80:96:c0:76:f6:a7:fd:27:c1:23:d5:28:0e]
            modulus: 9380d751a695b17d38fc13e9aa95f3b042530bb5d02ee34e57e14e7728b938323ea07c0d15f65524ee504c53d99dd70a27094d26adfb58e89feb16625a5207737f25f72adc60d636938bdedeafd931659e5f8d0953c8bab1db5bd9dc07eee4dcb15dbe211b129322340d975ff4c316d2d0dd3403d85767a623a447830a971313416f9e28dc4ef6308fad1de92e07832e2a644f34d7e920eaad5cb9bfea9ec05832af7141d22b278182b7877a7733445b7d09b434dfb01fe17ce85788a80bdb8f839685d1006660363d77f48aaf1a3e87b2b7dfce48c8fa726e46002ee19460556d76cc0137efb31bf6036ff059a3462660cc55e4644ab0578ef69ba081bc4d29
    public exponent: 10001

] 
2021-04-21 13:07:24.427  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-21 13:07:24.429 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-21 13:07:24.430 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-04-21 13:07:24.431 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-21 13:07:24.432  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-04-21 13:07:24.433  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-21 13:07:24.433  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-21 13:07:24.433  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-21 13:07:24.435  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-21 13:07:24.443  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-21 13:07:24.444  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-21 13:07:24.444  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-21 13:07:24.446  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-21 13:07:24.687  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-21 13:07:24.688  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-21 13:07:24.689 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-21 13:07:24.691 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-21 13:07:24.691  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1340
2021-04-21 13:07:24.692  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-21 13:07:24.693  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-21 13:07:24.693  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-21 13:07:24.694  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-21 13:07:24.694  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-21 13:07:24.695 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-21 13:07:24.695 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-21 13:07:24.696 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-21 13:07:24.696 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-21 13:07:24.697 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-21 13:07:24.697 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-21 13:07:24.698 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-21 13:07:24.704 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 132455808149188497089813792829113579957337273472
             IssuerDN: UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 21 11:17:12 UTC 2021
           Final Date: Mon Apr 21 11:17:12 UTC 2031
            SubjectDN: UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f9:0c:0e:b9:53:a6:ea:66:e3:2a:77:8b:27:17:05:66:3e:86:a9:c7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 81a49aef6ba4d140f3db2675de78c30f284f0f7c
                       87ecb2679329df7565e0d836c0c006afffb5ad98
                       fef5aa37043050f1e772554993bf7e54e30a123c
                       bd178ab46a95e1ca57bc11cd69d8416cfd8e306a
                       4c69f5c35c3d198e1c46e9a7f340fb8fe3caee28
                       7d47de5e194211fedcf7932c01d385c481a4d050
                       306877b512ea45f698102f448bf00411645b5035
                       e2463e5fd75f2b2f8855cf0f8850441904995b3a
                       f19efd5844ea3b100fb4d715a490c0f989cd67d2
                       d3a046546d7e770e22bc856fde82307448a8d947
                       2601b9e73bd3958643cd830d36f4cfd74e403839
                       e00c6d4854dacb4d7f6047b44a5446194a60e2df
                       e94d63b05797139864c7b5e12713c83757cd3833
                       34ca230bf94ba17555acc4a13cd519f282b4ad72
                       3ad845e675c5f57ac2491e425093e9669286f337
                       49063d379d92b861cdcced2b647bc36703129e7d
                       0b1ecc416b62f79d109f04bd9a38ee9fe00e9e91
                       d1ec82fcf6cc3d512cf2ea2508717fadda7caa19
                       5b7614980255de6ab85550dbc543416ba239d7bd
                       1f8c1ca6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ad:d1:47:67:a9:f3:d3:8f:c0:10:3e:c4:e5:6d:cd:1f:4d:c5:03:72]
            modulus: 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
    public exponent: 10001

] 
2021-04-21 13:08:06.071  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-21 13:08:06.072 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-21 13:08:06.074 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-04-21 13:08:06.074 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-21 13:08:06.075  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-04-21 13:08:06.075  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-21 13:08:06.076  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-21 13:08:06.076  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-21 13:08:06.077  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-21 13:08:06.085  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-21 13:08:06.085  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-21 13:08:06.086  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-21 13:08:06.087  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-21 13:08:06.248  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-21 13:08:06.248  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-21 13:08:06.249 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-21 13:08:06.250 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-21 13:08:06.250  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1340
