Results

By type

          2021-05-04 00:10:25,627 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-05-04 00:10:30,038 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-05-04 00:10:33.448  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-05-04 00:10:46.739 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-05-04 00:10:47.826  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-05-04 00:10:48.535  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-05-04 00:11:05.536  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 42.697 seconds (JVM running for 50.219)
2021-05-04 00:26:27.633  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-04 00:26:27.644 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-04 00:26:27.834 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-04 00:26:27.839 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-04 00:26:27.930  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-04 00:26:27.935  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-04 00:26:27.940  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-04 00:26:27.941  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-04 00:26:27.942  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-04 00:26:28.031  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-04 00:26:28.035  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-04 00:26:28.147  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-04 00:26:28.236  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-04 00:26:28.237  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-04 00:26:28.338  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-04 00:26:29.648  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-04 00:26:29.652  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-04 00:26:29.652 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-04 00:26:29.656 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-04 00:26:29.658  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1521
2021-05-04 00:26:29.658  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-04 00:26:29.723  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-04 00:26:29.725  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-04 00:26:29.738  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-04 00:26:29.739  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-04 00:26:29.823 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-04 00:26:29.824 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-04 00:26:29.825 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-04 00:26:29.841 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-04 00:26:29.841 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-04 00:26:29.841 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-04 00:26:29.847 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-04 00:26:30.032 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 724059619861692191845884700608555322666866250141
             IssuerDN: UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 04 00:06:25 UTC 2021
           Final Date: Sun May 04 00:06:25 UTC 2031
            SubjectDN: UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [dd:6c:ac:f3:77:a5:1c:72:43:f7:91:3b:8e:67:46:27:f3:95:34:27]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ba2f863e1dfc9a58fded19fbf806aa955c68b6c0
                       4ba555596821bb99f67a8c7af17dc21514905524
                       93dbd77ee213363a98b4068d21a49645894a41c3
                       2687646e251a4f955e664824526a71e253d49ff7
                       bb7d3bb4d529084b4cfa7d06de3b2bb7b4b3f50b
                       e02fe3b4ef64a8c2f3e4687304d6a2e994403bd0
                       010a5ab4ae9e67aa7148adcab75b60bc062fc84f
                       11991130f739ae825040e42645e3d807947f9316
                       fa2393e87f996f962c4b7ba32d8745583a473a82
                       47277c768b036bc71959b4e78764560f6eb47026
                       72268896a0c749c65cbcac0240daec78e1c05e9a
                       a9f64eeb942aa6a5badcbc77f3159d9b6f9cd856
                       1ff234d5869c4356194419753a72bb294925d5ec
                       4c9f941cfd82e0bbe7d2a62d63a7cf6e2b7405f3
                       bd9b4c8517472f79e0c7e38c0b050054f536bae0
                       191f232bbfe18d9ace0ee979b8a0c6a356c7dfed
                       4fe5dfc70ab5b500caf15b251e338c90a2d2a987
                       9851df9e77d145df01007dc6ec4a4e6069d9d587
                       90b8260cd2407638dbdfe1fdea460a5ac4cb6f32
                       33cb771a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1b:5d:fc:dc:56:e2:09:7c:99:e8:42:f6:25:99:04:22:69:1d:ee:43]
            modulus: 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
    public exponent: 10001

] 
2021-05-04 01:21:06.899  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-04 01:21:06.900 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-04 01:21:06.903 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-04 01:21:06.903 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-04 01:21:06.904  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-04 01:21:06.905  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-04 01:21:06.905  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-04 01:21:06.906  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-04 01:21:06.906  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-04 01:21:06.931  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-04 01:21:06.933  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-04 01:21:06.934  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-04 01:21:06.939  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-04 01:21:07.195  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-04 01:21:07.195  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-04 01:21:07.195 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-04 01:21:07.197 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-04 01:21:07.198  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1521
2021-05-04 01:21:07.198  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-04 01:21:07.201  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-04 01:21:07.201  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-04 01:21:07.201  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-04 01:21:07.202  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-04 01:21:07.202 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-04 01:21:07.202 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-04 01:21:07.202 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-04 01:21:07.203 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-04 01:21:07.203 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-04 01:21:07.204 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-04 01:21:07.204 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-04 01:21:07.229 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 724059619861692191845884700608555322666866250141
             IssuerDN: UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 04 00:06:25 UTC 2021
           Final Date: Sun May 04 00:06:25 UTC 2031
            SubjectDN: UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [dd:6c:ac:f3:77:a5:1c:72:43:f7:91:3b:8e:67:46:27:f3:95:34:27]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ba2f863e1dfc9a58fded19fbf806aa955c68b6c0
                       4ba555596821bb99f67a8c7af17dc21514905524
                       93dbd77ee213363a98b4068d21a49645894a41c3
                       2687646e251a4f955e664824526a71e253d49ff7
                       bb7d3bb4d529084b4cfa7d06de3b2bb7b4b3f50b
                       e02fe3b4ef64a8c2f3e4687304d6a2e994403bd0
                       010a5ab4ae9e67aa7148adcab75b60bc062fc84f
                       11991130f739ae825040e42645e3d807947f9316
                       fa2393e87f996f962c4b7ba32d8745583a473a82
                       47277c768b036bc71959b4e78764560f6eb47026
                       72268896a0c749c65cbcac0240daec78e1c05e9a
                       a9f64eeb942aa6a5badcbc77f3159d9b6f9cd856
                       1ff234d5869c4356194419753a72bb294925d5ec
                       4c9f941cfd82e0bbe7d2a62d63a7cf6e2b7405f3
                       bd9b4c8517472f79e0c7e38c0b050054f536bae0
                       191f232bbfe18d9ace0ee979b8a0c6a356c7dfed
                       4fe5dfc70ab5b500caf15b251e338c90a2d2a987
                       9851df9e77d145df01007dc6ec4a4e6069d9d587
                       90b8260cd2407638dbdfe1fdea460a5ac4cb6f32
                       33cb771a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ee:e2:b9:25:35:d9:a7:90:cb:c3:32:17:72:f5:4d:22:5b:65:41:2e]
            modulus: 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
    public exponent: 10001

