Results

By type

          2021-05-05 00:09:22,159 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-05-05 00:09:26,361 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-05-05 00:09:29.555  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-05-05 00:09:42.151 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-05-05 00:09:43.269  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-05-05 00:09:44.157  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-05-05 00:09:59.060  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 39.192 seconds (JVM running for 46.532)
2021-05-05 00:21:23.856  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 00:21:23.863 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 00:21:23.980 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-05 00:21:24.051 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 00:21:24.148  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-05 00:21:24.152  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 00:21:24.157  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 00:21:24.157  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 00:21:24.158  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 00:21:24.164  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 00:21:24.252  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 00:21:24.366  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 00:21:24.374  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 00:21:24.375  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 00:21:24.464  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 00:21:25.710  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 00:21:25.713  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 00:21:25.713 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 00:21:25.719 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 00:21:25.721  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1419
2021-05-05 00:21:25.721  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 00:21:25.750  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 00:21:25.751  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 00:21:25.759  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 00:21:25.760  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 00:21:25.761 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 00:21:25.761 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 00:21:25.762 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 00:21:25.857 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 00:21:25.858 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 00:21:25.858 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 00:21:25.865 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 00:21:26.052 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 629971667146810500156800016132879947367766657417
             IssuerDN: UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 00:04:38 UTC 2021
           Final Date: Mon May 05 00:04:38 UTC 2031
            SubjectDN: UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:6b:dd:b4:31:3f:89:ab:9e:4b:02:db:8e:ec:5e:7e:05:ee:96:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9a52d2429e37a77ec44d5c5b7ed322d6befe2310
                       9defe7e548f545585a5af300b4f7771f0a47fe95
                       9d3549c51fe83d1bba248b3b40fc9c7363655079
                       e38d946ba4a3bf72cc8878e4bf7c0ded522ee31a
                       15bc4add888ad61991f6be0e65679d3dd3ea2e51
                       0ee945572bc0f3307b82ea3c6c1bf6deb5362fbc
                       be96e7f5c663cfae9d373e42a9a651abf2d91e16
                       f6afeb9542aa86b48bf1976abea1c2954c45a6b4
                       3484fb33818fb9dc088ac85f7dea665e01b8a55f
                       5992c7ff933d5d959821d66926649387731e49e8
                       c77232396503fb94460829ead6c87a04526bf604
                       f0253bfba8006ffc5f67ad45195565f37c726e00
                       117b2e0bd905d4c820634a635bd8c33c9665b178
                       1fd3f8666682467b83924f2895a9dd093512c047
                       4c19e3e630cbe95c7adbdb8e926ebf493ecb6460
                       b7f0fac55ab810bca725d89ea91426c76d1ca0f4
                       d7cb4375d03f4a2d6b22c135477e46d8d6d65ef6
                       5a2f97328566a0f29b29f219556927d02bd33d4b
                       c44097e33bbc2346624b2463b8900195597e7b18
                       e981dc49
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2c:8c:49:85:ec:9c:1b:26:8c:cf:4f:07:bc:66:1d:44:7a:46:70:34]
            modulus: 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
    public exponent: 10001

] 
2021-05-05 01:18:25.870  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 01:18:25.871 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 01:18:25.874 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-05 01:18:25.874 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 01:18:25.875  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-05 01:18:25.876  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 01:18:25.949  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 01:18:25.950  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 01:18:25.951  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 01:18:25.963  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 01:18:25.964  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 01:18:25.964  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 01:18:25.966  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 01:18:26.215  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 01:18:26.215  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 01:18:26.216 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 01:18:26.219 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 01:18:26.219  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1419
2021-05-05 01:18:26.220  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 01:18:26.223  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 01:18:26.223  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 01:18:26.224  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 01:18:26.224  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 01:18:26.225 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 01:18:26.225 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 01:18:26.225 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 01:18:26.249 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 01:18:26.250 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 01:18:26.250 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 01:18:26.252 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 01:18:26.257 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 629971667146810500156800016132879947367766657417
             IssuerDN: UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 00:04:38 UTC 2021
           Final Date: Mon May 05 00:04:38 UTC 2031
            SubjectDN: UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:6b:dd:b4:31:3f:89:ab:9e:4b:02:db:8e:ec:5e:7e:05:ee:96:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9a52d2429e37a77ec44d5c5b7ed322d6befe2310
                       9defe7e548f545585a5af300b4f7771f0a47fe95
                       9d3549c51fe83d1bba248b3b40fc9c7363655079
                       e38d946ba4a3bf72cc8878e4bf7c0ded522ee31a
                       15bc4add888ad61991f6be0e65679d3dd3ea2e51
                       0ee945572bc0f3307b82ea3c6c1bf6deb5362fbc
                       be96e7f5c663cfae9d373e42a9a651abf2d91e16
                       f6afeb9542aa86b48bf1976abea1c2954c45a6b4
                       3484fb33818fb9dc088ac85f7dea665e01b8a55f
                       5992c7ff933d5d959821d66926649387731e49e8
                       c77232396503fb94460829ead6c87a04526bf604
                       f0253bfba8006ffc5f67ad45195565f37c726e00
                       117b2e0bd905d4c820634a635bd8c33c9665b178
                       1fd3f8666682467b83924f2895a9dd093512c047
                       4c19e3e630cbe95c7adbdb8e926ebf493ecb6460
                       b7f0fac55ab810bca725d89ea91426c76d1ca0f4
                       d7cb4375d03f4a2d6b22c135477e46d8d6d65ef6
                       5a2f97328566a0f29b29f219556927d02bd33d4b
                       c44097e33bbc2346624b2463b8900195597e7b18
                       e981dc49
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [53:0b:e2:bd:56:bd:56:90:68:49:fe:ab:fc:c9:d3:55:de:5d:3b:fb]
            modulus: 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
    public exponent: 10001

