Results

By type

          2021-05-07 09:31:47,118 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-05-07 09:31:50,729 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-05-07 09:31:53.542  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-05-07 09:32:05.424 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-05-07 09:32:06.339  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-05-07 09:32:07.137  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-05-07 09:32:21.541  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 36.604 seconds (JVM running for 43.45)
2021-05-07 09:49:09.021  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-07 09:49:09.029 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-07 09:49:09.233 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-07 09:49:09.239 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-07 09:49:09.332  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-07 09:49:09.422  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-07 09:49:09.431  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-07 09:49:09.431  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 09:49:09.431  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-07 09:49:09.438  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-07 09:49:09.440  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-07 09:49:09.630  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-07 09:49:09.635  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 09:49:09.636  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 09:49:09.737  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-07 09:49:11.349  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-07 09:49:11.351  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-07 09:49:11.352 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-07 09:49:11.356 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-07 09:49:11.357  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1712
2021-05-07 09:49:11.358  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-07 09:49:11.418  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-07 09:49:11.419  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-07 09:49:11.428  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-07 09:49:11.429  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-07 09:49:11.430 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 09:49:11.430 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 09:49:11.430 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 09:49:11.532 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 09:49:11.533 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 09:49:11.533 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 09:49:11.539 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-07 09:49:11.644 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 81769266075747773631054545408584384966760647059
             IssuerDN: UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 07 09:28:48 UTC 2021
           Final Date: Wed May 07 09:28:48 UTC 2031
            SubjectDN: UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [70:88:30:85:68:a3:6c:cf:fb:67:d1:79:8e:02:b2:45:ce:f3:52:3f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 632606202d607e500698c3088716e3218c8911cb
                       a1b2d529939b61e5b244b9c4b49fb9741239a02c
                       6d131dc890ca19abb2ece498310e9a3aa890c43b
                       bddb97102085c110e111cba3ada6ee20df508f81
                       1991db346afcc8bad3b8e1f714e1436c1e53804d
                       f8cf684fa649a3998271cd6a7b3ac1fa0ca8e150
                       22e125c20160bfa0009094694abc6c9fdbca93aa
                       61a009d630f2b9a8bcd234bddd3742bc389b7073
                       a90ecee942f3d7997310f72ec41f3ccde65a4b2f
                       d2e3923d1e650c655b276fcc624947ca9266dd5a
                       fb20e8ef92da62c0358ed52dd8aa2b92b1c25185
                       534fc7852387a93561daaac3eeb30334b58f9c09
                       742697676ccbd8367d867b3eacab46a3d3de98a1
                       0c596a2faf1a9a55feb29775fe5467fff06de83b
                       f695b69f6320782f74ec9981e4d29abb33e39cac
                       541f52f0e69bd3f78dd1e6728d917edc48d0e4a8
                       1d523dbfbeb26d25d450046005db2a5c6cb51b29
                       3fbcad341c88e5edafc1b26270215660e3791c92
                       2665172020d62758c8bb76c5eaa07c759932acef
                       d0a498fe
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [36:3c:1a:1f:15:50:3b:c6:79:d1:42:e9:3a:68:33:71:4b:1e:fd:95]
            modulus: 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
    public exponent: 10001

] 
2021-05-07 10:44:50.331  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-07 10:44:50.333 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-07 10:44:50.335 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-07 10:44:50.337 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-07 10:44:50.338  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-07 10:44:50.338  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-07 10:44:50.339  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-07 10:44:50.340  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-07 10:44:50.417  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-07 10:44:50.425  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-07 10:44:50.427  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 10:44:50.428  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 10:44:50.432  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-07 10:44:50.719  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-07 10:44:50.720  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-07 10:44:50.721 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-07 10:44:50.726 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-07 10:44:50.728  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1712
2021-05-07 10:44:50.728  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-07 10:44:50.733  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-07 10:44:50.734  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-07 10:44:50.734  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-07 10:44:50.734  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-07 10:44:50.735 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 10:44:50.735 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 10:44:50.735 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 10:44:50.736 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 10:44:50.737 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 10:44:50.737 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 10:44:50.817 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-07 10:44:50.824 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 81769266075747773631054545408584384966760647059
             IssuerDN: UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 07 09:28:48 UTC 2021
           Final Date: Wed May 07 09:28:48 UTC 2031
            SubjectDN: UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [70:88:30:85:68:a3:6c:cf:fb:67:d1:79:8e:02:b2:45:ce:f3:52:3f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 632606202d607e500698c3088716e3218c8911cb
                       a1b2d529939b61e5b244b9c4b49fb9741239a02c
                       6d131dc890ca19abb2ece498310e9a3aa890c43b
                       bddb97102085c110e111cba3ada6ee20df508f81
                       1991db346afcc8bad3b8e1f714e1436c1e53804d
                       f8cf684fa649a3998271cd6a7b3ac1fa0ca8e150
                       22e125c20160bfa0009094694abc6c9fdbca93aa
                       61a009d630f2b9a8bcd234bddd3742bc389b7073
                       a90ecee942f3d7997310f72ec41f3ccde65a4b2f
                       d2e3923d1e650c655b276fcc624947ca9266dd5a
                       fb20e8ef92da62c0358ed52dd8aa2b92b1c25185
                       534fc7852387a93561daaac3eeb30334b58f9c09
                       742697676ccbd8367d867b3eacab46a3d3de98a1
                       0c596a2faf1a9a55feb29775fe5467fff06de83b
                       f695b69f6320782f74ec9981e4d29abb33e39cac
                       541f52f0e69bd3f78dd1e6728d917edc48d0e4a8
                       1d523dbfbeb26d25d450046005db2a5c6cb51b29
                       3fbcad341c88e5edafc1b26270215660e3791c92
                       2665172020d62758c8bb76c5eaa07c759932acef
                       d0a498fe
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ba:2d:ce:64:2c:13:fe:39:b1:6e:53:c6:2e:95:59:65:7b:cf:df:c4]
            modulus: 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
    public exponent: 10001