] 
2021-05-04 01:21:53.354  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-04 01:21:53.356 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-04 01:21:53.358 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-04 01:21:53.359 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-04 01:21:53.361  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-04 01:21:53.362  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-04 01:21:53.362  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-04 01:21:53.363  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-04 01:21:53.364  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-04 01:21:53.429  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-04 01:21:53.430  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-04 01:21:53.431  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-04 01:21:53.433  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-04 01:21:53.623  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-04 01:21:53.625  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-04 01:21:53.626 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-04 01:21:53.631 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-04 01:21:53.632  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1521
2021-05-04 01:21:53.632  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-04 01:21:53.634  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-04 01:21:53.635  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-04 01:21:53.636  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-04 01:21:53.636  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-04 01:21:53.637 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-04 01:21:53.638 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-04 01:21:53.638 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-04 01:21:53.639 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-04 01:21:53.640 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-04 01:21:53.640 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-04 01:21:53.726 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-04 01:21:53.734 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 724059619861692191845884700608555322666866250141
             IssuerDN: UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 04 00:06:25 UTC 2021
           Final Date: Sun May 04 00:06:25 UTC 2031
            SubjectDN: UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [dd:6c:ac:f3:77:a5:1c:72:43:f7:91:3b:8e:67:46:27:f3:95:34:27]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ba2f863e1dfc9a58fded19fbf806aa955c68b6c0
                       4ba555596821bb99f67a8c7af17dc21514905524
                       93dbd77ee213363a98b4068d21a49645894a41c3
                       2687646e251a4f955e664824526a71e253d49ff7
                       bb7d3bb4d529084b4cfa7d06de3b2bb7b4b3f50b
                       e02fe3b4ef64a8c2f3e4687304d6a2e994403bd0
                       010a5ab4ae9e67aa7148adcab75b60bc062fc84f
                       11991130f739ae825040e42645e3d807947f9316
                       fa2393e87f996f962c4b7ba32d8745583a473a82
                       47277c768b036bc71959b4e78764560f6eb47026
                       72268896a0c749c65cbcac0240daec78e1c05e9a
                       a9f64eeb942aa6a5badcbc77f3159d9b6f9cd856
                       1ff234d5869c4356194419753a72bb294925d5ec
                       4c9f941cfd82e0bbe7d2a62d63a7cf6e2b7405f3
                       bd9b4c8517472f79e0c7e38c0b050054f536bae0
                       191f232bbfe18d9ace0ee979b8a0c6a356c7dfed
                       4fe5dfc70ab5b500caf15b251e338c90a2d2a987
                       9851df9e77d145df01007dc6ec4a4e6069d9d587
                       90b8260cd2407638dbdfe1fdea460a5ac4cb6f32
                       33cb771a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fe:49:92:3d:23:bd:7b:44:ed:12:57:e9:36:96:fc:1b:4f:0e:8d:79]
            modulus: a3bf8b42412c78092372590d6fa2fda0f2226eb25888f7ac03794f9d93674c43af22ebdd0f2cf6df9d12c1aff9f04444013019744bedf1023c37a5b8f4b9ec18f8a453ac713af741a95d91351a784f428ab9fd9be924fa631e52c14580ad08fa7f003b9d2c9b6d4cf52b77c14696dac5c06d175dcbb08001180f322487ad172c4f66a5fc0ecc5229c8160182c98c16ee379aceb5dba4cb0ed372792e94d391d8b148f07812467b752d62f5a6088d162993224592d02614b0cae9fb82fda6763245aff88a3efff9923b700cb5f6c3abda6d4d81ee01e3a62c17585205fe272712762526453e4f2e35e8de7d19f4ac3e088526e3501d543f3b01d067dddff2eacb
    public exponent: 10001

