2021-05-03 09:27:21,645 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-05-03 09:27:25,257 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-05-03 09:27:28.251  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-05-03 09:27:38.553 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-05-03 09:27:39.660  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-05-03 09:27:40.360  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-05-03 09:27:52.446  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 32.896 seconds (JVM running for 39.668) 2021-05-03 09:34:16.754  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-03 09:34:16.768 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-03 09:34:16.952 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-03 09:34:16.956 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-03 09:34:17.052  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-03 09:34:17.056  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-03 09:34:17.060  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-03 09:34:17.061  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 09:34:17.061  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-03 09:34:17.150  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-03 09:34:17.154  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-03 09:34:17.271  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-03 09:34:17.350  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 09:34:17.350  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 09:34:17.364  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-03 09:34:19.046  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-03 09:34:19.050  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-03 09:34:19.050 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-03 09:34:19.055 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-03 09:34:19.057  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1991 2021-05-03 09:34:19.058  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-03 09:34:19.145  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-03 09:34:19.147  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-03 09:34:19.154  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-03 09:34:19.155  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-03 09:34:19.156 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 09:34:19.156 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 09:34:19.157 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 09:34:19.250 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 09:34:19.251 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 09:34:19.251 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 09:34:19.258 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-03 09:34:19.449 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 560992972719798587137074830452905009534580375655 IssuerDN: UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 03 09:24:11 UTC 2021 Final Date: Sat May 03 09:24:11 UTC 2031 SubjectDN: UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d8:87:e1:c0:04:33:54:68:cf:f3:02:d7:a5:50:f4:26:cb:98:cc:90] modulus: cc0512660be94d261975bfb16cb40f42ea6044e652e7910c9af26cd95b9f08e27bf6c5138b8843bd09353bd66a1082c107c8cf236d84cb99d490a8326b976d384e0b22266c1353428389aa511270fd8d26fc46ef4ab6d8b7cd6f642f93eaf95446bcd0e3eda5d0e78d4ac8cea1a780cfd1e7c5a7d653f1358fedaa912bba807da64ef6111eaac2fca623c6b63039500e672b640f991fe69f47d7a4de34dffaecb4810a363bf78b7d78d618c7bfc67c46bd4aaf955586348ebff55cab6b7c1b474c15a10f011b75389dbd98148b37c1e223e894a553c4b199f859708d23a4c0c38b1099d7738450c015656336f0982d50ac263012accd0018b7b13907a01f2c224bd6df85b435bead2ce00c64a267d9eb8929d1bab35e6060cd5177b6a3048a96d9873505d0d966369082c034fddafcb98611f922c2c58eef9a123f84394abb6c2554bf03f53ebc43ee3e58a152b0c8b0ef390ca85bc6b35337f207310813a51d4151f41a5204f30a866212b648725a304f68c3dab3e5b64905b38c1a516fa1c9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62f7d742ecb7b51164401337570d7c1b7d6f7c0a 3468c3cb30a3260f3338039da20adaa28b7cc4e6 004e2756fe6329e1dd84c562401f773400e7eeb3 e33edd494ddefe75cd3c98070c00157b275c3ad3 65a4efc736e74b53347ff05330fde68bfe6ecdc1 5635b9b4c2e65e3f825f87638025e19a642f4d78 4af27153e905d95bfa1b2101164ba53a7f7bc0ab 32f5a63a55b58e21ee6641c71359da84976072f7 6e7442af75288c9e664c0cb9487323b6fd8e9886 83cd1e1fc3b032a062d58ba9a1d9332b06cbdfd3 a28ea7bbbaa68510516904cf29355cf3f15bc9ac ffc1c0d2b61f65202a9658a90bdef398fa5ee73b 5e8cab9f6c2ff6c4842574c405731d567fa4b238 a921e4226a82aa9a3925ec411250dfcc96ee72e1 222c8e2b224e7d734be284108f93d08787ef3aa9 ffa2fd27ff80d058cb5f8d057c44ed50593e54f4 ca84d1139addfc422352903710807367a00e0567 0817598d9d6a5d5027a7b3a382328f25b665e09a a6890026b342a0aa0bc7f761ff5be6dc0e74575e 47b13067 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0a:d0:8f:57:c1:bd:e5:96:77:0c:08:71:fe:fc:87:34:34:1e:ae:00] modulus: 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 public exponent: 10001 ] 2021-05-03 10:30:44.105  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-03 10:30:44.107 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-03 10:30:44.151 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-03 10:30:44.152 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-03 10:30:44.153  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-03 10:30:44.154  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-03 10:30:44.154  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-03 10:30:44.155  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-03 10:30:44.156  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-03 10:30:44.344  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-03 10:30:44.346  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 10:30:44.347  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 10:30:44.350  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-03 10:30:44.514  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-03 10:30:44.515  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-03 10:30:44.515 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-03 10:30:44.519 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-03 10:30:44.520  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1991 2021-05-03 10:30:44.521  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-03 10:30:44.523  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-03 10:30:44.523  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-03 