] 
2021-05-07 10:46:15.329  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-07 10:46:15.330 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-07 10:46:15.331 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-07 10:46:15.332 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-07 10:46:15.332  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-07 10:46:15.333  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-07 10:46:15.333  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-07 10:46:15.334  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-07 10:46:15.334  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-07 10:46:15.426  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-07 10:46:15.427  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 10:46:15.428  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 10:46:15.430  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-07 10:46:15.524  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-07 10:46:15.525  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-07 10:46:15.526 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-07 10:46:15.530 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-07 10:46:15.531  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1712
2021-05-07 10:46:15.532  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-07 10:46:15.534  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-07 10:46:15.535  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-07 10:46:15.536  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-07 10:46:15.536  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-07 10:46:15.617 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 10:46:15.619 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 10:46:15.619 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 10:46:15.620 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 10:46:15.620 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 10:46:15.621 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 10:46:15.622 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-07 10:46:15.625 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 81769266075747773631054545408584384966760647059
             IssuerDN: UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 07 09:28:48 UTC 2021
           Final Date: Wed May 07 09:28:48 UTC 2031
            SubjectDN: UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [70:88:30:85:68:a3:6c:cf:fb:67:d1:79:8e:02:b2:45:ce:f3:52:3f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 632606202d607e500698c3088716e3218c8911cb
                       a1b2d529939b61e5b244b9c4b49fb9741239a02c
                       6d131dc890ca19abb2ece498310e9a3aa890c43b
                       bddb97102085c110e111cba3ada6ee20df508f81
                       1991db346afcc8bad3b8e1f714e1436c1e53804d
                       f8cf684fa649a3998271cd6a7b3ac1fa0ca8e150
                       22e125c20160bfa0009094694abc6c9fdbca93aa
                       61a009d630f2b9a8bcd234bddd3742bc389b7073
                       a90ecee942f3d7997310f72ec41f3ccde65a4b2f
                       d2e3923d1e650c655b276fcc624947ca9266dd5a
                       fb20e8ef92da62c0358ed52dd8aa2b92b1c25185
                       534fc7852387a93561daaac3eeb30334b58f9c09
                       742697676ccbd8367d867b3eacab46a3d3de98a1
                       0c596a2faf1a9a55feb29775fe5467fff06de83b
                       f695b69f6320782f74ec9981e4d29abb33e39cac
                       541f52f0e69bd3f78dd1e6728d917edc48d0e4a8
                       1d523dbfbeb26d25d450046005db2a5c6cb51b29
                       3fbcad341c88e5edafc1b26270215660e3791c92
                       2665172020d62758c8bb76c5eaa07c759932acef
                       d0a498fe
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fd:ed:69:05:e6:8a:02:71:bf:e9:59:3f:b9:55:a9:36:e2:fe:9f:cf]
            modulus: 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
    public exponent: 10001

] 
2021-05-07 10:49:32.076  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-07 10:49:32.078 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-07 10:49:32.081 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-07 10:49:32.081 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-07 10:49:32.082  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-07 10:49:32.082  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-07 10:49:32.082  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-07 10:49:32.083  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-07 10:49:32.083  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-07 10:49:32.089  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-07 10:49:32.090  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 10:49:32.090  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 10:49:32.093  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-07 10:49:32.218  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-07 10:49:32.219  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-07 10:49:32.220 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-07 10:49:32.223 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-07 10:49:32.224  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1712
2021-05-07 10:49:32.225  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-07 10:49:32.228  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-07 10:49:32.229  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-07 10:49:32.230  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-07 10:49:32.230  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-07 10:49:32.231 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 10:49:32.231 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 10:49:32.231 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 10:49:32.231 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 10:49:32.232 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 10:49:32.232 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 10:49:32.233 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-07 10:49:32.321 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 81769266075747773631054545408584384966760647059
             IssuerDN: UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 07 09:28:48 UTC 2021
           Final Date: Wed May 07 09:28:48 UTC 2031
            SubjectDN: UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [70:88:30:85:68:a3:6c:cf:fb:67:d1:79:8e:02:b2:45:ce:f3:52:3f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 632606202d607e500698c3088716e3218c8911cb
                       a1b2d529939b61e5b244b9c4b49fb9741239a02c
                       6d131dc890ca19abb2ece498310e9a3aa890c43b
                       bddb97102085c110e111cba3ada6ee20df508f81
                       1991db346afcc8bad3b8e1f714e1436c1e53804d
                       f8cf684fa649a3998271cd6a7b3ac1fa0ca8e150
                       22e125c20160bfa0009094694abc6c9fdbca93aa
                       61a009d630f2b9a8bcd234bddd3742bc389b7073
                       a90ecee942f3d7997310f72ec41f3ccde65a4b2f
                       d2e3923d1e650c655b276fcc624947ca9266dd5a
                       fb20e8ef92da62c0358ed52dd8aa2b92b1c25185
                       534fc7852387a93561daaac3eeb30334b58f9c09
                       742697676ccbd8367d867b3eacab46a3d3de98a1
                       0c596a2faf1a9a55feb29775fe5467fff06de83b
                       f695b69f6320782f74ec9981e4d29abb33e39cac
                       541f52f0e69bd3f78dd1e6728d917edc48d0e4a8
                       1d523dbfbeb26d25d450046005db2a5c6cb51b29
                       3fbcad341c88e5edafc1b26270215660e3791c92
                       2665172020d62758c8bb76c5eaa07c759932acef
                       d0a498fe
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b7:b5:9a:33:24:4e:b4:fc:ed:c7:68:61:00:8c:a7:02:66:1e:87:18]
            modulus: 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
    public exponent: 10001