] 
2021-05-04 01:24:31.842  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-04 01:24:31.844 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-04 01:24:31.846 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-04 01:24:31.847 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-04 01:24:31.847  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-04 01:24:31.847  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-04 01:24:31.848  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-04 01:24:31.848  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-04 01:24:31.848  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-04 01:24:31.855  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-04 01:24:31.855  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-04 01:24:31.856  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-04 01:24:31.923  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-04 01:24:32.032  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-04 01:24:32.033  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-04 01:24:32.033 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-04 01:24:32.035 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-04 01:24:32.035  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1521
2021-05-04 01:24:32.036  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-04 01:24:32.037  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-04 01:24:32.037  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-04 01:24:32.038  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-04 01:24:32.038  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-04 01:24:32.038 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-04 01:24:32.039 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-04 01:24:32.039 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-04 01:24:32.039 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-04 01:24:32.040 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-04 01:24:32.040 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-04 01:24:32.040 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-04 01:24:32.043 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 724059619861692191845884700608555322666866250141
             IssuerDN: UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 04 00:06:25 UTC 2021
           Final Date: Sun May 04 00:06:25 UTC 2031
            SubjectDN: UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [dd:6c:ac:f3:77:a5:1c:72:43:f7:91:3b:8e:67:46:27:f3:95:34:27]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ba2f863e1dfc9a58fded19fbf806aa955c68b6c0
                       4ba555596821bb99f67a8c7af17dc21514905524
                       93dbd77ee213363a98b4068d21a49645894a41c3
                       2687646e251a4f955e664824526a71e253d49ff7
                       bb7d3bb4d529084b4cfa7d06de3b2bb7b4b3f50b
                       e02fe3b4ef64a8c2f3e4687304d6a2e994403bd0
                       010a5ab4ae9e67aa7148adcab75b60bc062fc84f
                       11991130f739ae825040e42645e3d807947f9316
                       fa2393e87f996f962c4b7ba32d8745583a473a82
                       47277c768b036bc71959b4e78764560f6eb47026
                       72268896a0c749c65cbcac0240daec78e1c05e9a
                       a9f64eeb942aa6a5badcbc77f3159d9b6f9cd856
                       1ff234d5869c4356194419753a72bb294925d5ec
                       4c9f941cfd82e0bbe7d2a62d63a7cf6e2b7405f3
                       bd9b4c8517472f79e0c7e38c0b050054f536bae0
                       191f232bbfe18d9ace0ee979b8a0c6a356c7dfed
                       4fe5dfc70ab5b500caf15b251e338c90a2d2a987
                       9851df9e77d145df01007dc6ec4a4e6069d9d587
                       90b8260cd2407638dbdfe1fdea460a5ac4cb6f32
                       33cb771a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [82:c3:c7:c4:ff:64:92:f6:e5:91:76:00:b7:36:80:44:51:e4:bc:75]
            modulus: 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
    public exponent: 10001

] 
2021-05-04 01:25:44.053  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-04 01:25:44.054 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-04 01:25:44.055 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-04 01:25:44.056 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-04 01:25:44.056  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-04 01:25:44.057  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-04 01:25:44.058  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-04 01:25:44.058  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-04 01:25:44.058  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-04 01:25:44.127  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-04 01:25:44.129  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-04 01:25:44.130  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-04 01:25:44.133  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-04 01:25:44.325  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-04 01:25:44.326  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-04 01:25:44.326 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-04 01:25:44.328 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-04 01:25:44.328  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1521
2021-05-04 01:25:44.329  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-04 01:25:44.330  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-04 01:25:44.330  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-04 01:25:44.331  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-04 01:25:44.331  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-04 01:25:44.331 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-04 01:25:44.331 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-04 01:25:44.331 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-04 01:25:44.332 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-04 01:25:44.332 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-04 01:25:44.332 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-04 01:25:44.333 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-04 01:25:44.335 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 724059619861692191845884700608555322666866250141
             IssuerDN: UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 04 00:06:25 UTC 2021
           Final Date: Sun May 04 00:06:25 UTC 2031
            SubjectDN: UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [dd:6c:ac:f3:77:a5:1c:72:43:f7:91:3b:8e:67:46:27:f3:95:34:27]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ba2f863e1dfc9a58fded19fbf806aa955c68b6c0
                       4ba555596821bb99f67a8c7af17dc21514905524
                       93dbd77ee213363a98b4068d21a49645894a41c3
                       2687646e251a4f955e664824526a71e253d49ff7
                       bb7d3bb4d529084b4cfa7d06de3b2bb7b4b3f50b
                       e02fe3b4ef64a8c2f3e4687304d6a2e994403bd0
                       010a5ab4ae9e67aa7148adcab75b60bc062fc84f
                       11991130f739ae825040e42645e3d807947f9316
                       fa2393e87f996f962c4b7ba32d8745583a473a82
                       47277c768b036bc71959b4e78764560f6eb47026
                       72268896a0c749c65cbcac0240daec78e1c05e9a
                       a9f64eeb942aa6a5badcbc77f3159d9b6f9cd856
                       1ff234d5869c4356194419753a72bb294925d5ec
                       4c9f941cfd82e0bbe7d2a62d63a7cf6e2b7405f3
                       bd9b4c8517472f79e0c7e38c0b050054f536bae0
                       191f232bbfe18d9ace0ee979b8a0c6a356c7dfed
                       4fe5dfc70ab5b500caf15b251e338c90a2d2a987
                       9851df9e77d145df01007dc6ec4a4e6069d9d587
                       90b8260cd2407638dbdfe1fdea460a5ac4cb6f32
                       33cb771a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [16:82:ba:0d:3a:60:40:71:6e:51:b4:06:e9:88:98:20:e8:5c:70:67]
            modulus: 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
    public exponent: 10001

