Results

By type

          2021-09-02 10:54:17,832 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-09-02 10:54:18,683 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-09-02 10:54:19.452  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-09-02 10:54:22.304 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-09-02 10:54:22.597  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-09-02 10:54:22.754  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-09-02 10:54:25.120  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.874 seconds (JVM running for 9.562)
2021-09-02 10:56:28.240  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-02 10:56:28.256 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-02 10:56:28.312 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-09-02 10:56:28.317 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-02 10:56:28.335  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-09-02 10:56:28.341  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-02 10:56:28.348  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-02 10:56:28.349  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-02 10:56:28.350  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-02 10:56:28.361  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-02 10:56:28.365  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-02 10:56:28.405  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-02 10:56:28.413  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-02 10:56:28.414  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-02 10:56:28.432  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-02 10:56:29.197  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-02 10:56:29.201  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-02 10:56:29.202 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-02 10:56:29.215 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-02 10:56:29.219  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1970
2021-09-02 10:56:29.220  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-02 10:56:29.225  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-02 10:56:29.227  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-02 10:56:29.237  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-02 10:56:29.239  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-02 10:56:29.240 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-02 10:56:29.241 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-02 10:56:29.242 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-02 10:56:29.260 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-02 10:56:29.261 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-02 10:56:29.261 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-02 10:56:29.281 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-02 10:56:29.327 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 312191001800359088028790710625056458211655099715
             IssuerDN: UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Sep 02 10:50:20 UTC 2021
           Final Date: Tue Sep 02 10:50:19 UTC 2031
            SubjectDN: UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [04:1c:46:62:bd:39:5b:b8:42:0b:a0:5d:e2:68:80:47:ac:2d:90:f5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1cc742ea640a5613a049cda26b84d25d9263a10a
                       2c955cab41cf19ed45fbd03b2b45b2d71bc488ac
                       d2e870ae47d8d39481bab6bab0ffb93283d65fb6
                       82b7dcfc93b9e091943a3fe7b42f7cdeacf66037
                       73294b317e2bd13baa291226f548f701c2cc71f5
                       986c26d787754de02700272b6af965d9c0daca88
                       5d8850e9a651ab44873e1d8803dc1a59d830a3fc
                       3820f8a207dcbe42cc6503a8db69755ba6dbbd41
                       2f1c1b4e92aca2233a54c2374461a4d034b3608e
                       fa7b593faa640e68ff3d99e51f95f1973de5fb05
                       1410de536c44f70e2448c2286cb71f3cb10d662b
                       e8d1c970b9a3d76b7f9a59bd6d94efa19d66d695
                       29ef010b12a5f8492f0d6dcb166af04489af8bd6
                       477e899b32a9c8a499dac543369e108edf68ae55
                       ea56d1b30b191b9adcede709ba77b52d3b5ef949
                       8f9599edee0e33999587c37dbd56202425b6496c
                       5e6aadee79af01b26c671d6a3e45471e60514c44
                       6ace12ec0551f68bcb3f4da565e6abd4ae44e406
                       85f629c9ebfb1336da3aecd06ac103e5736c722c
                       a8e66540
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bc:78:fa:97:2a:17:29:ac:4b:0d:aa:fa:8d:54:c3:94:d3:81:71:d8]
            modulus: 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
    public exponent: 10001

] 
2021-09-02 12:44:51.590  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-02 12:44:51.594 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-02 12:44:51.597 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-09-02 12:44:51.600 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-02 12:44:51.602  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-09-02 12:44:51.604  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-02 12:44:51.605  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-02 12:44:51.606  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-02 12:44:51.611  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-02 12:44:51.619  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-02 12:44:51.620  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-02 12:44:51.621  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-02 12:44:51.624  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-02 12:44:51.754  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-02 12:44:51.755  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-02 12:44:51.755 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-02 12:44:51.760 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-02 12:44:51.761  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1970
2021-09-02 12:44:51.762  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-02 12:44:51.766  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-02 12:44:51.766  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-02 12:44:51.767  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-02 12:44:51.767  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-02 12:44:51.768 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-02 12:44:51.768 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-02 12:44:51.769 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-02 12:44:51.770 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-02 12:44:51.770 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-02 12:44:51.771 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-02 12:44:51.773 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-02 12:44:51.780 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 312191001800359088028790710625056458211655099715
             IssuerDN: UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Sep 02 10:50:20 UTC 2021
           Final Date: Tue Sep 02 10:50:19 UTC 2031
            SubjectDN: UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [04:1c:46:62:bd:39:5b:b8:42:0b:a0:5d:e2:68:80:47:ac:2d:90:f5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1cc742ea640a5613a049cda26b84d25d9263a10a
                       2c955cab41cf19ed45fbd03b2b45b2d71bc488ac
                       d2e870ae47d8d39481bab6bab0ffb93283d65fb6
                       82b7dcfc93b9e091943a3fe7b42f7cdeacf66037
                       73294b317e2bd13baa291226f548f701c2cc71f5
                       986c26d787754de02700272b6af965d9c0daca88
                       5d8850e9a651ab44873e1d8803dc1a59d830a3fc
                       3820f8a207dcbe42cc6503a8db69755ba6dbbd41
                       2f1c1b4e92aca2233a54c2374461a4d034b3608e
                       fa7b593faa640e68ff3d99e51f95f1973de5fb05
                       1410de536c44f70e2448c2286cb71f3cb10d662b
                       e8d1c970b9a3d76b7f9a59bd6d94efa19d66d695
                       29ef010b12a5f8492f0d6dcb166af04489af8bd6
                       477e899b32a9c8a499dac543369e108edf68ae55
                       ea56d1b30b191b9adcede709ba77b52d3b5ef949
                       8f9599edee0e33999587c37dbd56202425b6496c
                       5e6aadee79af01b26c671d6a3e45471e60514c44
                       6ace12ec0551f68bcb3f4da565e6abd4ae44e406
                       85f629c9ebfb1336da3aecd06ac103e5736c722c
                       a8e66540
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [15:25:13:67:a0:37:14:94:65:6a:d4:ab:bd:c4:4e:6f:0a:b8:0d:2b]
            modulus: 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
    public exponent: 10001