2021-04-21 13:08:06.251  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-21 13:08:06.252  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-21 13:08:06.252  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-21 13:08:06.252  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-21 13:08:06.253  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-21 13:08:06.253 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-21 13:08:06.254 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-21 13:08:06.254 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-21 13:08:06.255 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-21 13:08:06.255 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-21 13:08:06.255 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-21 13:08:06.256 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-21 13:08:06.315 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 132455808149188497089813792829113579957337273472
             IssuerDN: UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 21 11:17:12 UTC 2021
           Final Date: Mon Apr 21 11:17:12 UTC 2031
            SubjectDN: UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f9:0c:0e:b9:53:a6:ea:66:e3:2a:77:8b:27:17:05:66:3e:86:a9:c7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 81a49aef6ba4d140f3db2675de78c30f284f0f7c
                       87ecb2679329df7565e0d836c0c006afffb5ad98
                       fef5aa37043050f1e772554993bf7e54e30a123c
                       bd178ab46a95e1ca57bc11cd69d8416cfd8e306a
                       4c69f5c35c3d198e1c46e9a7f340fb8fe3caee28
                       7d47de5e194211fedcf7932c01d385c481a4d050
                       306877b512ea45f698102f448bf00411645b5035
                       e2463e5fd75f2b2f8855cf0f8850441904995b3a
                       f19efd5844ea3b100fb4d715a490c0f989cd67d2
                       d3a046546d7e770e22bc856fde82307448a8d947
                       2601b9e73bd3958643cd830d36f4cfd74e403839
                       e00c6d4854dacb4d7f6047b44a5446194a60e2df
                       e94d63b05797139864c7b5e12713c83757cd3833
                       34ca230bf94ba17555acc4a13cd519f282b4ad72
                       3ad845e675c5f57ac2491e425093e9669286f337
                       49063d379d92b861cdcced2b647bc36703129e7d
                       0b1ecc416b62f79d109f04bd9a38ee9fe00e9e91
                       d1ec82fcf6cc3d512cf2ea2508717fadda7caa19
                       5b7614980255de6ab85550dbc543416ba239d7bd
                       1f8c1ca6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [51:fe:48:a9:54:08:2f:3a:c1:a8:3b:27:60:3c:14:e1:6e:84:20:3f]
            modulus: 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
    public exponent: 10001

] 
2021-04-21 13:08:21.068  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-21 13:08:21.069 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-21 13:08:21.070 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-04-21 13:08:21.071 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-21 13:08:21.071  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-04-21 13:08:21.072  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-21 13:08:21.073  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-21 13:08:21.073  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-21 13:08:21.073  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-21 13:08:21.078  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-21 13:08:21.079  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-21 13:08:21.079  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-21 13:08:21.080  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-21 13:08:21.160  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-21 13:08:21.160  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-21 13:08:21.160 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-21 13:08:21.162 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-21 13:08:21.162  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1340
2021-04-21 13:08:21.162  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-21 13:08:21.163  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-21 13:08:21.164  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-21 13:08:21.164  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-21 13:08:21.164  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-21 13:08:21.165 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-21 13:08:21.165 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-21 13:08:21.165 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-21 13:08:21.166 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-21 13:08:21.166 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-21 13:08:21.167 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-21 13:08:21.167 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-21 13:08:21.170 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 132455808149188497089813792829113579957337273472