] 
2021-05-04 01:26:40.001  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-04 01:26:40.002 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-04 01:26:40.004 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-04 01:26:40.004 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-04 01:26:40.005  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-04 01:26:40.006  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-04 01:26:40.006  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-04 01:26:40.006  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-04 01:26:40.007  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-04 01:26:40.011  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-04 01:26:40.012  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-04 01:26:40.012  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-04 01:26:40.013  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-04 01:26:40.135  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-04 01:26:40.136  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-04 01:26:40.136 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-04 01:26:40.137 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-04 01:26:40.137  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1521
2021-05-04 01:26:40.138  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-04 01:26:40.139  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-04 01:26:40.139  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-04 01:26:40.140  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-04 01:26:40.140  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-04 01:26:40.140 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-04 01:26:40.140 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-04 01:26:40.140 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-04 01:26:40.141 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-04 01:26:40.142 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-04 01:26:40.142 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-04 01:26:40.143 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-04 01:26:40.145 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 724059619861692191845884700608555322666866250141
             IssuerDN: UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 04 00:06:25 UTC 2021
           Final Date: Sun May 04 00:06:25 UTC 2031
            SubjectDN: UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [dd:6c:ac:f3:77:a5:1c:72:43:f7:91:3b:8e:67:46:27:f3:95:34:27]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ba2f863e1dfc9a58fded19fbf806aa955c68b6c0
                       4ba555596821bb99f67a8c7af17dc21514905524
                       93dbd77ee213363a98b4068d21a49645894a41c3
                       2687646e251a4f955e664824526a71e253d49ff7
                       bb7d3bb4d529084b4cfa7d06de3b2bb7b4b3f50b
                       e02fe3b4ef64a8c2f3e4687304d6a2e994403bd0
                       010a5ab4ae9e67aa7148adcab75b60bc062fc84f
                       11991130f739ae825040e42645e3d807947f9316
                       fa2393e87f996f962c4b7ba32d8745583a473a82
                       47277c768b036bc71959b4e78764560f6eb47026
                       72268896a0c749c65cbcac0240daec78e1c05e9a
                       a9f64eeb942aa6a5badcbc77f3159d9b6f9cd856
                       1ff234d5869c4356194419753a72bb294925d5ec
                       4c9f941cfd82e0bbe7d2a62d63a7cf6e2b7405f3
                       bd9b4c8517472f79e0c7e38c0b050054f536bae0
                       191f232bbfe18d9ace0ee979b8a0c6a356c7dfed
                       4fe5dfc70ab5b500caf15b251e338c90a2d2a987
                       9851df9e77d145df01007dc6ec4a4e6069d9d587
                       90b8260cd2407638dbdfe1fdea460a5ac4cb6f32
                       33cb771a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fc:56:0b:8c:8b:22:91:07:ca:ba:1d:6d:bc:7d:46:b4:5b:14:fc:89]
            modulus: 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
    public exponent: 10001

] 
2021-05-04 01:27:00.740  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-04 01:27:00.741 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-04 01:27:00.743 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-04 01:27:00.743 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-04 01:27:00.744  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-04 01:27:00.745  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-04 01:27:00.745  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-04 01:27:00.746  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-04 01:27:00.746  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-04 01:27:00.751  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-04 01:27:00.751  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-04 01:27:00.751  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-04 01:27:00.752  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-04 01:27:00.973  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-04 01:27:00.974  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-04 01:27:00.974 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-04 01:27:00.975 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-04 01:27:00.976  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1521
2021-05-04 01:27:00.976  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-04 01:27:00.977  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-04 01:27:00.977  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-04 01:27:00.977  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-04 01:27:00.978  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-04 01:27:00.978 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-04 01:27:00.978 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-04 01:27:00.978 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-04 01:27:00.979 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-04 01:27:00.979 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-04 01:27:00.979 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-04 01:27:00.980 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-04 01:27:00.982 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 724059619861692191845884700608555322666866250141
             IssuerDN: UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 04 00:06:25 UTC 2021
           Final Date: Sun May 04 00:06:25 UTC 2031
            SubjectDN: UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [dd:6c:ac:f3:77:a5:1c:72:43:f7:91:3b:8e:67:46:27:f3:95:34:27]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ba2f863e1dfc9a58fded19fbf806aa955c68b6c0
                       4ba555596821bb99f67a8c7af17dc21514905524
                       93dbd77ee213363a98b4068d21a49645894a41c3
                       2687646e251a4f955e664824526a71e253d49ff7
                       bb7d3bb4d529084b4cfa7d06de3b2bb7b4b3f50b
                       e02fe3b4ef64a8c2f3e4687304d6a2e994403bd0
                       010a5ab4ae9e67aa7148adcab75b60bc062fc84f
                       11991130f739ae825040e42645e3d807947f9316
                       fa2393e87f996f962c4b7ba32d8745583a473a82
                       47277c768b036bc71959b4e78764560f6eb47026
                       72268896a0c749c65cbcac0240daec78e1c05e9a
                       a9f64eeb942aa6a5badcbc77f3159d9b6f9cd856
                       1ff234d5869c4356194419753a72bb294925d5ec
                       4c9f941cfd82e0bbe7d2a62d63a7cf6e2b7405f3
                       bd9b4c8517472f79e0c7e38c0b050054f536bae0
                       191f232bbfe18d9ace0ee979b8a0c6a356c7dfed
                       4fe5dfc70ab5b500caf15b251e338c90a2d2a987
                       9851df9e77d145df01007dc6ec4a4e6069d9d587
                       90b8260cd2407638dbdfe1fdea460a5ac4cb6f32
                       33cb771a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [67:67:76:54:49:fd:c4:92:37:e9:f6:83:50:13:95:08:07:e8:c5:80]
            modulus: 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
    public exponent: 10001