] 
2021-05-05 01:19:19.599  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 01:19:19.602 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 01:19:19.603 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-05 01:19:19.604 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 01:19:19.605  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-05 01:19:19.606  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 01:19:19.606  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 01:19:19.607  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 01:19:19.608  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 01:19:19.613  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 01:19:19.614  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 01:19:19.614  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 01:19:19.616  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 01:19:19.750  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 01:19:19.751  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 01:19:19.752 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 01:19:19.755 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 01:19:19.756  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1419
2021-05-05 01:19:19.757  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 01:19:19.760  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 01:19:19.760  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 01:19:19.761  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 01:19:19.761  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 01:19:19.762 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 01:19:19.762 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 01:19:19.763 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 01:19:19.764 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 01:19:19.764 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 01:19:19.765 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 01:19:19.766 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 01:19:19.769 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 629971667146810500156800016132879947367766657417
             IssuerDN: UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 00:04:38 UTC 2021
           Final Date: Mon May 05 00:04:38 UTC 2031
            SubjectDN: UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:6b:dd:b4:31:3f:89:ab:9e:4b:02:db:8e:ec:5e:7e:05:ee:96:e0]
            modulus: b1765159594d380c38a20eb06aa3c65acdb84b385e29cbf7555b7af6f9308727875fec7ebf42b0d1980e94e30618ebc07e4896c448dffaa5424a8633cecf1c5b1209354d8dc97e4fe2f9e5a6fbdfdf4b6972686e0d7b078e41c861952d8d9c6a92a96664902435e2d76b509f6cb22f53a4eef17609ab78ef4553a1db0f6b8df2bf9cc625a51d56debdbcc7176e6e236fe2a31e67b213deb6976fffc16b91bf5585effa75cd81dd8ffb2f4d4354c63926680ea21efe857a6af8d84fc60db1a31d58a5d3bae42c57adcb0d1d81058e89eedece20c829995776bc588d1d84ec7a32214cb75c940b05ad2eb2b85b178408f1f5790ede3b4eb74587e2ccc88bd3d90f73e74077b60af3874e98bce07dfe3ea73048ed72c90612f13d7a75e82f30c1976c2124d5b682cd3f8d25c69e135f1fc2e5ce4a5675be3a7cd9f8fd0f66a27a2ab672e0fefbf8ed89c23d42f1c8d3924bd6686b27c3e50fd7778e2cc1c5c569481aa05782dc3805b713fcb80e92db1b987d45a8c44155e17d6d39a4d0b6b6e175
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9a52d2429e37a77ec44d5c5b7ed322d6befe2310
                       9defe7e548f545585a5af300b4f7771f0a47fe95
                       9d3549c51fe83d1bba248b3b40fc9c7363655079
                       e38d946ba4a3bf72cc8878e4bf7c0ded522ee31a
                       15bc4add888ad61991f6be0e65679d3dd3ea2e51
                       0ee945572bc0f3307b82ea3c6c1bf6deb5362fbc
                       be96e7f5c663cfae9d373e42a9a651abf2d91e16
                       f6afeb9542aa86b48bf1976abea1c2954c45a6b4
                       3484fb33818fb9dc088ac85f7dea665e01b8a55f
                       5992c7ff933d5d959821d66926649387731e49e8
                       c77232396503fb94460829ead6c87a04526bf604
                       f0253bfba8006ffc5f67ad45195565f37c726e00
                       117b2e0bd905d4c820634a635bd8c33c9665b178
                       1fd3f8666682467b83924f2895a9dd093512c047
                       4c19e3e630cbe95c7adbdb8e926ebf493ecb6460
                       b7f0fac55ab810bca725d89ea91426c76d1ca0f4
                       d7cb4375d03f4a2d6b22c135477e46d8d6d65ef6
                       5a2f97328566a0f29b29f219556927d02bd33d4b
                       c44097e33bbc2346624b2463b8900195597e7b18
                       e981dc49
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9c:aa:db:77:ca:be:12:fc:67:fb:55:5b:cb:e0:c5:3e:72:81:d2:a3]
            modulus: 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
    public exponent: 10001