             IssuerDN: UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 21 11:17:12 UTC 2021
           Final Date: Mon Apr 21 11:17:12 UTC 2031
            SubjectDN: UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f9:0c:0e:b9:53:a6:ea:66:e3:2a:77:8b:27:17:05:66:3e:86:a9:c7]
            modulus: cd1f0d9a0d079d17c51e52dde2d39a151b00d163f73d957d8225fcba369db7a6a29f7d8e8af1751754289b007a37ea5cd34e497cdd51c0e1cc5ff3a366b288f84b7dd8b5df80f3c81cd4e5f9a882e45309357d840a29e8850d0fc17292068edb1a5dced2236906c506813ed567c511a892d44b6bde8af23c61d3748afe40bc9e2e834ccc52d4c200e55a92bd49d4c1bbac94b365de0d9c5e1261976f0c25bc583e65c253db28af4b8336d4f3f0480e18f4d18289908cc0a1d6c273c1a3237ea113fc6badf8d1402cba6440044dc5c291c9564890943887612363c699525ca003fe1f09a3c19a4dc225aae837c3d0f8a805e866ef07ce3b386d1b0db041f29dfdabee2d22ff173c06c7e0744b775fbf6a8fa3090e0eb11b8c708a109d658ac2f3f04ff97c6bfd97b4fb0c28be9256f551a76723aa68957d52a437fb866fb36c071b3c238bc89c55e707ce402d90f1232dbc812ef3f8770e97139ce4211ed05db069197416fae5a41766970686130db9eb2b808ea23bd59ed56610b9f5a0d7bbcb
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 81a49aef6ba4d140f3db2675de78c30f284f0f7c
                       87ecb2679329df7565e0d836c0c006afffb5ad98
                       fef5aa37043050f1e772554993bf7e54e30a123c
                       bd178ab46a95e1ca57bc11cd69d8416cfd8e306a
                       4c69f5c35c3d198e1c46e9a7f340fb8fe3caee28
                       7d47de5e194211fedcf7932c01d385c481a4d050
                       306877b512ea45f698102f448bf00411645b5035
                       e2463e5fd75f2b2f8855cf0f8850441904995b3a
                       f19efd5844ea3b100fb4d715a490c0f989cd67d2
                       d3a046546d7e770e22bc856fde82307448a8d947
                       2601b9e73bd3958643cd830d36f4cfd74e403839
                       e00c6d4854dacb4d7f6047b44a5446194a60e2df
                       e94d63b05797139864c7b5e12713c83757cd3833
                       34ca230bf94ba17555acc4a13cd519f282b4ad72
                       3ad845e675c5f57ac2491e425093e9669286f337
                       49063d379d92b861cdcced2b647bc36703129e7d
                       0b1ecc416b62f79d109f04bd9a38ee9fe00e9e91
                       d1ec82fcf6cc3d512cf2ea2508717fadda7caa19
                       5b7614980255de6ab85550dbc543416ba239d7bd
                       1f8c1ca6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [02:e2:18:d7:05:84:f8:89:a8:b5:35:08:9d:cb:85:29:1b:84:5a:00]
            modulus: 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
    public exponent: 10001

] 
2021-04-21 13:09:02.586  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-21 13:09:02.587 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-21 13:09:02.588 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-04-21 13:09:02.589 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-21 13:09:02.589  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-04-21 13:09:02.590  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-21 13:09:02.591  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-21 13:09:02.591  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-21 13:09:02.591  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-21 13:09:02.596  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-21 13:09:02.596  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-21 13:09:02.597  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-21 13:09:02.598  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-21 13:09:02.735  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-21 13:09:02.735  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-21 13:09:02.736 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-21 13:09:02.737 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-21 13:09:02.737  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1340
2021-04-21 13:09:02.738  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-21 13:09:02.739  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-21 13:09:02.739  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-21 13:09:02.739  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-21 13:09:02.740  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-21 13:09:02.740 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-21 13:09:02.740 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-21 13:09:02.741 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-21 13:09:02.742 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-21 13:09:02.742 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-21 13:09:02.742 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-21 13:09:02.743 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-21 13:09:02.746 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 132455808149188497089813792829113579957337273472
             IssuerDN: UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 21 11:17:12 UTC 2021
           Final Date: Mon Apr 21 11:17:12 UTC 2031
            SubjectDN: UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f9:0c:0e:b9:53:a6:ea:66:e3:2a:77:8b:27:17:05:66:3e:86:a9:c7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 81a49aef6ba4d140f3db2675de78c30f284f0f7c
                       87ecb2679329df7565e0d836c0c006afffb5ad98
                       fef5aa37043050f1e772554993bf7e54e30a123c