] 
2021-05-07 10:49:48.835  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-07 10:49:48.836 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-07 10:49:48.837 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-07 10:49:48.838 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-07 10:49:48.838  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-07 10:49:48.839  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-07 10:49:48.839  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-07 10:49:48.839  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-07 10:49:48.839  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-07 10:49:48.844  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-07 10:49:48.844  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 10:49:48.844  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 10:49:48.919  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-07 10:49:49.017  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-07 10:49:49.018  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-07 10:49:49.018 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-07 10:49:49.020 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-07 10:49:49.021  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1712
2021-05-07 10:49:49.022  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-07 10:49:49.024  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-07 10:49:49.025  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-07 10:49:49.026  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-07 10:49:49.026  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-07 10:49:49.027 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 10:49:49.027 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 10:49:49.028 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 10:49:49.029 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 10:49:49.029 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 10:49:49.029 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 10:49:49.030 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-07 10:49:49.032 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 81769266075747773631054545408584384966760647059
             IssuerDN: UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 07 09:28:48 UTC 2021
           Final Date: Wed May 07 09:28:48 UTC 2031
            SubjectDN: UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [70:88:30:85:68:a3:6c:cf:fb:67:d1:79:8e:02:b2:45:ce:f3:52:3f]
            modulus: a5b7d62f1ab2b667407bc854966c708668bb443291d4bf222b27d01db88837fcc2d453e5b136456b1a3e16a0ab7c6e11a2eb55a63ea22d572b435a30723278562bb52e7af39e3690e4379d1b5a9831adda48b6e7ee32512656e0306c0c1e97655f85626b82e1937ffdfd8c2109b9ec74653bce7925c305eec4e109c1951420c24d9dee32cc70d11922852968fdbab7f6ccf11a86c01ba07eaa560ea2d7dac4d0d8e02b6371bd9574ef383a5c21a90a3f038e3278eb65db0fd5a783b6279f52726e83668a515f79689e3b3bb711774fbc4ece07b39802122c2cfc5d93ee51eda112b09ada336eecb33e542522bb54478526ba7073eca8bb56d5790b200eb2272badc0c662734764fecbf55f0675028065700f7482218986b4c145100261866208805909b2fea5c06c520ed5aed856f41f19819814fb2acd37245e4bb2dfbfcdd8c2ab282e25fb40f0f59f00a5a7738c505ca6431203d2e29dd4b672ab24a1e18c6900d4638ec6a605b3c145df66a5718f38ac2fe68e6ecaa8123f16757e9408d5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 632606202d607e500698c3088716e3218c8911cb
                       a1b2d529939b61e5b244b9c4b49fb9741239a02c
                       6d131dc890ca19abb2ece498310e9a3aa890c43b
                       bddb97102085c110e111cba3ada6ee20df508f81
                       1991db346afcc8bad3b8e1f714e1436c1e53804d
                       f8cf684fa649a3998271cd6a7b3ac1fa0ca8e150
                       22e125c20160bfa0009094694abc6c9fdbca93aa
                       61a009d630f2b9a8bcd234bddd3742bc389b7073
                       a90ecee942f3d7997310f72ec41f3ccde65a4b2f
                       d2e3923d1e650c655b276fcc624947ca9266dd5a
                       fb20e8ef92da62c0358ed52dd8aa2b92b1c25185
                       534fc7852387a93561daaac3eeb30334b58f9c09
                       742697676ccbd8367d867b3eacab46a3d3de98a1
                       0c596a2faf1a9a55feb29775fe5467fff06de83b
                       f695b69f6320782f74ec9981e4d29abb33e39cac
                       541f52f0e69bd3f78dd1e6728d917edc48d0e4a8
                       1d523dbfbeb26d25d450046005db2a5c6cb51b29
                       3fbcad341c88e5edafc1b26270215660e3791c92
                       2665172020d62758c8bb76c5eaa07c759932acef
                       d0a498fe
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [37:33:1a:ad:97:2e:5f:c0:f6:5f:f8:f5:69:52:66:f8:c6:e5:00:b6]
            modulus: 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
    public exponent: 10001