] 
2021-05-05 01:21:40.140  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 01:21:40.142 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 01:21:40.143 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-05 01:21:40.144 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 01:21:40.144  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-05 01:21:40.145  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 01:21:40.145  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 01:21:40.146  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 01:21:40.146  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 01:21:40.150  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 01:21:40.150  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 01:21:40.151  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 01:21:40.153  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 01:21:40.261  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 01:21:40.262  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 01:21:40.263 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 01:21:40.266 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 01:21:40.267  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1419
2021-05-05 01:21:40.267  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 01:21:40.269  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 01:21:40.270  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 01:21:40.270  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 01:21:40.270  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 01:21:40.271 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 01:21:40.271 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 01:21:40.271 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 01:21:40.272 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 01:21:40.272 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 01:21:40.272 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 01:21:40.273 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 01:21:40.349 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 629971667146810500156800016132879947367766657417
             IssuerDN: UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 00:04:38 UTC 2021
           Final Date: Mon May 05 00:04:38 UTC 2031
            SubjectDN: UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:6b:dd:b4:31:3f:89:ab:9e:4b:02:db:8e:ec:5e:7e:05:ee:96:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9a52d2429e37a77ec44d5c5b7ed322d6befe2310
                       9defe7e548f545585a5af300b4f7771f0a47fe95
                       9d3549c51fe83d1bba248b3b40fc9c7363655079
                       e38d946ba4a3bf72cc8878e4bf7c0ded522ee31a
                       15bc4add888ad61991f6be0e65679d3dd3ea2e51
                       0ee945572bc0f3307b82ea3c6c1bf6deb5362fbc
                       be96e7f5c663cfae9d373e42a9a651abf2d91e16
                       f6afeb9542aa86b48bf1976abea1c2954c45a6b4
                       3484fb33818fb9dc088ac85f7dea665e01b8a55f
                       5992c7ff933d5d959821d66926649387731e49e8
                       c77232396503fb94460829ead6c87a04526bf604
                       f0253bfba8006ffc5f67ad45195565f37c726e00
                       117b2e0bd905d4c820634a635bd8c33c9665b178
                       1fd3f8666682467b83924f2895a9dd093512c047
                       4c19e3e630cbe95c7adbdb8e926ebf493ecb6460
                       b7f0fac55ab810bca725d89ea91426c76d1ca0f4
                       d7cb4375d03f4a2d6b22c135477e46d8d6d65ef6
                       5a2f97328566a0f29b29f219556927d02bd33d4b
                       c44097e33bbc2346624b2463b8900195597e7b18
                       e981dc49
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [47:3a:06:8c:a1:98:09:cf:04:48:7a:f3:fe:60:5b:aa:7e:c8:5a:52]
            modulus: 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
    public exponent: 10001