                       bd178ab46a95e1ca57bc11cd69d8416cfd8e306a
                       4c69f5c35c3d198e1c46e9a7f340fb8fe3caee28
                       7d47de5e194211fedcf7932c01d385c481a4d050
                       306877b512ea45f698102f448bf00411645b5035
                       e2463e5fd75f2b2f8855cf0f8850441904995b3a
                       f19efd5844ea3b100fb4d715a490c0f989cd67d2
                       d3a046546d7e770e22bc856fde82307448a8d947
                       2601b9e73bd3958643cd830d36f4cfd74e403839
                       e00c6d4854dacb4d7f6047b44a5446194a60e2df
                       e94d63b05797139864c7b5e12713c83757cd3833
                       34ca230bf94ba17555acc4a13cd519f282b4ad72
                       3ad845e675c5f57ac2491e425093e9669286f337
                       49063d379d92b861cdcced2b647bc36703129e7d
                       0b1ecc416b62f79d109f04bd9a38ee9fe00e9e91
                       d1ec82fcf6cc3d512cf2ea2508717fadda7caa19
                       5b7614980255de6ab85550dbc543416ba239d7bd
                       1f8c1ca6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [25:7d:00:dc:d5:03:5a:04:9f:81:cf:30:08:0c:65:2f:b4:d3:6b:08]
            modulus: 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
    public exponent: 10001

] 
2021-04-21 13:09:58.376  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-21 13:09:58.378 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-21 13:09:58.379 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-04-21 13:09:58.380 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-21 13:09:58.380  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-04-21 13:09:58.381  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-21 13:09:58.381  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-21 13:09:58.381  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-21 13:09:58.382  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-21 13:09:58.389  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-21 13:09:58.390  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-21 13:09:58.390  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-21 13:09:58.391  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-21 13:09:58.581  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-21 13:09:58.581  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-21 13:09:58.582 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-21 13:09:58.583 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-21 13:09:58.583  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1340
2021-04-21 13:09:58.583  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-21 13:09:58.585  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-21 13:09:58.586  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-21 13:09:58.586  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-21 13:09:58.586  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-21 13:09:58.587 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-21 13:09:58.587 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-21 13:09:58.587 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-21 13:09:58.588 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-21 13:09:58.588 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-21 13:09:58.588 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-21 13:09:58.589 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-21 13:09:58.592 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 132455808149188497089813792829113579957337273472
             IssuerDN: UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 21 11:17:12 UTC 2021
           Final Date: Mon Apr 21 11:17:12 UTC 2031
            SubjectDN: UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f9:0c:0e:b9:53:a6:ea:66:e3:2a:77:8b:27:17:05:66:3e:86:a9:c7]
            modulus: cd1f0d9a0d079d17c51e52dde2d39a151b00d163f73d957d8225fcba369db7a6a29f7d8e8af1751754289b007a37ea5cd34e497cdd51c0e1cc5ff3a366b288f84b7dd8b5df80f3c81cd4e5f9a882e45309357d840a29e8850d0fc17292068edb1a5dced2236906c506813ed567c511a892d44b6bde8af23c61d3748afe40bc9e2e834ccc52d4c200e55a92bd49d4c1bbac94b365de0d9c5e1261976f0c25bc583e65c253db28af4b8336d4f3f0480e18f4d18289908cc0a1d6c273c1a3237ea113fc6badf8d1402cba6440044dc5c291c9564890943887612363c699525ca003fe1f09a3c19a4dc225aae837c3d0f8a805e866ef07ce3b386d1b0db041f29dfdabee2d22ff173c06c7e0744b775fbf6a8fa3090e0eb11b8c708a109d658ac2f3f04ff97c6bfd97b4fb0c28be9256f551a76723aa68957d52a437fb866fb36c071b3c238bc89c55e707ce402d90f1232dbc812ef3f8770e97139ce4211ed05db069197416fae5a41766970686130db9eb2b808ea23bd59ed56610b9f5a0d7bbcb
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 81a49aef6ba4d140f3db2675de78c30f284f0f7c
                       87ecb2679329df7565e0d836c0c006afffb5ad98
                       fef5aa37043050f1e772554993bf7e54e30a123c
                       bd178ab46a95e1ca57bc11cd69d8416cfd8e306a
                       4c69f5c35c3d198e1c46e9a7f340fb8fe3caee28
                       7d47de5e194211fedcf7932c01d385c481a4d050
                       306877b512ea45f698102f448bf00411645b5035
                       e2463e5fd75f2b2f8855cf0f8850441904995b3a
                       f19efd5844ea3b100fb4d715a490c0f989cd67d2
                       d3a046546d7e770e22bc856fde82307448a8d947
                       2601b9e73bd3958643cd830d36f4cfd74e403839
                       e00c6d4854dacb4d7f6047b44a5446194a60e2df
                       e94d63b05797139864c7b5e12713c83757cd3833