] 
2021-09-02 12:46:51.849  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-02 12:46:51.852 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-02 12:46:51.854 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-02 12:46:51.855 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-02 12:46:51.855  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-02 12:46:51.856  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-02 12:46:51.857  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-02 12:46:51.857  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-02 12:46:51.858  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-02 12:46:51.864  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-02 12:46:51.865  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-02 12:46:51.865  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-02 12:46:51.867  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-02 12:46:51.985  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-02 12:46:51.986  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-02 12:46:51.987 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-02 12:46:51.991 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-02 12:46:51.992  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1970
2021-09-02 12:46:51.993  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-02 12:46:51.995  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-02 12:46:51.995  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-02 12:46:51.997  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-02 12:46:51.998  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-02 12:46:52.000 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-02 12:46:52.001 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-02 12:46:52.001 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-02 12:46:52.003 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-02 12:46:52.003 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-02 12:46:52.004 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-02 12:46:52.005 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-02 12:46:52.010 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 312191001800359088028790710625056458211655099715
             IssuerDN: UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Sep 02 10:50:20 UTC 2021
           Final Date: Tue Sep 02 10:50:19 UTC 2031
            SubjectDN: UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [04:1c:46:62:bd:39:5b:b8:42:0b:a0:5d:e2:68:80:47:ac:2d:90:f5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1cc742ea640a5613a049cda26b84d25d9263a10a
                       2c955cab41cf19ed45fbd03b2b45b2d71bc488ac
                       d2e870ae47d8d39481bab6bab0ffb93283d65fb6
                       82b7dcfc93b9e091943a3fe7b42f7cdeacf66037
                       73294b317e2bd13baa291226f548f701c2cc71f5
                       986c26d787754de02700272b6af965d9c0daca88
                       5d8850e9a651ab44873e1d8803dc1a59d830a3fc
                       3820f8a207dcbe42cc6503a8db69755ba6dbbd41
                       2f1c1b4e92aca2233a54c2374461a4d034b3608e
                       fa7b593faa640e68ff3d99e51f95f1973de5fb05
                       1410de536c44f70e2448c2286cb71f3cb10d662b
                       e8d1c970b9a3d76b7f9a59bd6d94efa19d66d695
                       29ef010b12a5f8492f0d6dcb166af04489af8bd6
                       477e899b32a9c8a499dac543369e108edf68ae55
                       ea56d1b30b191b9adcede709ba77b52d3b5ef949
                       8f9599edee0e33999587c37dbd56202425b6496c
                       5e6aadee79af01b26c671d6a3e45471e60514c44
                       6ace12ec0551f68bcb3f4da565e6abd4ae44e406
                       85f629c9ebfb1336da3aecd06ac103e5736c722c
                       a8e66540
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d0:f6:09:50:f3:33:2e:ba:f3:a6:35:3b:08:4d:cf:41:4c:85:77:75]
            modulus: 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
    public exponent: 10001