] 
2021-05-05 01:23:06.586  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 01:23:06.588 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 01:23:06.589 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-05 01:23:06.590 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 01:23:06.590  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-05 01:23:06.591  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 01:23:06.591  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 01:23:06.592  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 01:23:06.592  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 01:23:06.596  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 01:23:06.596  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 01:23:06.597  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 01:23:06.650  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 01:23:06.751  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 01:23:06.752  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 01:23:06.752 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 01:23:06.754 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 01:23:06.755  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1419
2021-05-05 01:23:06.755  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 01:23:06.757  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 01:23:06.757  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 01:23:06.758  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 01:23:06.758  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 01:23:06.759 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 01:23:06.759 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 01:23:06.759 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 01:23:06.760 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 01:23:06.760 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 01:23:06.761 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 01:23:06.762 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 01:23:06.765 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 629971667146810500156800016132879947367766657417
             IssuerDN: UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 00:04:38 UTC 2021
           Final Date: Mon May 05 00:04:38 UTC 2031
            SubjectDN: UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:6b:dd:b4:31:3f:89:ab:9e:4b:02:db:8e:ec:5e:7e:05:ee:96:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9a52d2429e37a77ec44d5c5b7ed322d6befe2310
                       9defe7e548f545585a5af300b4f7771f0a47fe95
                       9d3549c51fe83d1bba248b3b40fc9c7363655079
                       e38d946ba4a3bf72cc8878e4bf7c0ded522ee31a
                       15bc4add888ad61991f6be0e65679d3dd3ea2e51
                       0ee945572bc0f3307b82ea3c6c1bf6deb5362fbc
                       be96e7f5c663cfae9d373e42a9a651abf2d91e16
                       f6afeb9542aa86b48bf1976abea1c2954c45a6b4
                       3484fb33818fb9dc088ac85f7dea665e01b8a55f
                       5992c7ff933d5d959821d66926649387731e49e8
                       c77232396503fb94460829ead6c87a04526bf604
                       f0253bfba8006ffc5f67ad45195565f37c726e00
                       117b2e0bd905d4c820634a635bd8c33c9665b178
                       1fd3f8666682467b83924f2895a9dd093512c047
                       4c19e3e630cbe95c7adbdb8e926ebf493ecb6460
                       b7f0fac55ab810bca725d89ea91426c76d1ca0f4
                       d7cb4375d03f4a2d6b22c135477e46d8d6d65ef6
                       5a2f97328566a0f29b29f219556927d02bd33d4b
                       c44097e33bbc2346624b2463b8900195597e7b18
                       e981dc49
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f8:45:1d:bd:7f:de:5c:a9:5b:e3:02:99:ef:ac:e2:b4:f0:7b:d7:ad]
            modulus: 8a634f6dc25dd58d7238b0df1d80b3949c098c0c9c2add34a3a7ce58e367a0ad22000e83bee739da1d7654d5b173fae1ded0504401b1712e84ae7d5259b181daf5fbfe0954e0f50eed6f8639649ce363d70c71f2df100e9f43e7df39f46b9eac60377568bc7eb4fabbf6cc77233b0cb8cdfd848a9eb88e3c742cf55ff88c0fed5dd24ed4755c11e31311a0b97a1b530cfaed2162eae0e21fe5aef4c7c5f947df238f1451856da209091d968befaa5e846f2a3a66f3478ef62aa5e57ebc69f13e682e6920db3759fe21a905441208662b03db832fa6ce1671f2e8f9ee1c36f2d15f1495156371da286da5bcc7a579a90aa853fb81515849c7b2022d6672fc0769
    public exponent: 10001

] 
2021-05-05 01:23:44.071  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 01:23:44.072 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 01:23:44.073 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-05 01:23:44.074 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 01:23:44.074  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-05 01:23:44.074  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 01:23:44.075  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 01:23:44.075  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 01:23:44.075  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 01:23:44.080  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 01:23:44.081  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 01:23:44.081  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 01:23:44.082  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 01:23:44.255  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 01:23:44.256  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 01:23:44.257 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 01:23:44.260 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 01:23:44.261  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1419
2021-05-05 01:23:44.262  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 01:23:44.263  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 01:23:44.264  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 01:23:44.264  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 01:23:44.265  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 01:23:44.265 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 01:23:44.266 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 01:23:44.266 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 01:23:44.267 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 01:23:44.267 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 01:23:44.268 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 01:23:44.269 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 01:23:44.273 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 629971667146810500156800016132879947367766657417
             IssuerDN: UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 00:04:38 UTC 2021
           Final Date: Mon May 05 00:04:38 UTC 2031
            SubjectDN: UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:6b:dd:b4:31:3f:89:ab:9e:4b:02:db:8e:ec:5e:7e:05:ee:96:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9a52d2429e37a77ec44d5c5b7ed322d6befe2310
                       9defe7e548f545585a5af300b4f7771f0a47fe95
                       9d3549c51fe83d1bba248b3b40fc9c7363655079
                       e38d946ba4a3bf72cc8878e4bf7c0ded522ee31a
                       15bc4add888ad61991f6be0e65679d3dd3ea2e51
                       0ee945572bc0f3307b82ea3c6c1bf6deb5362fbc
                       be96e7f5c663cfae9d373e42a9a651abf2d91e16
                       f6afeb9542aa86b48bf1976abea1c2954c45a6b4
                       3484fb33818fb9dc088ac85f7dea665e01b8a55f
                       5992c7ff933d5d959821d66926649387731e49e8
                       c77232396503fb94460829ead6c87a04526bf604
                       f0253bfba8006ffc5f67ad45195565f37c726e00
                       117b2e0bd905d4c820634a635bd8c33c9665b178
                       1fd3f8666682467b83924f2895a9dd093512c047
                       4c19e3e630cbe95c7adbdb8e926ebf493ecb6460
                       b7f0fac55ab810bca725d89ea91426c76d1ca0f4
                       d7cb4375d03f4a2d6b22c135477e46d8d6d65ef6
                       5a2f97328566a0f29b29f219556927d02bd33d4b
                       c44097e33bbc2346624b2463b8900195597e7b18
                       e981dc49
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [21:b6:8e:c2:cd:b3:c6:7f:7b:4f:41:87:77:e9:0a:30:92:7a:10:db]
            modulus: 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
    public exponent: 10001