10:30:44.524  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-03 10:30:44.524  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-03 10:30:44.525 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 10:30:44.525 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 10:30:44.525 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 10:30:44.543 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 10:30:44.543 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 10:30:44.544 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 10:30:44.546 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-03 10:30:44.552 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 560992972719798587137074830452905009534580375655 IssuerDN: UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 03 09:24:11 UTC 2021 Final Date: Sat May 03 09:24:11 UTC 2031 SubjectDN: UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d8:87:e1:c0:04:33:54:68:cf:f3:02:d7:a5:50:f4:26:cb:98:cc:90] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62f7d742ecb7b51164401337570d7c1b7d6f7c0a 3468c3cb30a3260f3338039da20adaa28b7cc4e6 004e2756fe6329e1dd84c562401f773400e7eeb3 e33edd494ddefe75cd3c98070c00157b275c3ad3 65a4efc736e74b53347ff05330fde68bfe6ecdc1 5635b9b4c2e65e3f825f87638025e19a642f4d78 4af27153e905d95bfa1b2101164ba53a7f7bc0ab 32f5a63a55b58e21ee6641c71359da84976072f7 6e7442af75288c9e664c0cb9487323b6fd8e9886 83cd1e1fc3b032a062d58ba9a1d9332b06cbdfd3 a28ea7bbbaa68510516904cf29355cf3f15bc9ac ffc1c0d2b61f65202a9658a90bdef398fa5ee73b 5e8cab9f6c2ff6c4842574c405731d567fa4b238 a921e4226a82aa9a3925ec411250dfcc96ee72e1 222c8e2b224e7d734be284108f93d08787ef3aa9 ffa2fd27ff80d058cb5f8d057c44ed50593e54f4 ca84d1139addfc422352903710807367a00e0567 0817598d9d6a5d5027a7b3a382328f25b665e09a a6890026b342a0aa0bc7f761ff5be6dc0e74575e 47b13067 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8a:89:01:c5:3f:58:95:44:92:96:7e:34:73:e0:51:74:5a:69:10:11] modulus: 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 public exponent: 10001 ] 2021-05-03 10:32:03.575  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-03 10:32:03.575 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-03 10:32:03.576 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-05-03 10:32:03.577 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-03 10:32:03.578  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-05-03 10:32:03.578  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-03 10:32:03.579  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-03 10:32:03.579  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-03 10:32:03.580  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-03 10:32:03.584  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-03 10:32:03.584  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 10:32:03.585  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 10:32:03.586  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-03 10:32:03.678  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-03 10:32:03.678  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-03 10:32:03.679 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-03 10:32:03.680 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-03 10:32:03.681  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1991 2021-05-03 10:32:03.682  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-03 10:32:03.683  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-03 10:32:03.684  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-03 10:32:03.684  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-03 10:32:03.684  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-03 10:32:03.685 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 10:32:03.685 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 10:32:03.686 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 10:32:03.687 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 10:32:03.687 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 10:32:03.687 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 10:32:03.688 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-03 10:32:03.745 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 560992972719798587137074830452905009534580375655 IssuerDN: UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 03 09:24:11 UTC 2021 Final Date: Sat May 03 09:24:11 UTC 2031 SubjectDN: UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d8:87:e1:c0:04:33:54:68:cf:f3:02:d7:a5:50:f4:26:cb:98:cc:90] modulus: cc0512660be94d261975bfb16cb40f42ea6044e652e7910c9af26cd95b9f08e27bf6c5138b8843bd09353bd66a1082c107c8cf236d84cb99d490a8326b976d384e0b22266c1353428389aa511270fd8d26fc46ef4ab6d8b7cd6f642f93eaf95446bcd0e3eda5d0e78d4ac8cea1a780cfd1e7c5a7d653f1358fedaa912bba807da64ef6111eaac2fca623c6b63039500e672b640f991fe69f47d7a4de34dffaecb4810a363bf78b7d78d618c7bfc67c46bd4aaf955586348ebff55cab6b7c1b474c15a10f011b75389dbd98148b37c1e223e894a553c4b199f859708d23a4c0c38b1099d7738450c015656336f0982d50ac263012accd0018b7b13907a01f2c224bd6df85b435bead2ce00c64a267d9eb8929d1bab35e6060cd5177b6a3048a96d9873505d0d966369082c034fddafcb98611f922c2c58eef9a123f84394abb6c2554bf03f53ebc43ee3e58a152b0c8b0ef390ca85bc6b35337f207310813a51d4151f41a5204f30a866212b648725a304f68c3dab3e5b64905b38c1a516fa1c9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62f7d742ecb7b51164401337570d7c1b7d6f7c0a 3468c3cb30a3260f3338039da20adaa28b7cc4e6 004e2756fe6329e1dd84c562401f773400e7eeb3 e33edd494ddefe75cd3c98070c00157b275c3ad3 65a4efc736e74b53347ff05330fde68bfe6ecdc1 5635b9b4c2e65e3f825f87638025e19a642f4d78 4af27153e905d95bfa1b2101164ba53a7f7bc0ab 32f5a63a55b58e21ee6641c71359da84976072f7 6e7442af75288c9e664c0cb9487323b6fd8e9886 83cd1e1fc3b032a062d58ba9a1d9332b06cbdfd3 a28ea7bbbaa68510516904cf29355cf3f15bc9ac ffc1c0d2b61f65202a9658a90bdef398fa5ee73b 5e8cab9f6c2ff6c4842574c405731d567fa4b238 a921e4226a82aa9a3925ec411250dfcc96ee72e1 222c8e2b224e7d734be284108f93d08787ef3aa9 ffa2fd27ff80d058cb5f8d057c44ed50593e54f4 ca84d1139addfc422352903710807367a00e0567 0817598d9d6a5d5027a7b3a382328f25b665e09a a6890026b342a0aa0bc7f761ff5be6dc0e74575e 47b13067 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2b:83:06:6f:80:d0:9d:c7:97:29:a3:83:a7:c5:d0:53:23:31:b5:07] modulus: 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 public exponent: 10001 ] 2021-05-03 10:35:24.958  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-03 10:35:24.959 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-03 