] 
2021-09-02 12:49:44.485  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-02 12:49:44.487 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-02 12:49:44.489 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-09-02 12:49:44.490 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-02 12:49:44.491  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-09-02 12:49:44.492  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-02 12:49:44.493  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-02 12:49:44.493  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-02 12:49:44.494  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-02 12:49:44.505  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-02 12:49:44.506  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-02 12:49:44.506  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-02 12:49:44.508  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-02 12:49:44.622  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-02 12:49:44.623  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-02 12:49:44.623 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-02 12:49:44.625 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-02 12:49:44.626  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1970
2021-09-02 12:49:44.626  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-02 12:49:44.627  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-02 12:49:44.628  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-02 12:49:44.629  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-02 12:49:44.629  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-02 12:49:44.629 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-02 12:49:44.630 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-02 12:49:44.630 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-02 12:49:44.631 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-02 12:49:44.631 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-02 12:49:44.632 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-02 12:49:44.633 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-02 12:49:44.637 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 312191001800359088028790710625056458211655099715
             IssuerDN: UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Sep 02 10:50:20 UTC 2021
           Final Date: Tue Sep 02 10:50:19 UTC 2031
            SubjectDN: UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [04:1c:46:62:bd:39:5b:b8:42:0b:a0:5d:e2:68:80:47:ac:2d:90:f5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1cc742ea640a5613a049cda26b84d25d9263a10a
                       2c955cab41cf19ed45fbd03b2b45b2d71bc488ac
                       d2e870ae47d8d39481bab6bab0ffb93283d65fb6
                       82b7dcfc93b9e091943a3fe7b42f7cdeacf66037
                       73294b317e2bd13baa291226f548f701c2cc71f5
                       986c26d787754de02700272b6af965d9c0daca88
                       5d8850e9a651ab44873e1d8803dc1a59d830a3fc
                       3820f8a207dcbe42cc6503a8db69755ba6dbbd41
                       2f1c1b4e92aca2233a54c2374461a4d034b3608e
                       fa7b593faa640e68ff3d99e51f95f1973de5fb05
                       1410de536c44f70e2448c2286cb71f3cb10d662b
                       e8d1c970b9a3d76b7f9a59bd6d94efa19d66d695
                       29ef010b12a5f8492f0d6dcb166af04489af8bd6
                       477e899b32a9c8a499dac543369e108edf68ae55
                       ea56d1b30b191b9adcede709ba77b52d3b5ef949
                       8f9599edee0e33999587c37dbd56202425b6496c
                       5e6aadee79af01b26c671d6a3e45471e60514c44
                       6ace12ec0551f68bcb3f4da565e6abd4ae44e406
                       85f629c9ebfb1336da3aecd06ac103e5736c722c
                       a8e66540
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [21:c4:78:bd:d0:e1:8f:7e:c2:2c:88:ac:07:a8:8b:b7:f4:01:43:86]
            modulus: 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
    public exponent: 10001

] 
2021-09-02 12:50:12.877  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-02 12:50:12.879 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-02 12:50:12.881 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-09-02 12:50:12.883 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-02 12:50:12.883  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-09-02 12:50:12.884  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-02 12:50:12.884  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-02 12:50:12.885  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-02 12:50:12.885  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-02 12:50:12.891  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-02 12:50:12.893  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-02 12:50:12.893  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-02 12:50:12.895  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-02 12:50:12.995  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-02 12:50:12.996  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-02 12:50:12.996 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-02 12:50:12.998 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-02 12:50:13.000  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1970
2021-09-02 12:50:13.001  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-02 12:50:13.003  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-02 12:50:13.004  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-02 12:50:13.004  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-02 12:50:13.005  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-02 12:50:13.006 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-02 12:50:13.006 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-02 12:50:13.007 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-02 12:50:13.008 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-02 12:50:13.008 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-02 12:50:13.009 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-02 12:50:13.010 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-02 12:50:13.037 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 312191001800359088028790710625056458211655099715
             IssuerDN: UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Sep 02 10:50:20 UTC 2021
           Final Date: Tue Sep 02 10:50:19 UTC 2031
            SubjectDN: UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [04:1c:46:62:bd:39:5b:b8:42:0b:a0:5d:e2:68:80:47:ac:2d:90:f5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1cc742ea640a5613a049cda26b84d25d9263a10a
                       2c955cab41cf19ed45fbd03b2b45b2d71bc488ac
                       d2e870ae47d8d39481bab6bab0ffb93283d65fb6
                       82b7dcfc93b9e091943a3fe7b42f7cdeacf66037
                       73294b317e2bd13baa291226f548f701c2cc71f5
                       986c26d787754de02700272b6af965d9c0daca88
                       5d8850e9a651ab44873e1d8803dc1a59d830a3fc
                       3820f8a207dcbe42cc6503a8db69755ba6dbbd41
                       2f1c1b4e92aca2233a54c2374461a4d034b3608e
                       fa7b593faa640e68ff3d99e51f95f1973de5fb05
                       1410de536c44f70e2448c2286cb71f3cb10d662b
                       e8d1c970b9a3d76b7f9a59bd6d94efa19d66d695
                       29ef010b12a5f8492f0d6dcb166af04489af8bd6
                       477e899b32a9c8a499dac543369e108edf68ae55
                       ea56d1b30b191b9adcede709ba77b52d3b5ef949
                       8f9599edee0e33999587c37dbd56202425b6496c
                       5e6aadee79af01b26c671d6a3e45471e60514c44
                       6ace12ec0551f68bcb3f4da565e6abd4ae44e406
                       85f629c9ebfb1336da3aecd06ac103e5736c722c
                       a8e66540
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6f:69:94:40:5a:a0:fc:58:a0:2f:51:ab:ec:29:2f:5c:0b:75:36:fe]
            modulus: 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
    public exponent: 10001