] 
2021-05-07 10:50:52.016  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-07 10:50:52.018 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-07 10:50:52.020 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-07 10:50:52.020 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-07 10:50:52.021  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-07 10:50:52.022  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-07 10:50:52.022  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-07 10:50:52.022  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-07 10:50:52.022  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-07 10:50:52.027  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-07 10:50:52.027  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 10:50:52.027  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 10:50:52.028  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-07 10:50:52.215  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-07 10:50:52.216  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-07 10:50:52.216 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-07 10:50:52.218 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-07 10:50:52.219  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1712
2021-05-07 10:50:52.219  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-07 10:50:52.221  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-07 10:50:52.222  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-07 10:50:52.222  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-07 10:50:52.223  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-07 10:50:52.223 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 10:50:52.223 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 10:50:52.224 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 10:50:52.224 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 10:50:52.224 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 10:50:52.225 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 10:50:52.225 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-07 10:50:52.227 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 81769266075747773631054545408584384966760647059
             IssuerDN: UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 07 09:28:48 UTC 2021
           Final Date: Wed May 07 09:28:48 UTC 2031
            SubjectDN: UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [70:88:30:85:68:a3:6c:cf:fb:67:d1:79:8e:02:b2:45:ce:f3:52:3f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 632606202d607e500698c3088716e3218c8911cb
                       a1b2d529939b61e5b244b9c4b49fb9741239a02c
                       6d131dc890ca19abb2ece498310e9a3aa890c43b
                       bddb97102085c110e111cba3ada6ee20df508f81
                       1991db346afcc8bad3b8e1f714e1436c1e53804d
                       f8cf684fa649a3998271cd6a7b3ac1fa0ca8e150
                       22e125c20160bfa0009094694abc6c9fdbca93aa
                       61a009d630f2b9a8bcd234bddd3742bc389b7073
                       a90ecee942f3d7997310f72ec41f3ccde65a4b2f
                       d2e3923d1e650c655b276fcc624947ca9266dd5a
                       fb20e8ef92da62c0358ed52dd8aa2b92b1c25185
                       534fc7852387a93561daaac3eeb30334b58f9c09
                       742697676ccbd8367d867b3eacab46a3d3de98a1
                       0c596a2faf1a9a55feb29775fe5467fff06de83b
                       f695b69f6320782f74ec9981e4d29abb33e39cac
                       541f52f0e69bd3f78dd1e6728d917edc48d0e4a8
                       1d523dbfbeb26d25d450046005db2a5c6cb51b29
                       3fbcad341c88e5edafc1b26270215660e3791c92
                       2665172020d62758c8bb76c5eaa07c759932acef
                       d0a498fe
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a9:d0:8f:2b:36:fb:ff:54:b2:14:f2:5a:f0:a0:f9:37:30:9e:c6:fc]
            modulus: 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
    public exponent: 10001

] 
2021-05-07 10:50:58.088  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-07 10:50:58.089 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-07 10:50:58.090 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-07 10:50:58.091 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-07 10:50:58.091  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-07 10:50:58.092  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-07 10:50:58.092  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-07 10:50:58.092  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-07 10:50:58.093  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-07 10:50:58.097  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-07 10:50:58.097  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 10:50:58.098  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 10:50:58.099  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-07 10:50:58.185  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-07 10:50:58.217  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-07 10:50:58.218 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-07 10:50:58.219 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-07 10:50:58.219  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1712
2021-05-07 10:50:58.220  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-07 10:50:58.221  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-07 10:50:58.221  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-07 10:50:58.222  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-07 10:50:58.222  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-07 10:50:58.222 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 10:50:58.223 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 10:50:58.223 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 10:50:58.224 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 10:50:58.224 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 10:50:58.224 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 10:50:58.225 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-07 10:50:58.227 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 81769266075747773631054545408584384966760647059
             IssuerDN: UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 07 09:28:48 UTC 2021
           Final Date: Wed May 07 09:28:48 UTC 2031
            SubjectDN: UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [70:88:30:85:68:a3:6c:cf:fb:67:d1:79:8e:02:b2:45:ce:f3:52:3f]
            modulus: a5b7d62f1ab2b667407bc854966c708668bb443291d4bf222b27d01db88837fcc2d453e5b136456b1a3e16a0ab7c6e11a2eb55a63ea22d572b435a30723278562bb52e7af39e3690e4379d1b5a9831adda48b6e7ee32512656e0306c0c1e97655f85626b82e1937ffdfd8c2109b9ec74653bce7925c305eec4e109c1951420c24d9dee32cc70d11922852968fdbab7f6ccf11a86c01ba07eaa560ea2d7dac4d0d8e02b6371bd9574ef383a5c21a90a3f038e3278eb65db0fd5a783b6279f52726e83668a515f79689e3b3bb711774fbc4ece07b39802122c2cfc5d93ee51eda112b09ada336eecb33e542522bb54478526ba7073eca8bb56d5790b200eb2272badc0c662734764fecbf55f0675028065700f7482218986b4c145100261866208805909b2fea5c06c520ed5aed856f41f19819814fb2acd37245e4bb2dfbfcdd8c2ab282e25fb40f0f59f00a5a7738c505ca6431203d2e29dd4b672ab24a1e18c6900d4638ec6a605b3c145df66a5718f38ac2fe68e6ecaa8123f16757e9408d5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 632606202d607e500698c3088716e3218c8911cb
                       a1b2d529939b61e5b244b9c4b49fb9741239a02c
                       6d131dc890ca19abb2ece498310e9a3aa890c43b
                       bddb97102085c110e111cba3ada6ee20df508f81
                       1991db346afcc8bad3b8e1f714e1436c1e53804d
                       f8cf684fa649a3998271cd6a7b3ac1fa0ca8e150
                       22e125c20160bfa0009094694abc6c9fdbca93aa
                       61a009d630f2b9a8bcd234bddd3742bc389b7073
                       a90ecee942f3d7997310f72ec41f3ccde65a4b2f
                       d2e3923d1e650c655b276fcc624947ca9266dd5a
                       fb20e8ef92da62c0358ed52dd8aa2b92b1c25185
                       534fc7852387a93561daaac3eeb30334b58f9c09
                       742697676ccbd8367d867b3eacab46a3d3de98a1
                       0c596a2faf1a9a55feb29775fe5467fff06de83b
                       f695b69f6320782f74ec9981e4d29abb33e39cac
                       541f52f0e69bd3f78dd1e6728d917edc48d0e4a8
                       1d523dbfbeb26d25d450046005db2a5c6cb51b29
                       3fbcad341c88e5edafc1b26270215660e3791c92
                       2665172020d62758c8bb76c5eaa07c759932acef
                       d0a498fe
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f6:e6:52:d8:28:a0:dd:3c:a5:85:e5:5f:93:76:1a:e8:40:ca:54:45]
            modulus: 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
    public exponent: 10001