] 
2021-05-05 01:23:49.644  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 01:23:49.646 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 01:23:49.648 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-05 01:23:49.648 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 01:23:49.649  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-05 01:23:49.650  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 01:23:49.650  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 01:23:49.651  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 01:23:49.651  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 01:23:49.656  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 01:23:49.657  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 01:23:49.657  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 01:23:49.658  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 01:23:49.748  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 01:23:49.749  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 01:23:49.750 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 01:23:49.751 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 01:23:49.752  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1419
2021-05-05 01:23:49.753  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 01:23:49.755  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 01:23:49.755  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 01:23:49.756  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 01:23:49.756  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 01:23:49.756 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 01:23:49.757 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 01:23:49.757 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 01:23:49.758 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 01:23:49.759 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 01:23:49.759 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 01:23:49.760 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 01:23:49.763 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 629971667146810500156800016132879947367766657417
             IssuerDN: UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 00:04:38 UTC 2021
           Final Date: Mon May 05 00:04:38 UTC 2031
            SubjectDN: UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:6b:dd:b4:31:3f:89:ab:9e:4b:02:db:8e:ec:5e:7e:05:ee:96:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9a52d2429e37a77ec44d5c5b7ed322d6befe2310
                       9defe7e548f545585a5af300b4f7771f0a47fe95
                       9d3549c51fe83d1bba248b3b40fc9c7363655079
                       e38d946ba4a3bf72cc8878e4bf7c0ded522ee31a
                       15bc4add888ad61991f6be0e65679d3dd3ea2e51
                       0ee945572bc0f3307b82ea3c6c1bf6deb5362fbc
                       be96e7f5c663cfae9d373e42a9a651abf2d91e16
                       f6afeb9542aa86b48bf1976abea1c2954c45a6b4
                       3484fb33818fb9dc088ac85f7dea665e01b8a55f
                       5992c7ff933d5d959821d66926649387731e49e8
                       c77232396503fb94460829ead6c87a04526bf604
                       f0253bfba8006ffc5f67ad45195565f37c726e00
                       117b2e0bd905d4c820634a635bd8c33c9665b178
                       1fd3f8666682467b83924f2895a9dd093512c047
                       4c19e3e630cbe95c7adbdb8e926ebf493ecb6460
                       b7f0fac55ab810bca725d89ea91426c76d1ca0f4
                       d7cb4375d03f4a2d6b22c135477e46d8d6d65ef6
                       5a2f97328566a0f29b29f219556927d02bd33d4b
                       c44097e33bbc2346624b2463b8900195597e7b18
                       e981dc49
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6d:a9:c1:cf:b9:50:2d:bf:e0:69:75:86:ce:7f:90:a1:9c:07:d3:17]
            modulus: 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
    public exponent: 10001

] 
2021-05-05 01:23:56.002  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 01:23:56.003 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 01:23:56.004 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-05 01:23:56.005 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 01:23:56.005  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-05 01:23:56.006  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 01:23:56.006  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 01:23:56.006  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 01:23:56.006  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 01:23:56.010  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 01:23:56.011  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 01:23:56.011  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 01:23:56.012  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 01:23:56.088  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 01:23:56.089  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 01:23:56.090 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 01:23:56.092 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 01:23:56.093  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1419
2021-05-05 01:23:56.093  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 01:23:56.096  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 01:23:56.097  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 01:23:56.097  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 01:23:56.098  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 01:23:56.098 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 01:23:56.098 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 01:23:56.099 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 01:23:56.099 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 01:23:56.099 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 01:23:56.100 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 01:23:56.100 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 01:23:56.102 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 629971667146810500156800016132879947367766657417
             IssuerDN: UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 00:04:38 UTC 2021
           Final Date: Mon May 05 00:04:38 UTC 2031
            SubjectDN: UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:6b:dd:b4:31:3f:89:ab:9e:4b:02:db:8e:ec:5e:7e:05:ee:96:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9a52d2429e37a77ec44d5c5b7ed322d6befe2310
                       9defe7e548f545585a5af300b4f7771f0a47fe95
                       9d3549c51fe83d1bba248b3b40fc9c7363655079
                       e38d946ba4a3bf72cc8878e4bf7c0ded522ee31a
                       15bc4add888ad61991f6be0e65679d3dd3ea2e51
                       0ee945572bc0f3307b82ea3c6c1bf6deb5362fbc
                       be96e7f5c663cfae9d373e42a9a651abf2d91e16
                       f6afeb9542aa86b48bf1976abea1c2954c45a6b4
                       3484fb33818fb9dc088ac85f7dea665e01b8a55f
                       5992c7ff933d5d959821d66926649387731e49e8
                       c77232396503fb94460829ead6c87a04526bf604
                       f0253bfba8006ffc5f67ad45195565f37c726e00
                       117b2e0bd905d4c820634a635bd8c33c9665b178
                       1fd3f8666682467b83924f2895a9dd093512c047
                       4c19e3e630cbe95c7adbdb8e926ebf493ecb6460
                       b7f0fac55ab810bca725d89ea91426c76d1ca0f4
                       d7cb4375d03f4a2d6b22c135477e46d8d6d65ef6
                       5a2f97328566a0f29b29f219556927d02bd33d4b
                       c44097e33bbc2346624b2463b8900195597e7b18
                       e981dc49
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [68:4a:30:ba:b3:46:0a:25:d8:8d:62:01:4c:ee:db:ad:af:ce:69:a8]
            modulus: 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
    public exponent: 10001