] 
2021-09-02 12:54:08.481  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-02 12:54:08.484 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-02 12:54:08.486 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-09-02 12:54:08.487 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-02 12:54:08.488  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-09-02 12:54:08.489  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-02 12:54:08.489  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-02 12:54:08.490  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-02 12:54:08.490  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-02 12:54:08.497  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-02 12:54:08.498  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-02 12:54:08.499  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-02 12:54:08.500  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-02 12:54:08.641  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-02 12:54:08.642  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-02 12:54:08.642 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-02 12:54:08.644 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-02 12:54:08.645  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1970
2021-09-02 12:54:08.646  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-02 12:54:08.647  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-02 12:54:08.648  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-02 12:54:08.648  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-02 12:54:08.649  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-02 12:54:08.649 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-02 12:54:08.650 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-02 12:54:08.650 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-02 12:54:08.651 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-02 12:54:08.651 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-02 12:54:08.652 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-02 12:54:08.653 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-02 12:54:08.678 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 312191001800359088028790710625056458211655099715
             IssuerDN: UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Sep 02 10:50:20 UTC 2021
           Final Date: Tue Sep 02 10:50:19 UTC 2031
            SubjectDN: UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [04:1c:46:62:bd:39:5b:b8:42:0b:a0:5d:e2:68:80:47:ac:2d:90:f5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1cc742ea640a5613a049cda26b84d25d9263a10a
                       2c955cab41cf19ed45fbd03b2b45b2d71bc488ac
                       d2e870ae47d8d39481bab6bab0ffb93283d65fb6
                       82b7dcfc93b9e091943a3fe7b42f7cdeacf66037
                       73294b317e2bd13baa291226f548f701c2cc71f5
                       986c26d787754de02700272b6af965d9c0daca88
                       5d8850e9a651ab44873e1d8803dc1a59d830a3fc
                       3820f8a207dcbe42cc6503a8db69755ba6dbbd41
                       2f1c1b4e92aca2233a54c2374461a4d034b3608e
                       fa7b593faa640e68ff3d99e51f95f1973de5fb05
                       1410de536c44f70e2448c2286cb71f3cb10d662b
                       e8d1c970b9a3d76b7f9a59bd6d94efa19d66d695
                       29ef010b12a5f8492f0d6dcb166af04489af8bd6
                       477e899b32a9c8a499dac543369e108edf68ae55
                       ea56d1b30b191b9adcede709ba77b52d3b5ef949
                       8f9599edee0e33999587c37dbd56202425b6496c
                       5e6aadee79af01b26c671d6a3e45471e60514c44
                       6ace12ec0551f68bcb3f4da565e6abd4ae44e406
                       85f629c9ebfb1336da3aecd06ac103e5736c722c
                       a8e66540
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [68:e1:90:0b:66:87:fd:91:c1:0d:ec:11:2c:f1:ac:8a:c3:10:e7:1e]
            modulus: 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
    public exponent: 10001

] 
2021-09-02 12:54:18.469  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-02 12:54:18.470 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-02 12:54:18.471 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-02 12:54:18.471 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-02 12:54:18.472  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-02 12:54:18.473  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-02 12:54:18.473  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-02 12:54:18.473  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-02 12:54:18.474  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-02 12:54:18.487  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-02 12:54:18.489  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-02 12:54:18.490  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-02 12:54:18.494  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-02 12:54:18.617  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-02 12:54:18.618  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-02 12:54:18.618 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-02 12:54:18.620 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-02 12:54:18.620  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1970
2021-09-02 12:54:18.621  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-02 12:54:18.622  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-02 12:54:18.623  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-02 12:54:18.623  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-02 12:54:18.624  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-02 12:54:18.624 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-02 12:54:18.624 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-02 12:54:18.625 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-02 12:54:18.625 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-02 12:54:18.626 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-02 12:54:18.626 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-02 12:54:18.627 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-02 12:54:18.630 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 312191001800359088028790710625056458211655099715
             IssuerDN: UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Sep 02 10:50:20 UTC 2021
           Final Date: Tue Sep 02 10:50:19 UTC 2031
            SubjectDN: UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [04:1c:46:62:bd:39:5b:b8:42:0b:a0:5d:e2:68:80:47:ac:2d:90:f5]
            modulus: b29b1261d7ed531c3743d0a936fefdaabd899e2b9a990337a54574efc9dbe35efeef2565ae3939c8d9e1b6cca2898a4dd5895266c6d327013eb13860ac7c79013f9db0e89a1b5d47ddd4f85eb47cf1a39206fc38c12cdac547bb6216ed71fb9fa5843cdf6853776532be55af2222ec5f32fd9c9679f8bc9646002b0ffe860a3f8b0c2f51fb5e1be08cfd88cafc5aa00c7f9db86c9e5b5439d86cb2d79444e3ea96835d00587504abac30cfb0ca0817ed3b8da8ad8c5450334514f3e91bc99bdcd428ab7513bfec72ed27a67c4cf3e3b7e809e357ade550fe49de974d30c4a0a87ff0423e83d4ab0132750fc98b38a8710f77173c0b35a481d0a3080b6426a496f07b27e748eaded3205eaca88d7bc48ba3426d309e220b3bc9212d427d6ffcc1b8c6248b0f2432b976e224a204be67ec5ce6806fc59f6e0d145a22151c54eaab11819aa06d3caa456d04a042b7ba77520c43e251871cce14ff486417733ef887599af389293d3e41f4b0e8d0dc47a47da1c82e28cf4b877d1cdb7d9459a87233
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1cc742ea640a5613a049cda26b84d25d9263a10a
                       2c955cab41cf19ed45fbd03b2b45b2d71bc488ac
                       d2e870ae47d8d39481bab6bab0ffb93283d65fb6
                       82b7dcfc93b9e091943a3fe7b42f7cdeacf66037
                       73294b317e2bd13baa291226f548f701c2cc71f5
                       986c26d787754de02700272b6af965d9c0daca88
                       5d8850e9a651ab44873e1d8803dc1a59d830a3fc
                       3820f8a207dcbe42cc6503a8db69755ba6dbbd41
                       2f1c1b4e92aca2233a54c2374461a4d034b3608e
                       fa7b593faa640e68ff3d99e51f95f1973de5fb05
                       1410de536c44f70e2448c2286cb71f3cb10d662b
                       e8d1c970b9a3d76b7f9a59bd6d94efa19d66d695
                       29ef010b12a5f8492f0d6dcb166af04489af8bd6
                       477e899b32a9c8a499dac543369e108edf68ae55
                       ea56d1b30b191b9adcede709ba77b52d3b5ef949
                       8f9599edee0e33999587c37dbd56202425b6496c
                       5e6aadee79af01b26c671d6a3e45471e60514c44
                       6ace12ec0551f68bcb3f4da565e6abd4ae44e406
                       85f629c9ebfb1336da3aecd06ac103e5736c722c
                       a8e66540
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1d:e5:8f:54:c5:16:6e:0f:0c:92:bd:98:f5:ed:bd:48:5c:72:51:35]
            modulus: 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
    public exponent: 10001