] 
2021-05-07 10:51:21.396  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-07 10:51:21.398 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-07 10:51:21.399 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-07 10:51:21.400 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-07 10:51:21.400  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-07 10:51:21.400  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-07 10:51:21.401  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-07 10:51:21.401  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-07 10:51:21.401  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-07 10:51:21.406  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-07 10:51:21.406  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 10:51:21.406  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 10:51:21.407  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-07 10:51:21.502  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-07 10:51:21.503  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-07 10:51:21.503 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-07 10:51:21.504 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-07 10:51:21.505  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1712
2021-05-07 10:51:21.505  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-07 10:51:21.507  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-07 10:51:21.508  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-07 10:51:21.508  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-07 10:51:21.508  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-07 10:51:21.509 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 10:51:21.509 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 10:51:21.509 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 10:51:21.510 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 10:51:21.510 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 10:51:21.510 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 10:51:21.511 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-07 10:51:21.513 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 81769266075747773631054545408584384966760647059
             IssuerDN: UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 07 09:28:48 UTC 2021
           Final Date: Wed May 07 09:28:48 UTC 2031
            SubjectDN: UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [70:88:30:85:68:a3:6c:cf:fb:67:d1:79:8e:02:b2:45:ce:f3:52:3f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 632606202d607e500698c3088716e3218c8911cb
                       a1b2d529939b61e5b244b9c4b49fb9741239a02c
                       6d131dc890ca19abb2ece498310e9a3aa890c43b
                       bddb97102085c110e111cba3ada6ee20df508f81
                       1991db346afcc8bad3b8e1f714e1436c1e53804d
                       f8cf684fa649a3998271cd6a7b3ac1fa0ca8e150
                       22e125c20160bfa0009094694abc6c9fdbca93aa
                       61a009d630f2b9a8bcd234bddd3742bc389b7073
                       a90ecee942f3d7997310f72ec41f3ccde65a4b2f
                       d2e3923d1e650c655b276fcc624947ca9266dd5a
                       fb20e8ef92da62c0358ed52dd8aa2b92b1c25185
                       534fc7852387a93561daaac3eeb30334b58f9c09
                       742697676ccbd8367d867b3eacab46a3d3de98a1
                       0c596a2faf1a9a55feb29775fe5467fff06de83b
                       f695b69f6320782f74ec9981e4d29abb33e39cac
                       541f52f0e69bd3f78dd1e6728d917edc48d0e4a8
                       1d523dbfbeb26d25d450046005db2a5c6cb51b29
                       3fbcad341c88e5edafc1b26270215660e3791c92
                       2665172020d62758c8bb76c5eaa07c759932acef
                       d0a498fe
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6d:43:bd:f4:ec:9e:6e:41:96:d3:a3:07:e2:cc:f3:09:fa:7c:7a:3f]
            modulus: 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
    public exponent: 10001

] 
2021-05-07 10:53:05.737  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-07 10:53:05.739 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-07 10:53:05.741 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-07 10:53:05.742 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-07 10:53:05.742  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-07 10:53:05.743  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-07 10:53:05.743  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-07 10:53:05.743  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-07 10:53:05.744  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-07 10:53:05.747  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-07 10:53:05.748  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 10:53:05.748  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 10:53:05.749  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-07 10:53:05.854  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-07 10:53:05.855  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-07 10:53:05.855 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-07 10:53:05.856 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-07 10:53:05.857  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1712
2021-05-07 10:53:05.857  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-07 10:53:05.858  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-07 10:53:05.859  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-07 10:53:05.859  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-07 10:53:05.859  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-07 10:53:05.859 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 10:53:05.860 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 10:53:05.860 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 10:53:05.860 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 10:53:05.860 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 10:53:05.861 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 10:53:05.861 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-07 10:53:05.864 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 81769266075747773631054545408584384966760647059
             IssuerDN: UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 07 09:28:48 UTC 2021
           Final Date: Wed May 07 09:28:48 UTC 2031
            SubjectDN: UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [70:88:30:85:68:a3:6c:cf:fb:67:d1:79:8e:02:b2:45:ce:f3:52:3f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 632606202d607e500698c3088716e3218c8911cb
                       a1b2d529939b61e5b244b9c4b49fb9741239a02c
                       6d131dc890ca19abb2ece498310e9a3aa890c43b
                       bddb97102085c110e111cba3ada6ee20df508f81
                       1991db346afcc8bad3b8e1f714e1436c1e53804d
                       f8cf684fa649a3998271cd6a7b3ac1fa0ca8e150
                       22e125c20160bfa0009094694abc6c9fdbca93aa
                       61a009d630f2b9a8bcd234bddd3742bc389b7073
                       a90ecee942f3d7997310f72ec41f3ccde65a4b2f
                       d2e3923d1e650c655b276fcc624947ca9266dd5a
                       fb20e8ef92da62c0358ed52dd8aa2b92b1c25185
                       534fc7852387a93561daaac3eeb30334b58f9c09
                       742697676ccbd8367d867b3eacab46a3d3de98a1
                       0c596a2faf1a9a55feb29775fe5467fff06de83b
                       f695b69f6320782f74ec9981e4d29abb33e39cac
                       541f52f0e69bd3f78dd1e6728d917edc48d0e4a8
                       1d523dbfbeb26d25d450046005db2a5c6cb51b29
                       3fbcad341c88e5edafc1b26270215660e3791c92
                       2665172020d62758c8bb76c5eaa07c759932acef
                       d0a498fe
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [57:44:c1:a7:80:7e:30:2c:30:0f:27:59:bc:80:5a:d0:d8:22:3f:5d]
            modulus: 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
    public exponent: 10001