                       34ca230bf94ba17555acc4a13cd519f282b4ad72
                       3ad845e675c5f57ac2491e425093e9669286f337
                       49063d379d92b861cdcced2b647bc36703129e7d
                       0b1ecc416b62f79d109f04bd9a38ee9fe00e9e91
                       d1ec82fcf6cc3d512cf2ea2508717fadda7caa19
                       5b7614980255de6ab85550dbc543416ba239d7bd
                       1f8c1ca6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a4:81:44:d0:46:70:e6:79:33:f6:fc:b7:05:82:c0:7f:b8:95:1f:73]
            modulus: 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
    public exponent: 10001

] 
2021-04-21 13:09:58.668  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-21 13:09:58.669 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-21 13:09:58.670 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-04-21 13:09:58.670 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-21 13:09:58.671  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-04-21 13:09:58.671  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-21 13:09:58.672  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-21 13:09:58.672  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-21 13:09:58.672  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-21 13:09:58.714  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-21 13:09:58.715  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-21 13:09:58.715  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-21 13:09:58.716  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-21 13:09:58.777  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-21 13:09:58.812  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-21 13:09:58.813 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-21 13:09:58.815 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-21 13:09:58.815  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1340
2021-04-21 13:09:58.815  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-21 13:09:58.816  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-21 13:09:58.817  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-21 13:09:58.817  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-21 13:09:58.818  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-21 13:09:58.818 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-21 13:09:58.818 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-21 13:09:58.818 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-21 13:09:58.819 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-21 13:09:58.819 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-21 13:09:58.819 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-21 13:09:58.820 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-21 13:09:58.823 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 132455808149188497089813792829113579957337273472
             IssuerDN: UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 21 11:17:12 UTC 2021
           Final Date: Mon Apr 21 11:17:12 UTC 2031
            SubjectDN: UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f9:0c:0e:b9:53:a6:ea:66:e3:2a:77:8b:27:17:05:66:3e:86:a9:c7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 81a49aef6ba4d140f3db2675de78c30f284f0f7c
                       87ecb2679329df7565e0d836c0c006afffb5ad98
                       fef5aa37043050f1e772554993bf7e54e30a123c
                       bd178ab46a95e1ca57bc11cd69d8416cfd8e306a
                       4c69f5c35c3d198e1c46e9a7f340fb8fe3caee28
                       7d47de5e194211fedcf7932c01d385c481a4d050
                       306877b512ea45f698102f448bf00411645b5035
                       e2463e5fd75f2b2f8855cf0f8850441904995b3a
                       f19efd5844ea3b100fb4d715a490c0f989cd67d2
                       d3a046546d7e770e22bc856fde82307448a8d947
                       2601b9e73bd3958643cd830d36f4cfd74e403839
                       e00c6d4854dacb4d7f6047b44a5446194a60e2df
                       e94d63b05797139864c7b5e12713c83757cd3833
                       34ca230bf94ba17555acc4a13cd519f282b4ad72
                       3ad845e675c5f57ac2491e425093e9669286f337
                       49063d379d92b861cdcced2b647bc36703129e7d
                       0b1ecc416b62f79d109f04bd9a38ee9fe00e9e91
                       d1ec82fcf6cc3d512cf2ea2508717fadda7caa19
                       5b7614980255de6ab85550dbc543416ba239d7bd
                       1f8c1ca6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5a:19:80:26:b2:a8:27:6b:70:66:18:e6:6b:e5:c3:5c:9f:ac:c6:c1]
            modulus: 8582b51d308c056037fa84d9ee4ce9e431390db3c0ee3f8636241ed1747f209b6b4389be328d145bba346240ed4f56b264df85a53e0ddbdc9fb6ec2bd767361af7f23048e05b612a8146a72b0af6e7b1a47fc9e17f0cda96a56e753452edf5479cb935897a1de002613a1eb9a3d63560124e23c2f088290481efdbeb5479bf31f86b1843c7981e5345ac13fb7eb9c2c60d6a7cafce2fd0a2c6eee7fadc70cd1aab4d03b94f82c8626a7ea8af7060ed50866f481dc5bf90ec01ea84a4b14f99146454aec85240d985e4a3640deeb31a59c4d0a956017476863b9ab70f66620ff88d1f7904ab956139dfcb13ae8135b7c4a0814c84c860528096faeb7a9bae2391
    public exponent: 10001

] 