] 
2021-09-02 12:54:39.662  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-02 12:54:39.665 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-02 12:54:39.669 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-02 12:54:39.671 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-02 12:54:39.671  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-02 12:54:39.672  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-02 12:54:39.672  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-02 12:54:39.673  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-02 12:54:39.673  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-02 12:54:39.679  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-02 12:54:39.680  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-02 12:54:39.681  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-02 12:54:39.683  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-02 12:54:39.823  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-02 12:54:39.823  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-02 12:54:39.824 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-02 12:54:39.825 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-02 12:54:39.826  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1970
2021-09-02 12:54:39.827  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-02 12:54:39.830  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-02 12:54:39.831  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-02 12:54:39.831  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-02 12:54:39.832  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-02 12:54:39.832 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-02 12:54:39.832 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-02 12:54:39.833 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-02 12:54:39.834 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-02 12:54:39.834 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-02 12:54:39.834 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-02 12:54:39.835 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-02 12:54:39.839 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 312191001800359088028790710625056458211655099715
             IssuerDN: UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Sep 02 10:50:20 UTC 2021
           Final Date: Tue Sep 02 10:50:19 UTC 2031
            SubjectDN: UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [04:1c:46:62:bd:39:5b:b8:42:0b:a0:5d:e2:68:80:47:ac:2d:90:f5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1cc742ea640a5613a049cda26b84d25d9263a10a
                       2c955cab41cf19ed45fbd03b2b45b2d71bc488ac
                       d2e870ae47d8d39481bab6bab0ffb93283d65fb6
                       82b7dcfc93b9e091943a3fe7b42f7cdeacf66037
                       73294b317e2bd13baa291226f548f701c2cc71f5
                       986c26d787754de02700272b6af965d9c0daca88
                       5d8850e9a651ab44873e1d8803dc1a59d830a3fc
                       3820f8a207dcbe42cc6503a8db69755ba6dbbd41
                       2f1c1b4e92aca2233a54c2374461a4d034b3608e
                       fa7b593faa640e68ff3d99e51f95f1973de5fb05
                       1410de536c44f70e2448c2286cb71f3cb10d662b
                       e8d1c970b9a3d76b7f9a59bd6d94efa19d66d695
                       29ef010b12a5f8492f0d6dcb166af04489af8bd6
                       477e899b32a9c8a499dac543369e108edf68ae55
                       ea56d1b30b191b9adcede709ba77b52d3b5ef949
                       8f9599edee0e33999587c37dbd56202425b6496c
                       5e6aadee79af01b26c671d6a3e45471e60514c44
                       6ace12ec0551f68bcb3f4da565e6abd4ae44e406
                       85f629c9ebfb1336da3aecd06ac103e5736c722c
                       a8e66540
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ca:be:49:74:b7:51:e2:f3:19:d7:ef:da:5e:2c:02:2d:f6:a5:56:02]
            modulus: 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
    public exponent: 10001