] 
2021-05-07 10:54:33.401  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-07 10:54:33.402 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-07 10:54:33.403 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-07 10:54:33.403 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-07 10:54:33.403  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-07 10:54:33.404  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-07 10:54:33.404  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-07 10:54:33.404  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-07 10:54:33.404  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-07 10:54:33.409  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-07 10:54:33.410  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 10:54:33.410  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 10:54:33.411  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-07 10:54:33.495  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-07 10:54:33.517  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-07 10:54:33.518 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-07 10:54:33.521 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-07 10:54:33.522  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1712
2021-05-07 10:54:33.523  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-07 10:54:33.525  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-07 10:54:33.526  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-07 10:54:33.526  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-07 10:54:33.526  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-07 10:54:33.527 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 10:54:33.527 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 10:54:33.528 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 10:54:33.528 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 10:54:33.528 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 10:54:33.529 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 10:54:33.529 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-07 10:54:33.533 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 81769266075747773631054545408584384966760647059
             IssuerDN: UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 07 09:28:48 UTC 2021
           Final Date: Wed May 07 09:28:48 UTC 2031
            SubjectDN: UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [70:88:30:85:68:a3:6c:cf:fb:67:d1:79:8e:02:b2:45:ce:f3:52:3f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 632606202d607e500698c3088716e3218c8911cb
                       a1b2d529939b61e5b244b9c4b49fb9741239a02c
                       6d131dc890ca19abb2ece498310e9a3aa890c43b
                       bddb97102085c110e111cba3ada6ee20df508f81
                       1991db346afcc8bad3b8e1f714e1436c1e53804d
                       f8cf684fa649a3998271cd6a7b3ac1fa0ca8e150
                       22e125c20160bfa0009094694abc6c9fdbca93aa
                       61a009d630f2b9a8bcd234bddd3742bc389b7073
                       a90ecee942f3d7997310f72ec41f3ccde65a4b2f
                       d2e3923d1e650c655b276fcc624947ca9266dd5a
                       fb20e8ef92da62c0358ed52dd8aa2b92b1c25185
                       534fc7852387a93561daaac3eeb30334b58f9c09
                       742697676ccbd8367d867b3eacab46a3d3de98a1
                       0c596a2faf1a9a55feb29775fe5467fff06de83b
                       f695b69f6320782f74ec9981e4d29abb33e39cac
                       541f52f0e69bd3f78dd1e6728d917edc48d0e4a8
                       1d523dbfbeb26d25d450046005db2a5c6cb51b29
                       3fbcad341c88e5edafc1b26270215660e3791c92
                       2665172020d62758c8bb76c5eaa07c759932acef
                       d0a498fe
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [76:22:e2:b3:7f:a8:97:a3:c5:57:b6:ba:76:17:be:2b:67:61:15:52]
            modulus: 855afdee73c52f3c1c113867bf4a24b5c77298fd79e6132ca6899e4549157282f223c4473e9d8f2f5b72099f5c4cab9bb8f13003c9e29d7177f7135e4bf6290956dada173808a32aacc603e2e1e837fe573cc6a875c450126be96033b76cfb2133078c6737bff1cfb10f4bb07d7826b7b77a06283d13458b5314adc4c7ac0575f49453864ab70b6fe9bed396df30831c9b8ecd0471f73640f0614cdb2da14be4dc62fccdd127586a579c9ffa6ffff3eeacd92a1f74534235550849d240f542013e9cffc349d6f09074c074b223dfaeac063a40b351004f5dc513d568d1e6f1b1fc687d396ed0b6839e198110220d372c62d7b770951f83143b5d015345376efb
    public exponent: 10001