] 
2021-05-04 01:27:10.066  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-04 01:27:10.068 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-04 01:27:10.069 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-04 01:27:10.070 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-04 01:27:10.070  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-04 01:27:10.071  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-04 01:27:10.071  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-04 01:27:10.071  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-04 01:27:10.072  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-04 01:27:10.076  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-04 01:27:10.076  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-04 01:27:10.076  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-04 01:27:10.078  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-04 01:27:10.194  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-04 01:27:10.195  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-04 01:27:10.196 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-04 01:27:10.198 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-04 01:27:10.199  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1521
2021-05-04 01:27:10.223  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-04 01:27:10.227  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-04 01:27:10.229  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-04 01:27:10.229  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-04 01:27:10.230  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-04 01:27:10.230 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-04 01:27:10.231 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-04 01:27:10.231 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-04 01:27:10.232 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-04 01:27:10.232 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-04 01:27:10.232 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-04 01:27:10.233 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-04 01:27:10.236 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 724059619861692191845884700608555322666866250141
             IssuerDN: UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 04 00:06:25 UTC 2021
           Final Date: Sun May 04 00:06:25 UTC 2031
            SubjectDN: UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [dd:6c:ac:f3:77:a5:1c:72:43:f7:91:3b:8e:67:46:27:f3:95:34:27]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ba2f863e1dfc9a58fded19fbf806aa955c68b6c0
                       4ba555596821bb99f67a8c7af17dc21514905524
                       93dbd77ee213363a98b4068d21a49645894a41c3
                       2687646e251a4f955e664824526a71e253d49ff7
                       bb7d3bb4d529084b4cfa7d06de3b2bb7b4b3f50b
                       e02fe3b4ef64a8c2f3e4687304d6a2e994403bd0
                       010a5ab4ae9e67aa7148adcab75b60bc062fc84f
                       11991130f739ae825040e42645e3d807947f9316
                       fa2393e87f996f962c4b7ba32d8745583a473a82
                       47277c768b036bc71959b4e78764560f6eb47026
                       72268896a0c749c65cbcac0240daec78e1c05e9a
                       a9f64eeb942aa6a5badcbc77f3159d9b6f9cd856
                       1ff234d5869c4356194419753a72bb294925d5ec
                       4c9f941cfd82e0bbe7d2a62d63a7cf6e2b7405f3
                       bd9b4c8517472f79e0c7e38c0b050054f536bae0
                       191f232bbfe18d9ace0ee979b8a0c6a356c7dfed
                       4fe5dfc70ab5b500caf15b251e338c90a2d2a987
                       9851df9e77d145df01007dc6ec4a4e6069d9d587
                       90b8260cd2407638dbdfe1fdea460a5ac4cb6f32
                       33cb771a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [df:81:e8:ae:9e:7b:f0:d1:90:87:0c:f9:85:40:6d:af:00:ae:7b:bd]
            modulus: 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
    public exponent: 10001