] 
2021-09-02 12:55:13.645  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-02 12:55:13.647 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-02 12:55:13.648 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-02 12:55:13.648 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-02 12:55:13.649  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-02 12:55:13.650  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-02 12:55:13.650  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-02 12:55:13.650  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-02 12:55:13.651  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-02 12:55:13.656  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-02 12:55:13.657  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-02 12:55:13.657  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-02 12:55:13.659  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-02 12:55:13.746  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-02 12:55:13.747  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-02 12:55:13.747 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-02 12:55:13.748 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-02 12:55:13.749  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1970
2021-09-02 12:55:13.749  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-02 12:55:13.750  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-02 12:55:13.751  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-02 12:55:13.751  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-02 12:55:13.752  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-02 12:55:13.752 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-02 12:55:13.752 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-02 12:55:13.753 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-02 12:55:13.753 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-02 12:55:13.754 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-02 12:55:13.754 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-02 12:55:13.755 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-02 12:55:13.758 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 312191001800359088028790710625056458211655099715
             IssuerDN: UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Sep 02 10:50:20 UTC 2021
           Final Date: Tue Sep 02 10:50:19 UTC 2031
            SubjectDN: UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [04:1c:46:62:bd:39:5b:b8:42:0b:a0:5d:e2:68:80:47:ac:2d:90:f5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1cc742ea640a5613a049cda26b84d25d9263a10a
                       2c955cab41cf19ed45fbd03b2b45b2d71bc488ac
                       d2e870ae47d8d39481bab6bab0ffb93283d65fb6
                       82b7dcfc93b9e091943a3fe7b42f7cdeacf66037
                       73294b317e2bd13baa291226f548f701c2cc71f5
                       986c26d787754de02700272b6af965d9c0daca88
                       5d8850e9a651ab44873e1d8803dc1a59d830a3fc
                       3820f8a207dcbe42cc6503a8db69755ba6dbbd41
                       2f1c1b4e92aca2233a54c2374461a4d034b3608e
                       fa7b593faa640e68ff3d99e51f95f1973de5fb05
                       1410de536c44f70e2448c2286cb71f3cb10d662b
                       e8d1c970b9a3d76b7f9a59bd6d94efa19d66d695
                       29ef010b12a5f8492f0d6dcb166af04489af8bd6
                       477e899b32a9c8a499dac543369e108edf68ae55
                       ea56d1b30b191b9adcede709ba77b52d3b5ef949
                       8f9599edee0e33999587c37dbd56202425b6496c
                       5e6aadee79af01b26c671d6a3e45471e60514c44
                       6ace12ec0551f68bcb3f4da565e6abd4ae44e406
                       85f629c9ebfb1336da3aecd06ac103e5736c722c
                       a8e66540
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [39:94:bf:30:67:7a:c3:0f:b1:2e:1c:c4:74:31:7c:13:da:4c:3c:1f]
            modulus: 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
    public exponent: 10001

] 
2021-09-02 12:57:01.717  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-02 12:57:01.719 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-02 12:57:01.723 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-02 12:57:01.724 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-02 12:57:01.725  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-02 12:57:01.725  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-02 12:57:01.733  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-02 12:57:01.733  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-02 12:57:01.734  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-02 12:57:01.745  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-02 12:57:01.746  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-02 12:57:01.746  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-02 12:57:01.748  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-02 12:57:01.889  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-02 12:57:01.890  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-02 12:57:01.891 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-02 12:57:01.893 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-02 12:57:01.895  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1970
2021-09-02 12:57:01.895  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-02 12:57:01.897  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-02 12:57:01.897  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-02 12:57:01.898  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-02 12:57:01.898  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-02 12:57:01.899 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-02 12:57:01.899 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-02 12:57:01.899 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-02 12:57:01.900 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-02 12:57:01.901 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-02 12:57:01.901 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-02 12:57:01.902 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-02 12:57:01.906 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 312191001800359088028790710625056458211655099715
             IssuerDN: UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Sep 02 10:50:20 UTC 2021
           Final Date: Tue Sep 02 10:50:19 UTC 2031
            SubjectDN: UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [04:1c:46:62:bd:39:5b:b8:42:0b:a0:5d:e2:68:80:47:ac:2d:90:f5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1cc742ea640a5613a049cda26b84d25d9263a10a
                       2c955cab41cf19ed45fbd03b2b45b2d71bc488ac
                       d2e870ae47d8d39481bab6bab0ffb93283d65fb6
                       82b7dcfc93b9e091943a3fe7b42f7cdeacf66037
                       73294b317e2bd13baa291226f548f701c2cc71f5
                       986c26d787754de02700272b6af965d9c0daca88
                       5d8850e9a651ab44873e1d8803dc1a59d830a3fc
                       3820f8a207dcbe42cc6503a8db69755ba6dbbd41
                       2f1c1b4e92aca2233a54c2374461a4d034b3608e
                       fa7b593faa640e68ff3d99e51f95f1973de5fb05
                       1410de536c44f70e2448c2286cb71f3cb10d662b
                       e8d1c970b9a3d76b7f9a59bd6d94efa19d66d695
                       29ef010b12a5f8492f0d6dcb166af04489af8bd6
                       477e899b32a9c8a499dac543369e108edf68ae55
                       ea56d1b30b191b9adcede709ba77b52d3b5ef949
                       8f9599edee0e33999587c37dbd56202425b6496c
                       5e6aadee79af01b26c671d6a3e45471e60514c44
                       6ace12ec0551f68bcb3f4da565e6abd4ae44e406
                       85f629c9ebfb1336da3aecd06ac103e5736c722c
                       a8e66540
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ff:f5:d6:69:fb:29:43:6c:a2:fd:ec:14:25:af:84:2a:54:89:b5:3c]
            modulus: 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
    public exponent: 10001