] 
2021-05-05 01:26:00.209  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 01:26:00.210 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 01:26:00.212 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-05 01:26:00.212 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 01:26:00.213  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-05 01:26:00.213  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 01:26:00.213  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 01:26:00.214  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 01:26:00.214  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 01:26:00.219  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 01:26:00.219  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 01:26:00.219  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 01:26:00.220  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 01:26:00.299  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 01:26:00.299  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 01:26:00.300 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 01:26:00.300 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 01:26:00.301  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1419
2021-05-05 01:26:00.301  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 01:26:00.303  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 01:26:00.303  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 01:26:00.303  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 01:26:00.303  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 01:26:00.304 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 01:26:00.304 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 01:26:00.304 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 01:26:00.305 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 01:26:00.305 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 01:26:00.305 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 01:26:00.306 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 01:26:00.309 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 629971667146810500156800016132879947367766657417
             IssuerDN: UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 00:04:38 UTC 2021
           Final Date: Mon May 05 00:04:38 UTC 2031
            SubjectDN: UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:6b:dd:b4:31:3f:89:ab:9e:4b:02:db:8e:ec:5e:7e:05:ee:96:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9a52d2429e37a77ec44d5c5b7ed322d6befe2310
                       9defe7e548f545585a5af300b4f7771f0a47fe95
                       9d3549c51fe83d1bba248b3b40fc9c7363655079
                       e38d946ba4a3bf72cc8878e4bf7c0ded522ee31a
                       15bc4add888ad61991f6be0e65679d3dd3ea2e51
                       0ee945572bc0f3307b82ea3c6c1bf6deb5362fbc
                       be96e7f5c663cfae9d373e42a9a651abf2d91e16
                       f6afeb9542aa86b48bf1976abea1c2954c45a6b4
                       3484fb33818fb9dc088ac85f7dea665e01b8a55f
                       5992c7ff933d5d959821d66926649387731e49e8
                       c77232396503fb94460829ead6c87a04526bf604
                       f0253bfba8006ffc5f67ad45195565f37c726e00
                       117b2e0bd905d4c820634a635bd8c33c9665b178
                       1fd3f8666682467b83924f2895a9dd093512c047
                       4c19e3e630cbe95c7adbdb8e926ebf493ecb6460
                       b7f0fac55ab810bca725d89ea91426c76d1ca0f4
                       d7cb4375d03f4a2d6b22c135477e46d8d6d65ef6
                       5a2f97328566a0f29b29f219556927d02bd33d4b
                       c44097e33bbc2346624b2463b8900195597e7b18
                       e981dc49
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2e:80:19:5e:d3:fc:fc:54:1a:2c:b5:22:62:22:5f:53:bf:26:ef:76]
            modulus: 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
    public exponent: 10001

] 
2021-05-05 01:28:26.156  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 01:28:26.160 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 01:28:26.162 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-05 01:28:26.163 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 01:28:26.163  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-05 01:28:26.164  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 01:28:26.165  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 01:28:26.165  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 01:28:26.165  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 01:28:26.169  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 01:28:26.170  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 01:28:26.170  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 01:28:26.171  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 01:28:26.242  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 01:28:26.243  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 01:28:26.243 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 01:28:26.244 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 01:28:26.245  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1419
2021-05-05 01:28:26.245  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 01:28:26.249  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 01:28:26.250  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 01:28:26.250  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 01:28:26.251  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 01:28:26.251 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 01:28:26.252 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 01:28:26.252 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 01:28:26.253 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 01:28:26.253 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 01:28:26.254 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 01:28:26.255 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 01:28:26.258 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 629971667146810500156800016132879947367766657417
             IssuerDN: UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 00:04:38 UTC 2021
           Final Date: Mon May 05 00:04:38 UTC 2031
            SubjectDN: UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:6b:dd:b4:31:3f:89:ab:9e:4b:02:db:8e:ec:5e:7e:05:ee:96:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9a52d2429e37a77ec44d5c5b7ed322d6befe2310
                       9defe7e548f545585a5af300b4f7771f0a47fe95
                       9d3549c51fe83d1bba248b3b40fc9c7363655079
                       e38d946ba4a3bf72cc8878e4bf7c0ded522ee31a
                       15bc4add888ad61991f6be0e65679d3dd3ea2e51
                       0ee945572bc0f3307b82ea3c6c1bf6deb5362fbc
                       be96e7f5c663cfae9d373e42a9a651abf2d91e16
                       f6afeb9542aa86b48bf1976abea1c2954c45a6b4
                       3484fb33818fb9dc088ac85f7dea665e01b8a55f
                       5992c7ff933d5d959821d66926649387731e49e8
                       c77232396503fb94460829ead6c87a04526bf604
                       f0253bfba8006ffc5f67ad45195565f37c726e00
                       117b2e0bd905d4c820634a635bd8c33c9665b178
                       1fd3f8666682467b83924f2895a9dd093512c047
                       4c19e3e630cbe95c7adbdb8e926ebf493ecb6460
                       b7f0fac55ab810bca725d89ea91426c76d1ca0f4
                       d7cb4375d03f4a2d6b22c135477e46d8d6d65ef6
                       5a2f97328566a0f29b29f219556927d02bd33d4b
                       c44097e33bbc2346624b2463b8900195597e7b18
                       e981dc49
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [83:b4:e1:c9:da:c1:a9:56:c1:bb:65:cc:cd:c9:5d:a2:1c:6d:c4:25]
            modulus: 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
    public exponent: 10001