10:35:24.960 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-03 10:35:24.961 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-03 10:35:24.962  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-03 10:35:24.962  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-03 10:35:24.963  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-03 10:35:24.963  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-03 10:35:24.963  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-03 10:35:24.968  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-03 10:35:24.968  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 10:35:24.969  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 10:35:24.971  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-03 10:35:25.089  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-03 10:35:25.090  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-03 10:35:25.091 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-03 10:35:25.093 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-03 10:35:25.094  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1991 2021-05-03 10:35:25.094  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-03 10:35:25.096  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-03 10:35:25.096  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-03 10:35:25.097  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-03 10:35:25.097  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-03 10:35:25.098 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 10:35:25.098 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 10:35:25.099 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 10:35:25.100 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 10:35:25.100 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 10:35:25.100 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 10:35:25.102 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-03 10:35:25.108 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 560992972719798587137074830452905009534580375655 IssuerDN: UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 03 09:24:11 UTC 2021 Final Date: Sat May 03 09:24:11 UTC 2031 SubjectDN: UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d8:87:e1:c0:04:33:54:68:cf:f3:02:d7:a5:50:f4:26:cb:98:cc:90] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62f7d742ecb7b51164401337570d7c1b7d6f7c0a 3468c3cb30a3260f3338039da20adaa28b7cc4e6 004e2756fe6329e1dd84c562401f773400e7eeb3 e33edd494ddefe75cd3c98070c00157b275c3ad3 65a4efc736e74b53347ff05330fde68bfe6ecdc1 5635b9b4c2e65e3f825f87638025e19a642f4d78 4af27153e905d95bfa1b2101164ba53a7f7bc0ab 32f5a63a55b58e21ee6641c71359da84976072f7 6e7442af75288c9e664c0cb9487323b6fd8e9886 83cd1e1fc3b032a062d58ba9a1d9332b06cbdfd3 a28ea7bbbaa68510516904cf29355cf3f15bc9ac ffc1c0d2b61f65202a9658a90bdef398fa5ee73b 5e8cab9f6c2ff6c4842574c405731d567fa4b238 a921e4226a82aa9a3925ec411250dfcc96ee72e1 222c8e2b224e7d734be284108f93d08787ef3aa9 ffa2fd27ff80d058cb5f8d057c44ed50593e54f4 ca84d1139addfc422352903710807367a00e0567 0817598d9d6a5d5027a7b3a382328f25b665e09a a6890026b342a0aa0bc7f761ff5be6dc0e74575e 47b13067 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [38:9b:e7:ec:9f:01:bd:e4:bf:e5:cd:31:29:f9:69:53:f7:3b:e1:de] modulus: dd0ba83b0189e73c11aaa9604fdeb2cc769da120b2628cce4f99889c96f946d766f0502076d924ff3a449c0dc5d479a2a7d24c0c2f0298e38989fc0eecd572d891c515094e5a3d5ddfaf99509308edebce6a6da88b5b2ea2d55f5472dbaff18573e4842ce44a13e71a50b65f00b72c6eedaf173463f151e896c6219b4e2ecd367e320049268ab1e6d4ae80ea7d4129264cb0b1e92b45d57211d898eace2325859b2864215b0cdd0976cb7a6220f17e74a02cd68c6076cf0b105eed12706050ae2c2d7a28976b2cd6ec03ce2fdaa5d70259da35b1bb57bb0234ef5cf2fbc8b876827b01519b9a6cc286bd90f8aed02f806dc43100475c15e69f712caae945a4d3 public exponent: 10001 ] 2021-05-03 10:36:01.477  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-03 10:36:01.479 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-03 10:36:01.481 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-03 10:36:01.482 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-03 10:36:01.482  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-03 10:36:01.483  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-03 10:36:01.484  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-03 10:36:01.484  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-03 10:36:01.485  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-03 10:36:01.543  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-03 10:36:01.544  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 10:36:01.545  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 10:36:01.546  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-03 10:36:01.620  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-03 10:36:01.621  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-03 10:36:01.622 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-03 10:36:01.624 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-03 10:36:01.625  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1991 2021-05-03 10:36:01.626  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-03 10:36:01.628  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-03 10:36:01.628  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-03 10:36:01.629  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-03 10:36:01.630  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-03 10:36:01.630 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 10:36:01.630 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 10:36:01.631 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 10:36:01.643 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 10:36:01.644 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 10:36:01.644 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 10:36:01.646 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-03 10:36:01.650 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 560992972719798587137074830452905009534580375655 IssuerDN: UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 03 09:24:11 UTC 2021 Final Date: Sat May 03 09:24:11 UTC 2031 SubjectDN: UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d8:87:e1:c0:04:33:54:68:cf:f3:02:d7:a5:50:f4:26:cb:98:cc:90] modulus: cc0512660be94d261975bfb16cb40f42ea6044e652e7910c9af26cd95b9f08e27bf6c5138b8843bd09353bd66a1082c107c8cf236d84cb99d490a8326b976d384e0b22266c1353428389aa511270fd8d26fc46ef4ab6d8b7cd6f642f93eaf95446bcd0e3eda5d0e78d4ac8cea1a780cfd1e7c5a7d653f1358fedaa912bba807da64ef6111eaac2fca623c6b63039500e672b640f991fe69f47d7a4de34dffaecb4810a363bf78b7d78d618c7bfc67c46bd4aaf955586348ebff55cab6b7c1b474c15a10f011b75389dbd98148b37c1e223e894a553c4b199f859708d23a4c0c38b1099d7738450c015656336f0982d50ac263012accd0018b7b13907a01f2c224bd6df85b435bead2ce00c64a267d9eb8929d1bab35e6060cd5177b6a3048a96d9873505d0d966369082c034fddafcb98611f922c2c58eef9a123f84394abb6c2554bf03f53ebc43ee3e58a152b0c8b0ef390ca85bc6b35337f207310813a51d4151f41a5204f30a866212b648725a304f68c3dab3e5b64905b38c1a516fa1c9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62f7d742ecb7b51164401337570d7c1b7d6f7c0a 3468c3cb30a3260f3338039da20adaa28b7cc4e6 004e2756fe6329e1dd84c562401f773400e7eeb3 e33edd494ddefe75cd3c98070c00157b275c3ad3 65a4efc736e74b53347ff05330fde68bfe6ecdc1 5635b9b4c2e65e3f825f87638025e19a642f4d78 4af27153e905d95bfa1b2101164ba53a7f7bc0ab 32f5a63a55b58e21ee6641c71359da84976072f7 6e7442af75288c9e664c0cb9487323b6fd8e9886 83cd1e1fc3b032a062d58ba9a1d9332b06cbdfd3 a28ea7bbbaa68510516904cf29355cf3f15bc9ac ffc1c0d2b61f65202a9658a90bdef398fa5ee73b 5e8cab9f6c2ff6c4842574c405731d567fa4b238 a921e4226a82aa9a3925ec411250dfcc96ee72e1 222c8e2b224e7d734be284108f93d08787ef3aa9 ffa2fd27ff80d058cb5f8d057c44ed50593e54f4 ca84d1139addfc422352903710807367a00e0567 0817598d9d6a5d5027a7b3a382328f25b665e09a a6890026b342a0aa0bc7f761ff5be6dc0e74575e 47b13067 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [67:67:31:c4:ff:93:16:6b:96:78:1f:b1:65:86:5a:f4:ea:2c:a7:a5] modulus: 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 public exponent: 10001 ] 2021-05-03 10:36:13.424  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-03 10:36:13.425 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-03 10:36:13.426 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-05-03 10:36:13.427 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-03 10:36:13.427  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-05-03 10:36:13.428  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-03 10:36:13.428  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-03 10:36:13.429  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-03 10:36:13.429  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-03 10:36:13.434  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-03 10:36:13.435  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 10:36:13.435  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 10:36:13.437  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-03 10:36:13.571  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-03 10:36:13.572  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-03 10:36:13.572 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-03 10:36:13.573 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-03 10:36:13.574  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1991 2021-05-03 10:36:13.574  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-03 10:36:13.576  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-03 10:36:13.576  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-03 10:36:13.576  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-03 10:36:13.577  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-03 10:36:13.577 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 10:36:13.577 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 10:36:13.578 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 10:36:13.578 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 10:36:13.578 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 10:36:13.579 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 10:36:13.582 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-03 10:36:13.585 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 560992972719798587137074830452905009534580375655 IssuerDN: UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 03 09:24:11 UTC 2021 Final Date: Sat May 03 09:24:11 UTC 2031 SubjectDN: UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d8:87:e1:c0:04:33:54:68:cf:f3:02:d7:a5:50:f4:26:cb:98:cc:90] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62f7d742ecb7b51164401337570d7c1b7d6f7c0a 3468c3cb30a3260f3338039da20adaa28b7cc4e6 004e2756fe6329e1dd84c562401f773400e7eeb3 e33edd494ddefe75cd3c98070c00157b275c3ad3 65a4efc736e74b53347ff05330fde68bfe6ecdc1 5635b9b4c2e65e3f825f87638025e19a642f4d78 4af27153e905d95bfa1b2101164ba53a7f7bc0ab 32f5a63a55b58e21ee6641c71359da84976072f7 6e7442af75288c9e664c0cb9487323b6fd8e9886 83cd1e1fc3b032a062d58ba9a1d9332b06cbdfd3 a28ea7bbbaa68510516904cf29355cf3f15bc9ac ffc1c0d2b61f65202a9658a90bdef398fa5ee73b 5e8cab9f6c2ff6c4842574c405731d567fa4b238 a921e4226a82aa9a3925ec411250dfcc96ee72e1 222c8e2b224e7d734be284108f93d08787ef3aa9 ffa2fd27ff80d058cb5f8d057c44ed50593e54f4 ca84d1139addfc422352903710807367a00e0567 0817598d9d6a5d5027a7b3a382328f25b665e09a a6890026b342a0aa0bc7f761ff5be6dc0e74575e 47b13067 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ec:7d:5e:6f:2d:dc:3e:4d:62:1e:51:da:86:6e:ee:4d:44:a5:99:cf] modulus: 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 public exponent: 10001 ] 2021-05-03 10:37:02.361  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-03 10:37:02.363 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-03 10:37:02.364 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-05-03 10:37:02.364 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-03 10:37:02.365  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-05-03 10:37:02.366  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-03 10:37:02.366  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-03 10:37:02.366  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-03 10:37:02.367  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-03 10:37:02.371  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-03 10:37:02.372  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 10:37:02.372  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 10:37:02.373  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-03 10:37:02.474  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-03 10:37:02.474  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-03 10:37:02.474 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-03 10:37:02.476 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-03 10:37:02.476  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1991 