] 
2021-09-02 12:58:17.571  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-02 12:58:17.573 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-02 12:58:17.575 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-02 12:58:17.576 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-02 12:58:17.577  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-02 12:58:17.578  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-02 12:58:17.579  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-02 12:58:17.580  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-02 12:58:17.581  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-02 12:58:17.589  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-02 12:58:17.590  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-02 12:58:17.591  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-02 12:58:17.593  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-02 12:58:17.700  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-02 12:58:17.701  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-02 12:58:17.701 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-02 12:58:17.703 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-02 12:58:17.704  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1970
2021-09-02 12:58:17.704  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-02 12:58:17.706  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-02 12:58:17.706  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-02 12:58:17.707  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-02 12:58:17.707  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-02 12:58:17.708 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-02 12:58:17.708 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-02 12:58:17.708 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-02 12:58:17.709 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-02 12:58:17.709 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-02 12:58:17.710 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-02 12:58:17.711 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-02 12:58:17.715 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 312191001800359088028790710625056458211655099715
             IssuerDN: UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Sep 02 10:50:20 UTC 2021
           Final Date: Tue Sep 02 10:50:19 UTC 2031
            SubjectDN: UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [04:1c:46:62:bd:39:5b:b8:42:0b:a0:5d:e2:68:80:47:ac:2d:90:f5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1cc742ea640a5613a049cda26b84d25d9263a10a
                       2c955cab41cf19ed45fbd03b2b45b2d71bc488ac
                       d2e870ae47d8d39481bab6bab0ffb93283d65fb6
                       82b7dcfc93b9e091943a3fe7b42f7cdeacf66037
                       73294b317e2bd13baa291226f548f701c2cc71f5
                       986c26d787754de02700272b6af965d9c0daca88
                       5d8850e9a651ab44873e1d8803dc1a59d830a3fc
                       3820f8a207dcbe42cc6503a8db69755ba6dbbd41
                       2f1c1b4e92aca2233a54c2374461a4d034b3608e
                       fa7b593faa640e68ff3d99e51f95f1973de5fb05
                       1410de536c44f70e2448c2286cb71f3cb10d662b
                       e8d1c970b9a3d76b7f9a59bd6d94efa19d66d695
                       29ef010b12a5f8492f0d6dcb166af04489af8bd6
                       477e899b32a9c8a499dac543369e108edf68ae55
                       ea56d1b30b191b9adcede709ba77b52d3b5ef949
                       8f9599edee0e33999587c37dbd56202425b6496c
                       5e6aadee79af01b26c671d6a3e45471e60514c44
                       6ace12ec0551f68bcb3f4da565e6abd4ae44e406
                       85f629c9ebfb1336da3aecd06ac103e5736c722c
                       a8e66540
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [86:84:f4:1e:52:52:2b:b4:ca:5d:7a:72:6d:5d:00:e6:0a:6f:32:3d]
            modulus: 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
    public exponent: 10001

] 
2021-09-02 12:59:31.340  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-02 12:59:31.343 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-02 12:59:31.347 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-09-02 12:59:31.350 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-02 12:59:31.350  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-09-02 12:59:31.351  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-02 12:59:31.352  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-02 12:59:31.353  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-02 12:59:31.354  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-02 12:59:31.363  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-02 12:59:31.365  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-02 12:59:31.365  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-02 12:59:31.368  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-02 12:59:31.513  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-02 12:59:31.514  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-02 12:59:31.514 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-02 12:59:31.516 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-02 12:59:31.517  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1970
2021-09-02 12:59:31.517  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-02 12:59:31.519  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-02 12:59:31.520  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-02 12:59:31.522  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-02 12:59:31.524  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-02 12:59:31.525 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-02 12:59:31.526 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-02 12:59:31.526 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-02 12:59:31.527 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-02 12:59:31.528 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-02 12:59:31.528 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-02 12:59:31.529 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-02 12:59:31.534 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 312191001800359088028790710625056458211655099715
             IssuerDN: UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Sep 02 10:50:20 UTC 2021
           Final Date: Tue Sep 02 10:50:19 UTC 2031
            SubjectDN: UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [04:1c:46:62:bd:39:5b:b8:42:0b:a0:5d:e2:68:80:47:ac:2d:90:f5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1cc742ea640a5613a049cda26b84d25d9263a10a
                       2c955cab41cf19ed45fbd03b2b45b2d71bc488ac
                       d2e870ae47d8d39481bab6bab0ffb93283d65fb6
                       82b7dcfc93b9e091943a3fe7b42f7cdeacf66037
                       73294b317e2bd13baa291226f548f701c2cc71f5
                       986c26d787754de02700272b6af965d9c0daca88
                       5d8850e9a651ab44873e1d8803dc1a59d830a3fc
                       3820f8a207dcbe42cc6503a8db69755ba6dbbd41
                       2f1c1b4e92aca2233a54c2374461a4d034b3608e
                       fa7b593faa640e68ff3d99e51f95f1973de5fb05
                       1410de536c44f70e2448c2286cb71f3cb10d662b
                       e8d1c970b9a3d76b7f9a59bd6d94efa19d66d695
                       29ef010b12a5f8492f0d6dcb166af04489af8bd6
                       477e899b32a9c8a499dac543369e108edf68ae55
                       ea56d1b30b191b9adcede709ba77b52d3b5ef949
                       8f9599edee0e33999587c37dbd56202425b6496c
                       5e6aadee79af01b26c671d6a3e45471e60514c44
                       6ace12ec0551f68bcb3f4da565e6abd4ae44e406
                       85f629c9ebfb1336da3aecd06ac103e5736c722c
                       a8e66540
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [15:df:06:62:67:a3:15:66:3d:e7:cc:4c:69:39:59:df:72:fa:4e:e7]
            modulus: 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
    public exponent: 10001