] 
2021-05-05 01:30:50.983  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 01:30:50.984 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 01:30:50.985 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-05 01:30:50.986 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 01:30:50.987  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-05 01:30:50.987  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 01:30:50.988  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 01:30:50.988  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 01:30:50.989  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 01:30:50.993  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 01:30:50.993  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 01:30:50.993  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 01:30:50.994  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 01:30:51.170  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 01:30:51.171  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 01:30:51.172 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 01:30:51.173 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 01:30:51.174  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1419
2021-05-05 01:30:51.175  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 01:30:51.176  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 01:30:51.177  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 01:30:51.177  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 01:30:51.177  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 01:30:51.178 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 01:30:51.178 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 01:30:51.178 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 01:30:51.178 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 01:30:51.179 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 01:30:51.179 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 01:30:51.179 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 01:30:51.182 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 629971667146810500156800016132879947367766657417
             IssuerDN: UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 00:04:38 UTC 2021
           Final Date: Mon May 05 00:04:38 UTC 2031
            SubjectDN: UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:6b:dd:b4:31:3f:89:ab:9e:4b:02:db:8e:ec:5e:7e:05:ee:96:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9a52d2429e37a77ec44d5c5b7ed322d6befe2310
                       9defe7e548f545585a5af300b4f7771f0a47fe95
                       9d3549c51fe83d1bba248b3b40fc9c7363655079
                       e38d946ba4a3bf72cc8878e4bf7c0ded522ee31a
                       15bc4add888ad61991f6be0e65679d3dd3ea2e51
                       0ee945572bc0f3307b82ea3c6c1bf6deb5362fbc
                       be96e7f5c663cfae9d373e42a9a651abf2d91e16
                       f6afeb9542aa86b48bf1976abea1c2954c45a6b4
                       3484fb33818fb9dc088ac85f7dea665e01b8a55f
                       5992c7ff933d5d959821d66926649387731e49e8
                       c77232396503fb94460829ead6c87a04526bf604
                       f0253bfba8006ffc5f67ad45195565f37c726e00
                       117b2e0bd905d4c820634a635bd8c33c9665b178
                       1fd3f8666682467b83924f2895a9dd093512c047
                       4c19e3e630cbe95c7adbdb8e926ebf493ecb6460
                       b7f0fac55ab810bca725d89ea91426c76d1ca0f4
                       d7cb4375d03f4a2d6b22c135477e46d8d6d65ef6
                       5a2f97328566a0f29b29f219556927d02bd33d4b
                       c44097e33bbc2346624b2463b8900195597e7b18
                       e981dc49
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7c:53:40:08:2a:eb:5b:23:e3:61:ae:7a:e9:55:5c:a1:2f:f3:42:ec]
            modulus: 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
    public exponent: 10001