2021-04-21 13:13:41.513  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-21 13:13:41.515 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-21 13:13:41.517 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-21 13:13:41.518 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-21 13:13:41.518  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-21 13:13:41.519  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-21 13:13:41.520  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-21 13:13:41.520  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-21 13:13:41.521  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-21 13:13:41.529  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-21 13:13:41.530  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-21 13:13:41.530  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-21 13:13:41.532  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-21 13:13:41.796  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-21 13:13:41.797  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-21 13:13:41.799 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-21 13:13:41.800 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-21 13:13:41.801  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1340
2021-04-21 13:13:41.801  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-21 13:13:41.802  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-21 13:13:41.803  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-21 13:13:41.803  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-21 13:13:41.803  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-21 13:13:41.804 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-21 13:13:41.804 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-21 13:13:41.804 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-21 13:13:41.805 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-21 13:13:41.805 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-21 13:13:41.806 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-21 13:13:41.806 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-21 13:13:41.809 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 132455808149188497089813792829113579957337273472
             IssuerDN: UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 21 11:17:12 UTC 2021
           Final Date: Mon Apr 21 11:17:12 UTC 2031
            SubjectDN: UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f9:0c:0e:b9:53:a6:ea:66:e3:2a:77:8b:27:17:05:66:3e:86:a9:c7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 81a49aef6ba4d140f3db2675de78c30f284f0f7c
                       87ecb2679329df7565e0d836c0c006afffb5ad98
                       fef5aa37043050f1e772554993bf7e54e30a123c
                       bd178ab46a95e1ca57bc11cd69d8416cfd8e306a
                       4c69f5c35c3d198e1c46e9a7f340fb8fe3caee28
                       7d47de5e194211fedcf7932c01d385c481a4d050
                       306877b512ea45f698102f448bf00411645b5035
                       e2463e5fd75f2b2f8855cf0f8850441904995b3a
                       f19efd5844ea3b100fb4d715a490c0f989cd67d2
                       d3a046546d7e770e22bc856fde82307448a8d947
                       2601b9e73bd3958643cd830d36f4cfd74e403839
                       e00c6d4854dacb4d7f6047b44a5446194a60e2df
                       e94d63b05797139864c7b5e12713c83757cd3833
                       34ca230bf94ba17555acc4a13cd519f282b4ad72
                       3ad845e675c5f57ac2491e425093e9669286f337
                       49063d379d92b861cdcced2b647bc36703129e7d
                       0b1ecc416b62f79d109f04bd9a38ee9fe00e9e91
                       d1ec82fcf6cc3d512cf2ea2508717fadda7caa19
                       5b7614980255de6ab85550dbc543416ba239d7bd
                       1f8c1ca6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ad:0c:88:96:fd:7a:25:49:5a:c6:bc:a9:35:77:c8:91:16:f3:af:52]
            modulus: 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
    public exponent: 10001

] 
2021-04-21 13:17:10.399  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-21 13:17:10.401 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-21 13:17:10.402 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-21 13:17:10.403 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-21 13:17:10.403  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-21 13:17:10.404  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-21 13:17:10.404  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-21 13:17:10.405  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-21 13:17:10.405  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-21 13:17:10.410  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-21 13:17:10.411  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-21 13:17:10.411  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-21 13:17:10.412  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-21 13:17:10.531  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-21 13:17:10.532  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-21 13:17:10.532 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-21 13:17:10.534 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-21 13:17:10.534  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1340