2021-05-03 10:37:02.476  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-03 10:37:02.478  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-03 10:37:02.478  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-03 10:37:02.479  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-03 10:37:02.479  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-03 10:37:02.479 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 10:37:02.480 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 10:37:02.480 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 10:37:02.481 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 10:37:02.481 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 10:37:02.482 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 10:37:02.482 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-03 10:37:02.485 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 560992972719798587137074830452905009534580375655 IssuerDN: UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 03 09:24:11 UTC 2021 Final Date: Sat May 03 09:24:11 UTC 2031 SubjectDN: UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d8:87:e1:c0:04:33:54:68:cf:f3:02:d7:a5:50:f4:26:cb:98:cc:90] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62f7d742ecb7b51164401337570d7c1b7d6f7c0a 3468c3cb30a3260f3338039da20adaa28b7cc4e6 004e2756fe6329e1dd84c562401f773400e7eeb3 e33edd494ddefe75cd3c98070c00157b275c3ad3 65a4efc736e74b53347ff05330fde68bfe6ecdc1 5635b9b4c2e65e3f825f87638025e19a642f4d78 4af27153e905d95bfa1b2101164ba53a7f7bc0ab 32f5a63a55b58e21ee6641c71359da84976072f7 6e7442af75288c9e664c0cb9487323b6fd8e9886 83cd1e1fc3b032a062d58ba9a1d9332b06cbdfd3 a28ea7bbbaa68510516904cf29355cf3f15bc9ac ffc1c0d2b61f65202a9658a90bdef398fa5ee73b 5e8cab9f6c2ff6c4842574c405731d567fa4b238 a921e4226a82aa9a3925ec411250dfcc96ee72e1 222c8e2b224e7d734be284108f93d08787ef3aa9 ffa2fd27ff80d058cb5f8d057c44ed50593e54f4 ca84d1139addfc422352903710807367a00e0567 0817598d9d6a5d5027a7b3a382328f25b665e09a a6890026b342a0aa0bc7f761ff5be6dc0e74575e 47b13067 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [08:52:b2:aa:0f:68:cb:e4:96:64:ae:3c:8a:c8:46:35:f0:a7:79:67] modulus: c036e5c045aff82fcb5a987faf6612643695f5e53a3b5522b698983e03be52c6782d3bb9423813886a457130c97c7e79732634f791d32536d0910b9ad67a82e7386c0348f3b6c65d28f6d4cc5ada82af8355dc5a4f54df414908d36c21d34c32eb00fe907c9ad88c2a7d65eb23bb27bedc918ac8dd49f0a4f5282a2382a99fe3833f94e8a19b4d7eb6c1c74acdef55c327b2ae6142e2b956bed356b6d5812abca20aef6d7019396874018738a07abc1b4593618b4c1dcfa468ab5ddad8f4e0e4130d2d0f4325608d41debd8ff2c5a3b2b4ce9ea0b22e1a8822c1ceb491729d8358afeb7089992f9051d5b3622575d05f63dee7f109e4b3ddf6cc75a713f7966f public exponent: 10001 ] 2021-05-03 10:37:10.866  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-03 10:37:10.867 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-03 10:37:10.868 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-05-03 10:37:10.869 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-03 10:37:10.870  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-05-03 10:37:10.870  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-03 10:37:10.871  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-03 10:37:10.871  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-03 10:37:10.872  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-03 10:37:10.876  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-03 10:37:10.876  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 10:37:10.877  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 10:37:10.878  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-03 10:37:10.972  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-03 10:37:10.973  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-03 10:37:10.973 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-03 10:37:10.975 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-03 10:37:10.975  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1991 2021-05-03 10:37:10.976  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-03 10:37:10.977  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-03 10:37:10.978  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-03 10:37:10.979  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-03 10:37:10.979  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-03 10:37:10.979 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 10:37:10.980 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 10:37:10.980 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 10:37:10.981 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 10:37:10.981 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 10:37:10.981 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 10:37:10.982 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-03 10:37:10.985 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 560992972719798587137074830452905009534580375655 IssuerDN: UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 03 09:24:11 UTC 2021 Final Date: Sat May 03 09:24:11 UTC 2031 SubjectDN: UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d8:87:e1:c0:04:33:54:68:cf:f3:02:d7:a5:50:f4:26:cb:98:cc:90] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62f7d742ecb7b51164401337570d7c1b7d6f7c0a 3468c3cb30a3260f3338039da20adaa28b7cc4e6 004e2756fe6329e1dd84c562401f773400e7eeb3 e33edd494ddefe75cd3c98070c00157b275c3ad3 65a4efc736e74b53347ff05330fde68bfe6ecdc1 5635b9b4c2e65e3f825f87638025e19a642f4d78 4af27153e905d95bfa1b2101164ba53a7f7bc0ab 32f5a63a55b58e21ee6641c71359da84976072f7 6e7442af75288c9e664c0cb9487323b6fd8e9886 83cd1e1fc3b032a062d58ba9a1d9332b06cbdfd3 a28ea7bbbaa68510516904cf29355cf3f15bc9ac ffc1c0d2b61f65202a9658a90bdef398fa5ee73b 5e8cab9f6c2ff6c4842574c405731d567fa4b238 a921e4226a82aa9a3925ec411250dfcc96ee72e1 222c8e2b224e7d734be284108f93d08787ef3aa9 ffa2fd27ff80d058cb5f8d057c44ed50593e54f4 ca84d1139addfc422352903710807367a00e0567 0817598d9d6a5d5027a7b3a382328f25b665e09a a6890026b342a0aa0bc7f761ff5be6dc0e74575e 47b13067 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [12:19:2e:2c:8a:a3:ca:24:4e:38:c2:89:17:7c:d7:86:33:58:1b:f4] modulus: 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 public exponent: 10001 ] 2021-05-03 10:38:55.147  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-03 10:38:55.148 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-03 10:38:55.149 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-05-03 