] 
2021-05-04 01:28:34.143  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-04 01:28:34.144 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-04 01:28:34.145 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-04 01:28:34.145 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-04 01:28:34.146  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-04 01:28:34.146  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-04 01:28:34.146  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-04 01:28:34.147  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-04 01:28:34.147  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-04 01:28:34.226  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-04 01:28:34.227  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-04 01:28:34.227  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-04 01:28:34.229  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-04 01:28:34.327  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-04 01:28:34.328  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-04 01:28:34.328 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-04 01:28:34.330 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-04 01:28:34.330  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1521
2021-05-04 01:28:34.331  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-04 01:28:34.332  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-04 01:28:34.333  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-04 01:28:34.333  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-04 01:28:34.333  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-04 01:28:34.334 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-04 01:28:34.334 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-04 01:28:34.334 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-04 01:28:34.335 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-04 01:28:34.335 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-04 01:28:34.335 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-04 01:28:34.336 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-04 01:28:34.339 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 724059619861692191845884700608555322666866250141
             IssuerDN: UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 04 00:06:25 UTC 2021
           Final Date: Sun May 04 00:06:25 UTC 2031
            SubjectDN: UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [dd:6c:ac:f3:77:a5:1c:72:43:f7:91:3b:8e:67:46:27:f3:95:34:27]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ba2f863e1dfc9a58fded19fbf806aa955c68b6c0
                       4ba555596821bb99f67a8c7af17dc21514905524
                       93dbd77ee213363a98b4068d21a49645894a41c3
                       2687646e251a4f955e664824526a71e253d49ff7
                       bb7d3bb4d529084b4cfa7d06de3b2bb7b4b3f50b
                       e02fe3b4ef64a8c2f3e4687304d6a2e994403bd0
                       010a5ab4ae9e67aa7148adcab75b60bc062fc84f
                       11991130f739ae825040e42645e3d807947f9316
                       fa2393e87f996f962c4b7ba32d8745583a473a82
                       47277c768b036bc71959b4e78764560f6eb47026
                       72268896a0c749c65cbcac0240daec78e1c05e9a
                       a9f64eeb942aa6a5badcbc77f3159d9b6f9cd856
                       1ff234d5869c4356194419753a72bb294925d5ec
                       4c9f941cfd82e0bbe7d2a62d63a7cf6e2b7405f3
                       bd9b4c8517472f79e0c7e38c0b050054f536bae0
                       191f232bbfe18d9ace0ee979b8a0c6a356c7dfed
                       4fe5dfc70ab5b500caf15b251e338c90a2d2a987
                       9851df9e77d145df01007dc6ec4a4e6069d9d587
                       90b8260cd2407638dbdfe1fdea460a5ac4cb6f32
                       33cb771a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ff:a3:e8:4b:c0:fd:7d:80:96:a4:06:4a:0a:de:61:31:d8:d4:82:70]
            modulus: 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
    public exponent: 10001

] 
2021-05-04 01:29:53.965  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-04 01:29:53.966 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-04 01:29:53.967 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-04 01:29:53.967 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-04 01:29:53.968  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-04 01:29:53.968  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-04 01:29:53.968  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-04 01:29:53.968  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-04 01:29:53.969  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-04 01:29:53.972  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-04 01:29:53.972  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-04 01:29:53.973  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-04 01:29:53.974  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-04 01:29:54.071  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-04 01:29:54.071  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-04 01:29:54.071 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-04 01:29:54.072 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-04 01:29:54.073  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1521
2021-05-04 01:29:54.073  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-04 01:29:54.124  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-04 01:29:54.126  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-04 01:29:54.126  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-04 01:29:54.127  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-04 01:29:54.127 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-04 01:29:54.127 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-04 01:29:54.128 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-04 01:29:54.128 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-04 01:29:54.129 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-04 01:29:54.129 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-04 01:29:54.130 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-04 01:29:54.134 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 724059619861692191845884700608555322666866250141
             IssuerDN: UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 04 00:06:25 UTC 2021
           Final Date: Sun May 04 00:06:25 UTC 2031
            SubjectDN: UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [dd:6c:ac:f3:77:a5:1c:72:43:f7:91:3b:8e:67:46:27:f3:95:34:27]
            modulus: c500c33e61c9972c3ef5c952ff141356f008b83698c2b2d52c419187056a92be42d9e1248ea00652f49f00e3ebd71e815124a1a82ef081d7c283711b51c772e1d0ad9883ed0dd78bb728148f82574550537473b457e47aa55c6aafd75d50f18b5c387c4a4cf880bd8969a17ec6f17e5dfa24aa7342be0452a149e9299f566e4585dff93fe5fe0ca5eee59d8b4475e845e1b7fec65a7f53e042a0d8da7317ec74d3ef1e3c0f9e05bca593e23a8d2bf948a4df97738579b2541026e97979687bd8c5bc904257dbe4cd1ba6232f5bd07fdec375ab946dee352ae4f4891397fda5a025afb073396f496699f6809c0cfe11c2325cd9e539b7c716dad13155417ee9531595246a3ce220c4876da33871f5fc6e08dda2ee3877d9d48deaf953f823eb79d01d77b33a796bc1dee6ed9bda8295f6be8500cf1ae933e7872a99cf00b1c062cdf2c312730b0a9d07325e3bedf1effb9645e8c48373275862c58a1f5adc801750d50ebf80733203191c6c6a51b1fae8ccfe0e4fdd5614c2c38cc63aa47ab01d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ba2f863e1dfc9a58fded19fbf806aa955c68b6c0
                       4ba555596821bb99f67a8c7af17dc21514905524
                       93dbd77ee213363a98b4068d21a49645894a41c3
                       2687646e251a4f955e664824526a71e253d49ff7
                       bb7d3bb4d529084b4cfa7d06de3b2bb7b4b3f50b
                       e02fe3b4ef64a8c2f3e4687304d6a2e994403bd0
                       010a5ab4ae9e67aa7148adcab75b60bc062fc84f
                       11991130f739ae825040e42645e3d807947f9316
                       fa2393e87f996f962c4b7ba32d8745583a473a82
                       47277c768b036bc71959b4e78764560f6eb47026
                       72268896a0c749c65cbcac0240daec78e1c05e9a
                       a9f64eeb942aa6a5badcbc77f3159d9b6f9cd856
                       1ff234d5869c4356194419753a72bb294925d5ec
                       4c9f941cfd82e0bbe7d2a62d63a7cf6e2b7405f3
                       bd9b4c8517472f79e0c7e38c0b050054f536bae0
                       191f232bbfe18d9ace0ee979b8a0c6a356c7dfed
                       4fe5dfc70ab5b500caf15b251e338c90a2d2a987
                       9851df9e77d145df01007dc6ec4a4e6069d9d587
                       90b8260cd2407638dbdfe1fdea460a5ac4cb6f32
                       33cb771a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [37:72:7f:c9:4f:86:e2:da:be:08:36:78:c2:58:80:6b:e2:cd:31:e7]
            modulus: d1b1410901c4df5c0889e75aa14cae7bf7121dbb59ba237198c42224db2aba9597871c7f9c901dba2248819c82133f1bc6ba1befd7019d3df47317fc6d431f1bb8b08efd55dd63d1d499736c65be2bc9f0e793b489dd16fa09881033d5bc7b170a7fe33425a5639e5a8bc3e17747feab6bdae2a19b17c8427ecb89527c25ab29af82245711a5edca172cf91bb89d0c8cf78f3f2c8e92cdc892f43b790d9e2db83c94e8d7ff40fbe9477fd5e274ed135eae68390a11f6fcf107a8dad35d38ca89bf552f956dd35d8a59823810aa998842f84af393b263fe0e267c769dab4e07644c84b604c73d1e7a2e95eccc2f1e2cd7ce21193fbbbf62711ee5476611a33afd
    public exponent: 10001