2021-04-21 13:17:10.535  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-21 13:17:10.536  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-21 13:17:10.537  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-21 13:17:10.537  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-21 13:17:10.538  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-21 13:17:10.538 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-21 13:17:10.538 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-21 13:17:10.538 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-21 13:17:10.539 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-21 13:17:10.540 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-21 13:17:10.540 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-21 13:17:10.541 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-21 13:17:10.544 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 132455808149188497089813792829113579957337273472
             IssuerDN: UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 21 11:17:12 UTC 2021
           Final Date: Mon Apr 21 11:17:12 UTC 2031
            SubjectDN: UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f9:0c:0e:b9:53:a6:ea:66:e3:2a:77:8b:27:17:05:66:3e:86:a9:c7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 81a49aef6ba4d140f3db2675de78c30f284f0f7c
                       87ecb2679329df7565e0d836c0c006afffb5ad98
                       fef5aa37043050f1e772554993bf7e54e30a123c
                       bd178ab46a95e1ca57bc11cd69d8416cfd8e306a
                       4c69f5c35c3d198e1c46e9a7f340fb8fe3caee28
                       7d47de5e194211fedcf7932c01d385c481a4d050
                       306877b512ea45f698102f448bf00411645b5035
                       e2463e5fd75f2b2f8855cf0f8850441904995b3a
                       f19efd5844ea3b100fb4d715a490c0f989cd67d2
                       d3a046546d7e770e22bc856fde82307448a8d947
                       2601b9e73bd3958643cd830d36f4cfd74e403839
                       e00c6d4854dacb4d7f6047b44a5446194a60e2df
                       e94d63b05797139864c7b5e12713c83757cd3833
                       34ca230bf94ba17555acc4a13cd519f282b4ad72
                       3ad845e675c5f57ac2491e425093e9669286f337
                       49063d379d92b861cdcced2b647bc36703129e7d
                       0b1ecc416b62f79d109f04bd9a38ee9fe00e9e91
                       d1ec82fcf6cc3d512cf2ea2508717fadda7caa19
                       5b7614980255de6ab85550dbc543416ba239d7bd
                       1f8c1ca6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [52:3a:70:94:6b:f5:15:ae:dc:20:7f:49:a1:4a:79:5e:36:d5:9a:2e]
            modulus: 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
    public exponent: 10001

] 
2021-04-21 13:19:03.226  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-21 13:19:03.227 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-21 13:19:03.228 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-21 13:19:03.229 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-21 13:19:03.229  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-21 13:19:03.230  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-21 13:19:03.230  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-21 13:19:03.230  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-21 13:19:03.230  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-21 13:19:03.236  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-21 13:19:03.237  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-21 13:19:03.237  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-21 13:19:03.238  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-21 13:19:03.366  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-21 13:19:03.367  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-21 13:19:03.367 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-21 13:19:03.368 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-21 13:19:03.369  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1340
2021-04-21 13:19:03.369  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-21 13:19:03.371  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-21 13:19:03.372  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-21 13:19:03.372  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-21 13:19:03.372  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-21 13:19:03.373 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-21 13:19:03.373 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-21 13:19:03.373 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-21 13:19:03.374 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-21 13:19:03.374 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-21 13:19:03.374 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-21 13:19:03.375 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-21 13:19:03.378 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 132455808149188497089813792829113579957337273472
             IssuerDN: UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 21 11:17:12 UTC 2021
           Final Date: Mon Apr 21 11:17:12 UTC 2031
            SubjectDN: UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f9:0c:0e:b9:53:a6:ea:66:e3:2a:77:8b:27:17:05:66:3e:86:a9:c7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 81a49aef6ba4d140f3db2675de78c30f284f0f7c
                       87ecb2679329df7565e0d836c0c006afffb5ad98
                       fef5aa37043050f1e772554993bf7e54e30a123c
                       bd178ab46a95e1ca57bc11cd69d8416cfd8e306a
                       4c69f5c35c3d198e1c46e9a7f340fb8fe3caee28
                       7d47de5e194211fedcf7932c01d385c481a4d050
                       306877b512ea45f698102f448bf00411645b5035
                       e2463e5fd75f2b2f8855cf0f8850441904995b3a