10:38:55.149 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-03 10:38:55.150  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-05-03 10:38:55.150  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-03 10:38:55.150  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-03 10:38:55.151  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-03 10:38:55.151  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-03 10:38:55.155  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-03 10:38:55.156  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 10:38:55.156  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 10:38:55.157  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-03 10:38:55.285  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-03 10:38:55.286  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-03 10:38:55.286 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-03 10:38:55.287 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-03 10:38:55.287  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1991 2021-05-03 10:38:55.288  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-03 10:38:55.289  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-03 10:38:55.289  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-03 10:38:55.289  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-03 10:38:55.290  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-03 10:38:55.290 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 10:38:55.290 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 10:38:55.290 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 10:38:55.291 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 10:38:55.291 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 10:38:55.291 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 10:38:55.292 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-03 10:38:55.294 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 560992972719798587137074830452905009534580375655 IssuerDN: UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 03 09:24:11 UTC 2021 Final Date: Sat May 03 09:24:11 UTC 2031 SubjectDN: UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d8:87:e1:c0:04:33:54:68:cf:f3:02:d7:a5:50:f4:26:cb:98:cc:90] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62f7d742ecb7b51164401337570d7c1b7d6f7c0a 3468c3cb30a3260f3338039da20adaa28b7cc4e6 004e2756fe6329e1dd84c562401f773400e7eeb3 e33edd494ddefe75cd3c98070c00157b275c3ad3 65a4efc736e74b53347ff05330fde68bfe6ecdc1 5635b9b4c2e65e3f825f87638025e19a642f4d78 4af27153e905d95bfa1b2101164ba53a7f7bc0ab 32f5a63a55b58e21ee6641c71359da84976072f7 6e7442af75288c9e664c0cb9487323b6fd8e9886 83cd1e1fc3b032a062d58ba9a1d9332b06cbdfd3 a28ea7bbbaa68510516904cf29355cf3f15bc9ac ffc1c0d2b61f65202a9658a90bdef398fa5ee73b 5e8cab9f6c2ff6c4842574c405731d567fa4b238 a921e4226a82aa9a3925ec411250dfcc96ee72e1 222c8e2b224e7d734be284108f93d08787ef3aa9 ffa2fd27ff80d058cb5f8d057c44ed50593e54f4 ca84d1139addfc422352903710807367a00e0567 0817598d9d6a5d5027a7b3a382328f25b665e09a a6890026b342a0aa0bc7f761ff5be6dc0e74575e 47b13067 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f2:aa:fd:2d:b0:05:34:1e:d3:50:e7:4b:23:59:30:b8:89:e7:ad:22] modulus: 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 public exponent: 10001 ] 2021-05-03 10:41:31.256  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-03 10:41:31.257 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-03 10:41:31.259 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-03 10:41:31.260 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-03 10:41:31.260  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-03 10:41:31.260  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-03 10:41:31.261  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-03 10:41:31.261  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-03 10:41:31.261  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-03 10:41:31.265  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-03 10:41:31.265  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 10:41:31.266  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 10:41:31.267  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-03 10:41:31.346  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-03 10:41:31.346  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-03 10:41:31.346 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-03 10:41:31.348 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-03 10:41:31.348  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1991 2021-05-03 10:41:31.348  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-03 10:41:31.350  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-03 10:41:31.350  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-03 10:41:31.350  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-03 10:41:31.351  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-03 10:41:31.351 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 10:41:31.351 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 10:41:31.351 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 10:41:31.352 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 10:41:31.352 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 10:41:31.352 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 10:41:31.353 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-03 10:41:31.355 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 560992972719798587137074830452905009534580375655 IssuerDN: UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 03 09:24:11 UTC 2021 Final Date: Sat May 03 09:24:11 UTC 2031 SubjectDN: UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d8:87:e1:c0:04:33:54:68:cf:f3:02:d7:a5:50:f4:26:cb:98:cc:90] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62f7d742ecb7b51164401337570d7c1b7d6f7c0a 3468c3cb30a3260f3338039da20adaa28b7cc4e6 004e2756fe6329e1dd84c562401f773400e7eeb3 e33edd494ddefe75cd3c98070c00157b275c3ad3 65a4efc736e74b53347ff05330fde68bfe6ecdc1 5635b9b4c2e65e3f825f87638025e19a642f4d78 4af27153e905d95bfa1b2101164ba53a7f7bc0ab 32f5a63a55b58e21ee6641c71359da84976072f7 6e7442af75288c9e664c0cb9487323b6fd8e9886 83cd1e1fc3b032a062d58ba9a1d9332b06cbdfd3 a28ea7bbbaa68510516904cf29355cf3f15bc9ac ffc1c0d2b61f65202a9658a90bdef398fa5ee73b 5e8cab9f6c2ff6c4842574c405731d567fa4b238 a921e4226a82aa9a3925ec411250dfcc96ee72e1 222c8e2b224e7d734be284108f93d08787ef3aa9 ffa2fd27ff80d058cb5f8d057c44ed50593e54f4 