] 
2021-05-04 01:32:16.436  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-04 01:32:16.437 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-04 01:32:16.439 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-04 01:32:16.439 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-04 01:32:16.439  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-04 01:32:16.440  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-04 01:32:16.440  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-04 01:32:16.440  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-04 01:32:16.440  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-04 01:32:16.444  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-04 01:32:16.444  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-04 01:32:16.444  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-04 01:32:16.445  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-04 01:32:16.533  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-04 01:32:16.533  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-04 01:32:16.534 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-04 01:32:16.536 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-04 01:32:16.537  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1521
2021-05-04 01:32:16.537  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-04 01:32:16.539  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-04 01:32:16.540  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-04 01:32:16.540  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-04 01:32:16.540  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-04 01:32:16.541 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-04 01:32:16.541 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-04 01:32:16.542 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-04 01:32:16.543 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-04 01:32:16.543 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-04 01:32:16.543 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-04 01:32:16.544 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-04 01:32:16.546 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 724059619861692191845884700608555322666866250141
             IssuerDN: UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 04 00:06:25 UTC 2021
           Final Date: Sun May 04 00:06:25 UTC 2031
            SubjectDN: UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [dd:6c:ac:f3:77:a5:1c:72:43:f7:91:3b:8e:67:46:27:f3:95:34:27]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ba2f863e1dfc9a58fded19fbf806aa955c68b6c0
                       4ba555596821bb99f67a8c7af17dc21514905524
                       93dbd77ee213363a98b4068d21a49645894a41c3
                       2687646e251a4f955e664824526a71e253d49ff7
                       bb7d3bb4d529084b4cfa7d06de3b2bb7b4b3f50b
                       e02fe3b4ef64a8c2f3e4687304d6a2e994403bd0
                       010a5ab4ae9e67aa7148adcab75b60bc062fc84f
                       11991130f739ae825040e42645e3d807947f9316
                       fa2393e87f996f962c4b7ba32d8745583a473a82
                       47277c768b036bc71959b4e78764560f6eb47026
                       72268896a0c749c65cbcac0240daec78e1c05e9a
                       a9f64eeb942aa6a5badcbc77f3159d9b6f9cd856
                       1ff234d5869c4356194419753a72bb294925d5ec
                       4c9f941cfd82e0bbe7d2a62d63a7cf6e2b7405f3
                       bd9b4c8517472f79e0c7e38c0b050054f536bae0
                       191f232bbfe18d9ace0ee979b8a0c6a356c7dfed
                       4fe5dfc70ab5b500caf15b251e338c90a2d2a987
                       9851df9e77d145df01007dc6ec4a4e6069d9d587
                       90b8260cd2407638dbdfe1fdea460a5ac4cb6f32
                       33cb771a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5a:cc:cf:14:51:00:b0:35:5d:e0:a7:60:03:46:26:82:39:d1:28:e8]
            modulus: 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
    public exponent: 10001