                       f19efd5844ea3b100fb4d715a490c0f989cd67d2
                       d3a046546d7e770e22bc856fde82307448a8d947
                       2601b9e73bd3958643cd830d36f4cfd74e403839
                       e00c6d4854dacb4d7f6047b44a5446194a60e2df
                       e94d63b05797139864c7b5e12713c83757cd3833
                       34ca230bf94ba17555acc4a13cd519f282b4ad72
                       3ad845e675c5f57ac2491e425093e9669286f337
                       49063d379d92b861cdcced2b647bc36703129e7d
                       0b1ecc416b62f79d109f04bd9a38ee9fe00e9e91
                       d1ec82fcf6cc3d512cf2ea2508717fadda7caa19
                       5b7614980255de6ab85550dbc543416ba239d7bd
                       1f8c1ca6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a5:3a:2b:d0:5a:15:fc:bc:2a:c1:df:24:4b:4f:f7:08:e4:ba:d3:6a]
            modulus: 882e936d77b1ff842a0a12b57b7199641776a9b539e6b86ed9172145656a26e019209624aa87dc51a812e93de973ed0e7e5df91c577270cd5f6c7dd519c09eb94df949ce6beac077cbb3123dc85a18a9ccb041d267a287fdf98f414aafc6525c4fb21dee1dfc9c6c5c00b1ef77563c8577ab4c4cf7f1f7038d0c8f15002ed53630541e3b407d0cbab9da9c27769794afaf5ac1039475ac17bd456dca0c525a142fceb6a0054761393357a00030af93909a8801ce3aa73dac722837cec59036329e6d8e7858bdc6d5bbffa28a6315f0891d5ac4026bb42253cf06891238904fc4634732e7121aae65b253b3d83e4a5e87e7c87ba66ab306ca48f55ffce0aacc7f
    public exponent: 10001

] 
2021-04-21 13:20:48.934  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-21 13:20:48.935 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-21 13:20:48.936 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-21 13:20:48.937 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-21 13:20:48.937  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-21 13:20:48.938  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-21 13:20:48.939  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-21 13:20:48.939  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-21 13:20:48.939  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-21 13:20:48.944  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-21 13:20:48.945  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-21 13:20:48.946  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-21 13:20:48.947  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-21 13:20:49.036  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-21 13:20:49.037  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-21 13:20:49.037 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-21 13:20:49.042 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-21 13:20:49.042  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1340
2021-04-21 13:20:49.042  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-21 13:20:49.043  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-21 13:20:49.044  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-21 13:20:49.045  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-21 13:20:49.045  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-21 13:20:49.045 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-21 13:20:49.046 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-21 13:20:49.046 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-21 13:20:49.046 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-21 13:20:49.047 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-21 13:20:49.047 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-21 13:20:49.048 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-21 13:20:49.051 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 132455808149188497089813792829113579957337273472
             IssuerDN: UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 21 11:17:12 UTC 2021
           Final Date: Mon Apr 21 11:17:12 UTC 2031
            SubjectDN: UID=c-04b2783e23b3f6a38,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f9:0c:0e:b9:53:a6:ea:66:e3:2a:77:8b:27:17:05:66:3e:86:a9:c7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 81a49aef6ba4d140f3db2675de78c30f284f0f7c
                       87ecb2679329df7565e0d836c0c006afffb5ad98
                       fef5aa37043050f1e772554993bf7e54e30a123c
                       bd178ab46a95e1ca57bc11cd69d8416cfd8e306a
                       4c69f5c35c3d198e1c46e9a7f340fb8fe3caee28
                       7d47de5e194211fedcf7932c01d385c481a4d050
                       306877b512ea45f698102f448bf00411645b5035
                       e2463e5fd75f2b2f8855cf0f8850441904995b3a
                       f19efd5844ea3b100fb4d715a490c0f989cd67d2
                       d3a046546d7e770e22bc856fde82307448a8d947
                       2601b9e73bd3958643cd830d36f4cfd74e403839
                       e00c6d4854dacb4d7f6047b44a5446194a60e2df
                       e94d63b05797139864c7b5e12713c83757cd3833
                       34ca230bf94ba17555acc4a13cd519f282b4ad72
                       3ad845e675c5f57ac2491e425093e9669286f337
                       49063d379d92b861cdcced2b647bc36703129e7d
                       0b1ecc416b62f79d109f04bd9a38ee9fe00e9e91
                       d1ec82fcf6cc3d512cf2ea2508717fadda7caa19
                       5b7614980255de6ab85550dbc543416ba239d7bd
                       1f8c1ca6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [28:74:b1:d4:c9:2c:81:ba:d6:a2:43:a6:75:9e:a8:4c:23:3f:dd:65]
            modulus: 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
    public exponent: 10001

]