ca84d1139addfc422352903710807367a00e0567 0817598d9d6a5d5027a7b3a382328f25b665e09a a6890026b342a0aa0bc7f761ff5be6dc0e74575e 47b13067 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [20:aa:f3:75:09:28:9d:f8:d8:10:66:93:38:9f:ba:70:1c:5f:bb:d1] modulus: 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 public exponent: 10001 ] 2021-05-03 10:44:56.868  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-03 10:44:56.871 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-03 10:44:56.873 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-03 10:44:56.873 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-03 10:44:56.873  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-03 10:44:56.874  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-03 10:44:56.874  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-03 10:44:56.874  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-03 10:44:56.875  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-03 10:44:56.879  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-03 10:44:56.879  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 10:44:56.879  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 10:44:56.881  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-03 10:44:56.994  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-03 10:44:56.994  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-03 10:44:56.995 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-03 10:44:56.996 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-03 10:44:56.996  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1991 2021-05-03 10:44:56.997  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-03 10:44:56.998  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-03 10:44:56.998  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-03 10:44:56.998  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-03 10:44:56.999  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-03 10:44:56.999 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 10:44:56.999 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 10:44:56.999 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 10:44:57.000 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 10:44:57.000 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 10:44:57.000 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 10:44:57.001 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-03 10:44:57.003 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 560992972719798587137074830452905009534580375655 IssuerDN: UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 03 09:24:11 UTC 2021 Final Date: Sat May 03 09:24:11 UTC 2031 SubjectDN: UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d8:87:e1:c0:04:33:54:68:cf:f3:02:d7:a5:50:f4:26:cb:98:cc:90] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62f7d742ecb7b51164401337570d7c1b7d6f7c0a 3468c3cb30a3260f3338039da20adaa28b7cc4e6 004e2756fe6329e1dd84c562401f773400e7eeb3 e33edd494ddefe75cd3c98070c00157b275c3ad3 65a4efc736e74b53347ff05330fde68bfe6ecdc1 5635b9b4c2e65e3f825f87638025e19a642f4d78 4af27153e905d95bfa1b2101164ba53a7f7bc0ab 32f5a63a55b58e21ee6641c71359da84976072f7 6e7442af75288c9e664c0cb9487323b6fd8e9886 83cd1e1fc3b032a062d58ba9a1d9332b06cbdfd3 a28ea7bbbaa68510516904cf29355cf3f15bc9ac ffc1c0d2b61f65202a9658a90bdef398fa5ee73b 5e8cab9f6c2ff6c4842574c405731d567fa4b238 a921e4226a82aa9a3925ec411250dfcc96ee72e1 222c8e2b224e7d734be284108f93d08787ef3aa9 ffa2fd27ff80d058cb5f8d057c44ed50593e54f4 ca84d1139addfc422352903710807367a00e0567 0817598d9d6a5d5027a7b3a382328f25b665e09a a6890026b342a0aa0bc7f761ff5be6dc0e74575e 47b13067 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [87:6a:15:c8:79:4b:70:a2:b3:d3:4f:52:99:16:50:cc:fe:a9:06:6b] modulus: 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 public exponent: 10001 ] 2021-05-03 10:46:59.654  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-03 10:46:59.655 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-03 10:46:59.656 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-03 10:46:59.656 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-03 10:46:59.656  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-03 10:46:59.657  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-03 10:46:59.657  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-03 10:46:59.657  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-03 10:46:59.658  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-03 10:46:59.661  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-03 10:46:59.662  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 10:46:59.662  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 10:46:59.663  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-03 10:46:59.741  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-03 10:46:59.742  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-03 10:46:59.742 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-03 10:46:59.743 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-03 10:46:59.744  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1991 2021-05-03 10:46:59.744  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-03 10:46:59.745  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-03 10:46:59.746  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-03 10:46:59.746  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-03 10:46:59.746  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-03 10:46:59.747 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 10:46:59.747 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 10:46:59.747 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 10:46:59.748 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 10:46:59.748 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 10:46:59.749 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 10:46:59.750 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-03 10:46:59.753 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 560992972719798587137074830452905009534580375655 IssuerDN: UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 03 09:24:11 UTC 2021 Final Date: Sat May 03 09:24:11 UTC 2031 SubjectDN: UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d8:87:e1:c0:04:33:54:68:cf:f3:02:d7:a5:50:f4:26:cb:98:cc:90] modulus: cc0512660be94d261975bfb16cb40f42ea6044e652e7910c9af26cd95b9f08e27bf6c5138b8843bd09353bd66a1082c107c8cf236d84cb99d490a8326b976d384e0b22266c1353428389aa511270fd8d26fc46ef4ab6d8b7cd6f642f93eaf95446bcd0e3eda5d0e78d4ac8cea1a780cfd1e7c5a7d653f1358fedaa912bba807da64ef6111eaac2fca623c6b63039500e672b640f991fe69f47d7a4de34dffaecb4810a363bf78b7d78d618c7bfc67c46bd4aaf955586348ebff55cab6b7c1b474c15a10f011b75389dbd98148b37c1e223e894a553c4b199f859708d23a4c0c38b1099d7738450c015656336f0982d50ac263012accd0018b7b13907a01f2c224bd6df85b435bead2ce00c64a267d9eb8929d1bab35e6060cd5177b6a3048a96d9873505d0d966369082c034fddafcb98611f922c2c58eef9a123f84394abb6c2554bf03f53ebc43ee3e58a152b0c8b0ef390ca85bc6b35337f207310813a51d4151f41a5204f30a866212b648725a304f68c3dab3e5b64905b38c1a516fa1c9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62f7d742ecb7b51164401337570d7c1b7d6f7c0a 3468c3cb30a3260f3338039da20adaa28b7cc4e6 004e2756fe6329e1dd84c562401f773400e7eeb3 e33edd494ddefe75cd3c98070c00157b275c3ad3 65a4efc736e74b53347ff05330fde68bfe6ecdc1 5635b9b4c2e65e3f825f87638025e19a642f4d78 4af27153e905d95bfa1b2101164ba53a7f7bc0ab 32f5a63a55b58e21ee6641c71359da84976072f7 6e7442af75288c9e664c0cb9487323b6fd8e9886 83cd1e1fc3b032a062d58ba9a1d9332b06cbdfd3 a28ea7bbbaa68510516904cf29355cf3f15bc9ac ffc1c0d2b61f65202a9658a90bdef398fa5ee73b 5e8cab9f6c2ff6c4842574c405731d567fa4b238 a921e4226a82aa9a3925ec411250dfcc96ee72e1 222c8e2b224e7d734be284108f93d08787ef3aa9 ffa2fd27ff80d058cb5f8d057c44ed50593e54f4 ca84d1139addfc422352903710807367a00e0567 0817598d9d6a5d5027a7b3a382328f25b665e09a a6890026b342a0aa0bc7f761ff5be6dc0e74575e 47b13067 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b5:3c:0d:20:bf:7b:26:2e:bb:30:69:e4:89:94:4d:2c:b4:5e:6c:00] modulus: ef3d0f564ae0ab084cb367d275840466c0ee8557e2354b119accf6f02192a67f6a79fff8b7152c5329a12c3cb319d35185dd831fa30b782c1f8010592ca2dbeb693661af35979490b753656f9206b395cf70f7f88274319c5f6555c66437c5d9ef4ac0a51a7b32fc3866edab7bce9ccd955a7446ffa3e8d3d94f98020f6790d24a7882cc7343b75519b44c7e902223f26bfdbaaf00ab2d9b5603adbe09fb27aa3bbe3c06777b395583e65ec087c753c87b96ec0bc0e7e913d952295b0491dd01639e1fcdcc38f5554c01d37ead5a6a8b1093d724bb461ee45cd2c279aa097c0293aa5bedf9e4b937a62ae8dc8f94b3787359755a659a2c72103d4cacb9f6e18f public exponent: 10001 ] 2021-05-03 10:48:40.917  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-03 10:48:40.918 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-03 10:48:40.919 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-03 10:48:40.920 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-03 10:48:40.920  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-03 10:48:40.920  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-03 10:48:40.921  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-03 10:48:40.921  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-03 10:48:40.921  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-03 10:48:40.925  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-03 10:48:40.926  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 10:48:40.926  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 10:48:40.927  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-03 10:48:41.031  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-03 10:48:41.032  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-03 10:48:41.032 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-03 10:48:41.034 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-03 10:48:41.034  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1991 2021-05-03 10:48:41.034  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-03 10:48:41.036  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-03 10:48:41.036  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-03 10:48:41.036  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-03 10:48:41.036  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-03 10:48:41.037 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 10:48:41.037 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 10:48:41.037 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 10:48:41.038 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 10:48:41.038 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 10:48:41.038 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 10:48:41.039 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-03 10:48:41.041 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 560992972719798587137074830452905009534580375655 IssuerDN: UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 03 09:24:11 UTC 2021 Final Date: Sat May 03 09:24:11 UTC 2031 SubjectDN: UID=c-0d576fb06f5ac8a38,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d8:87:e1:c0:04:33:54:68:cf:f3:02:d7:a5:50:f4:26:cb:98:cc:90] modulus: cc0512660be94d261975bfb16cb40f42ea6044e652e7910c9af26cd95b9f08e27bf6c5138b8843bd09353bd66a1082c107c8cf236d84cb99d490a8326b976d384e0b22266c1353428389aa511270fd8d26fc46ef4ab6d8b7cd6f642f93eaf95446bcd0e3eda5d0e78d4ac8cea1a780cfd1e7c5a7d653f1358fedaa912bba807da64ef6111eaac2fca623c6b63039500e672b640f991fe69f47d7a4de34dffaecb4810a363bf78b7d78d618c7bfc67c46bd4aaf955586348ebff55cab6b7c1b474c15a10f011b75389dbd98148b37c1e223e894a553c4b199f859708d23a4c0c38b1099d7738450c015656336f0982d50ac263012accd0018b7b13907a01f2c224bd6df85b435bead2ce00c64a267d9eb8929d1bab35e6060cd5177b6a3048a96d9873505d0d966369082c034fddafcb98611f922c2c58eef9a123f84394abb6c2554bf03f53ebc43ee3e58a152b0c8b0ef390ca85bc6b35337f207310813a51d4151f41a5204f30a866212b648725a304f68c3dab3e5b64905b38c1a516fa1c9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62f7d742ecb7b51164401337570d7c1b7d6f7c0a 3468c3cb30a3260f3338039da20adaa28b7cc4e6 004e2756fe6329e1dd84c562401f773400e7eeb3 e33edd494ddefe75cd3c98070c00157b275c3ad3 65a4efc736e74b53347ff05330fde68bfe6ecdc1 5635b9b4c2e65e3f825f87638025e19a642f4d78 4af27153e905d95bfa1b2101164ba53a7f7bc0ab 32f5a63a55b58e21ee6641c71359da84976072f7 6e7442af75288c9e664c0cb9487323b6fd8e9886 83cd1e1fc3b032a062d58ba9a1d9332b06cbdfd3 a28ea7bbbaa68510516904cf29355cf3f15bc9ac ffc1c0d2b61f65202a9658a90bdef398fa5ee73b 5e8cab9f6c2ff6c4842574c405731d567fa4b238 a921e4226a82aa9a3925ec411250dfcc96ee72e1 222c8e2b224e7d734be284108f93d08787ef3aa9 ffa2fd27ff80d058cb5f8d057c44ed50593e54f4 ca84d1139addfc422352903710807367a00e0567 0817598d9d6a5d5027a7b3a382328f25b665e09a a6890026b342a0aa0bc7f761ff5be6dc0e74575e 47b13067 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0a:05:52:67:a0:81:77:73:83:45:9e:bd:4c:d0:a9:16:32:e5:f4:0a] modulus: 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 public exponent: 10001 ]