] 
2021-05-04 01:33:58.650  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-04 01:33:58.652 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-04 01:33:58.653 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-04 01:33:58.654 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-04 01:33:58.654  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-04 01:33:58.655  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-04 01:33:58.655  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-04 01:33:58.655  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-04 01:33:58.656  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-04 01:33:58.661  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-04 01:33:58.662  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-04 01:33:58.662  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-04 01:33:58.664  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-04 01:33:58.823  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-04 01:33:58.824  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-04 01:33:58.824 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-04 01:33:58.826 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-04 01:33:58.827  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1521
2021-05-04 01:33:58.827  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-04 01:33:58.828  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-04 01:33:58.829  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-04 01:33:58.829  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-04 01:33:58.829  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-04 01:33:58.829 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-04 01:33:58.830 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-04 01:33:58.830 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-04 01:33:58.830 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-04 01:33:58.831 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-04 01:33:58.831 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-04 01:33:58.832 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-04 01:33:58.835 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 724059619861692191845884700608555322666866250141
             IssuerDN: UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 04 00:06:25 UTC 2021
           Final Date: Sun May 04 00:06:25 UTC 2031
            SubjectDN: UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [dd:6c:ac:f3:77:a5:1c:72:43:f7:91:3b:8e:67:46:27:f3:95:34:27]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ba2f863e1dfc9a58fded19fbf806aa955c68b6c0
                       4ba555596821bb99f67a8c7af17dc21514905524
                       93dbd77ee213363a98b4068d21a49645894a41c3
                       2687646e251a4f955e664824526a71e253d49ff7
                       bb7d3bb4d529084b4cfa7d06de3b2bb7b4b3f50b
                       e02fe3b4ef64a8c2f3e4687304d6a2e994403bd0
                       010a5ab4ae9e67aa7148adcab75b60bc062fc84f
                       11991130f739ae825040e42645e3d807947f9316
                       fa2393e87f996f962c4b7ba32d8745583a473a82
                       47277c768b036bc71959b4e78764560f6eb47026
                       72268896a0c749c65cbcac0240daec78e1c05e9a
                       a9f64eeb942aa6a5badcbc77f3159d9b6f9cd856
                       1ff234d5869c4356194419753a72bb294925d5ec
                       4c9f941cfd82e0bbe7d2a62d63a7cf6e2b7405f3
                       bd9b4c8517472f79e0c7e38c0b050054f536bae0
                       191f232bbfe18d9ace0ee979b8a0c6a356c7dfed
                       4fe5dfc70ab5b500caf15b251e338c90a2d2a987
                       9851df9e77d145df01007dc6ec4a4e6069d9d587
                       90b8260cd2407638dbdfe1fdea460a5ac4cb6f32
                       33cb771a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [44:dc:64:1c:fb:a2:43:81:67:21:ec:6c:ec:86:6a:cf:a5:b8:6d:d9]
            modulus: 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
    public exponent: 10001

] 
2021-05-04 01:35:21.445  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-04 01:35:21.446 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-04 01:35:21.448 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-04 01:35:21.448 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-04 01:35:21.449  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-04 01:35:21.450  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-04 01:35:21.450  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-04 01:35:21.450  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-04 01:35:21.451  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-04 01:35:21.456  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-04 01:35:21.456  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-04 01:35:21.457  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-04 01:35:21.524  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-04 01:35:21.644  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-04 01:35:21.645  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-04 01:35:21.645 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-04 01:35:21.647 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-04 01:35:21.648  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1521
2021-05-04 01:35:21.648  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-04 01:35:21.651  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-04 01:35:21.651  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-04 01:35:21.652  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-04 01:35:21.652  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-04 01:35:21.652 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-04 01:35:21.653 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-04 01:35:21.653 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-04 01:35:21.654 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-04 01:35:21.654 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-04 01:35:21.654 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-04 01:35:21.655 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-04 01:35:21.658 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 724059619861692191845884700608555322666866250141
             IssuerDN: UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 04 00:06:25 UTC 2021
           Final Date: Sun May 04 00:06:25 UTC 2031
            SubjectDN: UID=c-0aa1979c9297a3085,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [dd:6c:ac:f3:77:a5:1c:72:43:f7:91:3b:8e:67:46:27:f3:95:34:27]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ba2f863e1dfc9a58fded19fbf806aa955c68b6c0
                       4ba555596821bb99f67a8c7af17dc21514905524
                       93dbd77ee213363a98b4068d21a49645894a41c3
                       2687646e251a4f955e664824526a71e253d49ff7
                       bb7d3bb4d529084b4cfa7d06de3b2bb7b4b3f50b
                       e02fe3b4ef64a8c2f3e4687304d6a2e994403bd0
                       010a5ab4ae9e67aa7148adcab75b60bc062fc84f
                       11991130f739ae825040e42645e3d807947f9316
                       fa2393e87f996f962c4b7ba32d8745583a473a82
                       47277c768b036bc71959b4e78764560f6eb47026
                       72268896a0c749c65cbcac0240daec78e1c05e9a
                       a9f64eeb942aa6a5badcbc77f3159d9b6f9cd856
                       1ff234d5869c4356194419753a72bb294925d5ec
                       4c9f941cfd82e0bbe7d2a62d63a7cf6e2b7405f3
                       bd9b4c8517472f79e0c7e38c0b050054f536bae0
                       191f232bbfe18d9ace0ee979b8a0c6a356c7dfed
                       4fe5dfc70ab5b500caf15b251e338c90a2d2a987
                       9851df9e77d145df01007dc6ec4a4e6069d9d587
                       90b8260cd2407638dbdfe1fdea460a5ac4cb6f32
                       33cb771a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [67:ef:35:2f:aa:5b:e0:cc:90:91:ce:93:3f:73:fc:1c:fd:42:29:08]
            modulus: 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
    public exponent: 10001

]