] 
2021-05-05 01:33:13.516  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 01:33:13.517 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 01:33:13.518 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-05 01:33:13.519 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 01:33:13.519  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-05 01:33:13.519  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 01:33:13.520  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 01:33:13.520  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 01:33:13.520  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 01:33:13.525  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 01:33:13.526  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 01:33:13.526  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 01:33:13.527  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 01:33:13.639  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 01:33:13.640  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 01:33:13.640 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 01:33:13.641 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 01:33:13.641  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1419
2021-05-05 01:33:13.642  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 01:33:13.643  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 01:33:13.643  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 01:33:13.643  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 01:33:13.643  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 01:33:13.644 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 01:33:13.644 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 01:33:13.644 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 01:33:13.644 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 01:33:13.644 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 01:33:13.645 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 01:33:13.645 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 01:33:13.647 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 629971667146810500156800016132879947367766657417
             IssuerDN: UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 00:04:38 UTC 2021
           Final Date: Mon May 05 00:04:38 UTC 2031
            SubjectDN: UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:6b:dd:b4:31:3f:89:ab:9e:4b:02:db:8e:ec:5e:7e:05:ee:96:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9a52d2429e37a77ec44d5c5b7ed322d6befe2310
                       9defe7e548f545585a5af300b4f7771f0a47fe95
                       9d3549c51fe83d1bba248b3b40fc9c7363655079
                       e38d946ba4a3bf72cc8878e4bf7c0ded522ee31a
                       15bc4add888ad61991f6be0e65679d3dd3ea2e51
                       0ee945572bc0f3307b82ea3c6c1bf6deb5362fbc
                       be96e7f5c663cfae9d373e42a9a651abf2d91e16
                       f6afeb9542aa86b48bf1976abea1c2954c45a6b4
                       3484fb33818fb9dc088ac85f7dea665e01b8a55f
                       5992c7ff933d5d959821d66926649387731e49e8
                       c77232396503fb94460829ead6c87a04526bf604
                       f0253bfba8006ffc5f67ad45195565f37c726e00
                       117b2e0bd905d4c820634a635bd8c33c9665b178
                       1fd3f8666682467b83924f2895a9dd093512c047
                       4c19e3e630cbe95c7adbdb8e926ebf493ecb6460
                       b7f0fac55ab810bca725d89ea91426c76d1ca0f4
                       d7cb4375d03f4a2d6b22c135477e46d8d6d65ef6
                       5a2f97328566a0f29b29f219556927d02bd33d4b
                       c44097e33bbc2346624b2463b8900195597e7b18
                       e981dc49
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [62:db:c2:b9:e0:50:bb:1b:b9:33:13:1a:be:d8:fe:df:a0:d6:50:f9]
            modulus: 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
    public exponent: 10001

] 
2021-05-05 01:34:35.080  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 01:34:35.081 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 01:34:35.083 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-05 01:34:35.084 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 01:34:35.085  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-05 01:34:35.085  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 01:34:35.086  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 01:34:35.086  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 01:34:35.086  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 01:34:35.090  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 01:34:35.090  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 01:34:35.090  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 01:34:35.091  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 01:34:35.165  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 01:34:35.166  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 01:34:35.166 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 01:34:35.167 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 01:34:35.167  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1419
2021-05-05 01:34:35.167  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 01:34:35.168  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 01:34:35.169  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 01:34:35.169  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 01:34:35.169  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 01:34:35.169 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 01:34:35.170 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 01:34:35.170 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 01:34:35.170 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 01:34:35.170 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 01:34:35.170 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 01:34:35.171 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 01:34:35.173 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 629971667146810500156800016132879947367766657417
             IssuerDN: UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 00:04:38 UTC 2021
           Final Date: Mon May 05 00:04:38 UTC 2031
            SubjectDN: UID=c-070c7fd514f33617a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:6b:dd:b4:31:3f:89:ab:9e:4b:02:db:8e:ec:5e:7e:05:ee:96:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9a52d2429e37a77ec44d5c5b7ed322d6befe2310
                       9defe7e548f545585a5af300b4f7771f0a47fe95
                       9d3549c51fe83d1bba248b3b40fc9c7363655079
                       e38d946ba4a3bf72cc8878e4bf7c0ded522ee31a
                       15bc4add888ad61991f6be0e65679d3dd3ea2e51
                       0ee945572bc0f3307b82ea3c6c1bf6deb5362fbc
                       be96e7f5c663cfae9d373e42a9a651abf2d91e16
                       f6afeb9542aa86b48bf1976abea1c2954c45a6b4
                       3484fb33818fb9dc088ac85f7dea665e01b8a55f
                       5992c7ff933d5d959821d66926649387731e49e8
                       c77232396503fb94460829ead6c87a04526bf604
                       f0253bfba8006ffc5f67ad45195565f37c726e00
                       117b2e0bd905d4c820634a635bd8c33c9665b178
                       1fd3f8666682467b83924f2895a9dd093512c047
                       4c19e3e630cbe95c7adbdb8e926ebf493ecb6460
                       b7f0fac55ab810bca725d89ea91426c76d1ca0f4
                       d7cb4375d03f4a2d6b22c135477e46d8d6d65ef6
                       5a2f97328566a0f29b29f219556927d02bd33d4b
                       c44097e33bbc2346624b2463b8900195597e7b18
                       e981dc49
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b8:3f:32:ff:cf:b6:12:fe:b9:50:7c:09:d3:62:49:64:92:27:9b:e7]
            modulus: 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
    public exponent: 10001

]