] 
2021-09-02 13:01:05.011  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-02 13:01:05.014 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-02 13:01:05.016 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-02 13:01:05.018 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-02 13:01:05.018  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-02 13:01:05.020  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-02 13:01:05.020  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-02 13:01:05.021  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-02 13:01:05.021  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-02 13:01:05.027  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-02 13:01:05.027  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-02 13:01:05.028  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-02 13:01:05.029  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-02 13:01:05.165  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-02 13:01:05.166  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-02 13:01:05.166 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-02 13:01:05.169 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-02 13:01:05.171  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1970
2021-09-02 13:01:05.171  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-02 13:01:05.173  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-02 13:01:05.173  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-02 13:01:05.174  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-02 13:01:05.174  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-02 13:01:05.175 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-02 13:01:05.175 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-02 13:01:05.175 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-02 13:01:05.177 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-02 13:01:05.177 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-02 13:01:05.177 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-02 13:01:05.178 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-02 13:01:05.181 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 312191001800359088028790710625056458211655099715
             IssuerDN: UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Sep 02 10:50:20 UTC 2021
           Final Date: Tue Sep 02 10:50:19 UTC 2031
            SubjectDN: UID=c-02h7hunxp1z9gvvn4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [04:1c:46:62:bd:39:5b:b8:42:0b:a0:5d:e2:68:80:47:ac:2d:90:f5]
            modulus: b29b1261d7ed531c3743d0a936fefdaabd899e2b9a990337a54574efc9dbe35efeef2565ae3939c8d9e1b6cca2898a4dd5895266c6d327013eb13860ac7c79013f9db0e89a1b5d47ddd4f85eb47cf1a39206fc38c12cdac547bb6216ed71fb9fa5843cdf6853776532be55af2222ec5f32fd9c9679f8bc9646002b0ffe860a3f8b0c2f51fb5e1be08cfd88cafc5aa00c7f9db86c9e5b5439d86cb2d79444e3ea96835d00587504abac30cfb0ca0817ed3b8da8ad8c5450334514f3e91bc99bdcd428ab7513bfec72ed27a67c4cf3e3b7e809e357ade550fe49de974d30c4a0a87ff0423e83d4ab0132750fc98b38a8710f77173c0b35a481d0a3080b6426a496f07b27e748eaded3205eaca88d7bc48ba3426d309e220b3bc9212d427d6ffcc1b8c6248b0f2432b976e224a204be67ec5ce6806fc59f6e0d145a22151c54eaab11819aa06d3caa456d04a042b7ba77520c43e251871cce14ff486417733ef887599af389293d3e41f4b0e8d0dc47a47da1c82e28cf4b877d1cdb7d9459a87233
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1cc742ea640a5613a049cda26b84d25d9263a10a
                       2c955cab41cf19ed45fbd03b2b45b2d71bc488ac
                       d2e870ae47d8d39481bab6bab0ffb93283d65fb6
                       82b7dcfc93b9e091943a3fe7b42f7cdeacf66037
                       73294b317e2bd13baa291226f548f701c2cc71f5
                       986c26d787754de02700272b6af965d9c0daca88
                       5d8850e9a651ab44873e1d8803dc1a59d830a3fc
                       3820f8a207dcbe42cc6503a8db69755ba6dbbd41
                       2f1c1b4e92aca2233a54c2374461a4d034b3608e
                       fa7b593faa640e68ff3d99e51f95f1973de5fb05
                       1410de536c44f70e2448c2286cb71f3cb10d662b
                       e8d1c970b9a3d76b7f9a59bd6d94efa19d66d695
                       29ef010b12a5f8492f0d6dcb166af04489af8bd6
                       477e899b32a9c8a499dac543369e108edf68ae55
                       ea56d1b30b191b9adcede709ba77b52d3b5ef949
                       8f9599edee0e33999587c37dbd56202425b6496c
                       5e6aadee79af01b26c671d6a3e45471e60514c44
                       6ace12ec0551f68bcb3f4da565e6abd4ae44e406
                       85f629c9ebfb1336da3aecd06ac103e5736c722c
                       a8e66540
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f2:f5:fb:13:3e:3d:76:6f:6a:06:68:20:0b:b7:4b:44:16:45:48:0c]
            modulus: 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
    public exponent: 10001

]