] 
2021-05-07 10:57:24.070  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-07 10:57:24.071 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-07 10:57:24.072 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-07 10:57:24.073 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-07 10:57:24.073  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-07 10:57:24.073  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-07 10:57:24.074  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-07 10:57:24.074  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-07 10:57:24.074  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-07 10:57:24.079  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-07 10:57:24.079  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 10:57:24.079  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 10:57:24.080  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-07 10:57:24.173  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-07 10:57:24.174  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-07 10:57:24.174 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-07 10:57:24.176 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-07 10:57:24.177  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1712
2021-05-07 10:57:24.177  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-07 10:57:24.179  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-07 10:57:24.180  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-07 10:57:24.180  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-07 10:57:24.180  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-07 10:57:24.180 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 10:57:24.180 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 10:57:24.181 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 10:57:24.181 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 10:57:24.181 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 10:57:24.182 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 10:57:24.182 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-07 10:57:24.185 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 81769266075747773631054545408584384966760647059
             IssuerDN: UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 07 09:28:48 UTC 2021
           Final Date: Wed May 07 09:28:48 UTC 2031
            SubjectDN: UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [70:88:30:85:68:a3:6c:cf:fb:67:d1:79:8e:02:b2:45:ce:f3:52:3f]
            modulus: a5b7d62f1ab2b667407bc854966c708668bb443291d4bf222b27d01db88837fcc2d453e5b136456b1a3e16a0ab7c6e11a2eb55a63ea22d572b435a30723278562bb52e7af39e3690e4379d1b5a9831adda48b6e7ee32512656e0306c0c1e97655f85626b82e1937ffdfd8c2109b9ec74653bce7925c305eec4e109c1951420c24d9dee32cc70d11922852968fdbab7f6ccf11a86c01ba07eaa560ea2d7dac4d0d8e02b6371bd9574ef383a5c21a90a3f038e3278eb65db0fd5a783b6279f52726e83668a515f79689e3b3bb711774fbc4ece07b39802122c2cfc5d93ee51eda112b09ada336eecb33e542522bb54478526ba7073eca8bb56d5790b200eb2272badc0c662734764fecbf55f0675028065700f7482218986b4c145100261866208805909b2fea5c06c520ed5aed856f41f19819814fb2acd37245e4bb2dfbfcdd8c2ab282e25fb40f0f59f00a5a7738c505ca6431203d2e29dd4b672ab24a1e18c6900d4638ec6a605b3c145df66a5718f38ac2fe68e6ecaa8123f16757e9408d5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 632606202d607e500698c3088716e3218c8911cb
                       a1b2d529939b61e5b244b9c4b49fb9741239a02c
                       6d131dc890ca19abb2ece498310e9a3aa890c43b
                       bddb97102085c110e111cba3ada6ee20df508f81
                       1991db346afcc8bad3b8e1f714e1436c1e53804d
                       f8cf684fa649a3998271cd6a7b3ac1fa0ca8e150
                       22e125c20160bfa0009094694abc6c9fdbca93aa
                       61a009d630f2b9a8bcd234bddd3742bc389b7073
                       a90ecee942f3d7997310f72ec41f3ccde65a4b2f
                       d2e3923d1e650c655b276fcc624947ca9266dd5a
                       fb20e8ef92da62c0358ed52dd8aa2b92b1c25185
                       534fc7852387a93561daaac3eeb30334b58f9c09
                       742697676ccbd8367d867b3eacab46a3d3de98a1
                       0c596a2faf1a9a55feb29775fe5467fff06de83b
                       f695b69f6320782f74ec9981e4d29abb33e39cac
                       541f52f0e69bd3f78dd1e6728d917edc48d0e4a8
                       1d523dbfbeb26d25d450046005db2a5c6cb51b29
                       3fbcad341c88e5edafc1b26270215660e3791c92
                       2665172020d62758c8bb76c5eaa07c759932acef
                       d0a498fe
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5a:0b:85:a1:f9:d9:9d:30:ee:04:1d:f2:c6:8a:c7:b4:ac:78:36:0c]
            modulus: 87f19b8cb0cdd4d5c7ca8a18f464e5761bc9c459fb6fbc61ad9ebc06dd13f81f82535ae1775cc450c0a3ac33bf15cec1a0aa63b426d235cf6186a743a2897cdfc5ba579768dfd0ac8daea8d79996796367f237a6cfe05bc8efb051a205be170bc2ee3b477a54688052c44002a5f442061694ebe32dab0df281219f84cab0c472943e0b75469bbb101744c9a061d02dcca5ebd2d96f2b2ba337ab56c963cd857c30e3dfb1f9dc1492271c5a84d3a6df73089860aa943bd098620136902715d728a54d1b1efc26f6b6bfe8b2cd41ba96a1c18eb4284b1508e9575f02d521bf59588b8c2f1885bf9dc78fa0f7e66278ebb0c936830175773aa71ddbe47109576a1b
    public exponent: 10001

] 
2021-05-07 10:59:47.189  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-07 10:59:47.190 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-07 10:59:47.192 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-07 10:59:47.193 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-07 10:59:47.193  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-07 10:59:47.194  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-07 10:59:47.195  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-07 10:59:47.195  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-07 10:59:47.196  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-07 10:59:47.200  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-07 10:59:47.201  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 10:59:47.201  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 10:59:47.202  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-07 10:59:47.307  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-07 10:59:47.308  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-07 10:59:47.308 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-07 10:59:47.309 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-07 10:59:47.310  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1712
2021-05-07 10:59:47.310  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-07 10:59:47.312  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-07 10:59:47.312  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-07 10:59:47.312  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-07 10:59:47.313  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-07 10:59:47.313 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 10:59:47.313 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 10:59:47.313 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 10:59:47.314 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 10:59:47.314 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 10:59:47.314 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 10:59:47.315 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-07 10:59:47.318 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 81769266075747773631054545408584384966760647059
             IssuerDN: UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 07 09:28:48 UTC 2021
           Final Date: Wed May 07 09:28:48 UTC 2031
            SubjectDN: UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [70:88:30:85:68:a3:6c:cf:fb:67:d1:79:8e:02:b2:45:ce:f3:52:3f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 632606202d607e500698c3088716e3218c8911cb
                       a1b2d529939b61e5b244b9c4b49fb9741239a02c
                       6d131dc890ca19abb2ece498310e9a3aa890c43b
                       bddb97102085c110e111cba3ada6ee20df508f81
                       1991db346afcc8bad3b8e1f714e1436c1e53804d
                       f8cf684fa649a3998271cd6a7b3ac1fa0ca8e150
                       22e125c20160bfa0009094694abc6c9fdbca93aa
                       61a009d630f2b9a8bcd234bddd3742bc389b7073
                       a90ecee942f3d7997310f72ec41f3ccde65a4b2f
                       d2e3923d1e650c655b276fcc624947ca9266dd5a
                       fb20e8ef92da62c0358ed52dd8aa2b92b1c25185
                       534fc7852387a93561daaac3eeb30334b58f9c09
                       742697676ccbd8367d867b3eacab46a3d3de98a1
                       0c596a2faf1a9a55feb29775fe5467fff06de83b
                       f695b69f6320782f74ec9981e4d29abb33e39cac
                       541f52f0e69bd3f78dd1e6728d917edc48d0e4a8
                       1d523dbfbeb26d25d450046005db2a5c6cb51b29
                       3fbcad341c88e5edafc1b26270215660e3791c92
                       2665172020d62758c8bb76c5eaa07c759932acef
                       d0a498fe
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a0:ec:bc:14:39:e5:6a:6a:42:c4:da:53:64:bc:1d:f3:4d:2b:ea:1b]
            modulus: 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
    public exponent: 10001

] 
2021-05-07 11:01:24.902  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-07 11:01:24.903 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-07 11:01:24.904 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-07 11:01:24.905 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-07 11:01:24.906  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-07 11:01:24.906  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-07 11:01:24.906  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-07 11:01:24.907  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-07 11:01:24.907  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-07 11:01:24.912  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-07 11:01:24.912  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 11:01:24.913  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 11:01:24.914  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-07 11:01:25.017  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-07 11:01:25.018  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-07 11:01:25.018 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-07 11:01:25.023 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-07 11:01:25.024  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1712
2021-05-07 11:01:25.024  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-07 11:01:25.025  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-07 11:01:25.026  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-07 11:01:25.026  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-07 11:01:25.027  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-07 11:01:25.027 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 11:01:25.027 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 11:01:25.028 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 11:01:25.028 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 11:01:25.029 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 11:01:25.029 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 11:01:25.030 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-07 11:01:25.033 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 81769266075747773631054545408584384966760647059
             IssuerDN: UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 07 09:28:48 UTC 2021
           Final Date: Wed May 07 09:28:48 UTC 2031
            SubjectDN: UID=c-058ce16bfad4f192a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [70:88:30:85:68:a3:6c:cf:fb:67:d1:79:8e:02:b2:45:ce:f3:52:3f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 632606202d607e500698c3088716e3218c8911cb
                       a1b2d529939b61e5b244b9c4b49fb9741239a02c
                       6d131dc890ca19abb2ece498310e9a3aa890c43b
                       bddb97102085c110e111cba3ada6ee20df508f81
                       1991db346afcc8bad3b8e1f714e1436c1e53804d
                       f8cf684fa649a3998271cd6a7b3ac1fa0ca8e150
                       22e125c20160bfa0009094694abc6c9fdbca93aa
                       61a009d630f2b9a8bcd234bddd3742bc389b7073
                       a90ecee942f3d7997310f72ec41f3ccde65a4b2f
                       d2e3923d1e650c655b276fcc624947ca9266dd5a
                       fb20e8ef92da62c0358ed52dd8aa2b92b1c25185
                       534fc7852387a93561daaac3eeb30334b58f9c09
                       742697676ccbd8367d867b3eacab46a3d3de98a1
                       0c596a2faf1a9a55feb29775fe5467fff06de83b
                       f695b69f6320782f74ec9981e4d29abb33e39cac
                       541f52f0e69bd3f78dd1e6728d917edc48d0e4a8
                       1d523dbfbeb26d25d450046005db2a5c6cb51b29
                       3fbcad341c88e5edafc1b26270215660e3791c92
                       2665172020d62758c8bb76c5eaa07c759932acef
                       d0a498fe
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2b:2c:d4:af:d5:25:0b:d4:2d:87:96:64:d2:3a:0e:32:53:43:65:8b]
            modulus: 89ba1f0eb9853ee6b6f2184d4782cfde8ff3cb94de3c6b1f70c628fcf95413e912df942cb8b1c8aac53ac827f887ff4dbfc1f263b42b3f41b220b858a592c9fcfa777e3b066b4a27249178366fc2b5381a10376486cc05ec2d99259c32032b2074119e6359cec4cc53188ed02b7071db912b10b3ba685a9aaf1b4922c6c6c767598d16dcd1855c9bc3200ac48aec0fe50e41179fcd2bba08b7ece63a32d94b615555a058a4b54fe9fe3a752d10e62e66cfa7c5874d2a63b391bf2484cbf505eb39829633205443e0024f7f1fcf7185dadac6975298604bec8ad061c3b113e6577525a5be38f577c75eb23c3a8873e8ceac71166434f2d9cff76641abc946c193
    public exponent: 10001

]