Results

By type

          2021-05-08 00:13:51,722 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-05-08 00:13:55,523 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-05-08 00:13:58.315  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-05-08 00:14:09.107 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-05-08 00:14:10.009  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-05-08 00:14:10.623  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-05-08 00:14:23.006  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 33.504 seconds (JVM running for 40.256)
2021-05-08 00:31:29.206  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-08 00:31:29.309 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-08 00:31:29.525 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-08 00:31:29.608 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-08 00:31:29.707  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-08 00:31:29.711  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-08 00:31:29.716  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-08 00:31:29.717  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-08 00:31:29.717  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-08 00:31:29.725  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-08 00:31:29.806  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-08 00:31:29.914  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-08 00:31:29.921  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-08 00:31:29.922  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-08 00:31:30.015  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-08 00:31:31.315  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-08 00:31:31.318  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-08 00:31:31.319 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-08 00:31:31.406 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-08 00:31:31.407  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1490
2021-05-08 00:31:31.408  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-08 00:31:31.411  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-08 00:31:31.412  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-08 00:31:31.419  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-08 00:31:31.420  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-08 00:31:31.421 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-08 00:31:31.422 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-08 00:31:31.422 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-08 00:31:31.512 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-08 00:31:31.513 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-08 00:31:31.513 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-08 00:31:31.520 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-08 00:31:31.709 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 432021826210262443067290515046765551522872877602
             IssuerDN: UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 08 00:10:10 UTC 2021
           Final Date: Thu May 08 00:10:10 UTC 2031
            SubjectDN: UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [11:c1:5e:57:f5:07:38:db:4f:9d:57:33:84:e5:fb:60:8d:35:21:a8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 54ab279584f34c91971939e09a6174dac926b571
                       e621eaf5a557aabdab871a58c9ea9dbabe44fb17
                       5f357519163c8e6e49e42b8e4811732d8199f633
                       36a66f8505a437d75ff7e3f1dbe49b1c67d1dd1a
                       a005034ce27f55f5b0b81affda7419b399f5c7e3
                       f713ef000eb830cea3c73e9d3b363630c376c800
                       525a49f65ca40d9071dd0b28a2f219588094a082
                       e2d5c1026eb34334fd00ea5cce7b14d7ae63475a
                       bb29cccca75c1ac968e7856905d25b23ddda7a54
                       271e5d3f310fe5bb97472b4ccf20cd1875aa1df2
                       e69f01ee15312507152476e79491e40e5ccd1610
                       ed88631f4cd42ccede1f428825e3655f9b545d4e
                       cba0c3abf39b6c67127da216995c3f9a453d981c
                       328277f9d528a51f13f4592f468cbba5bab63752
                       2f39bed14f4f2c2ed05ca8c26a9a1da0b4c7f6f3
                       b0e3cd322411e53ebe337213d54322bfc7112337
                       a97e7b9cf2df92ced1056900a1fae83138af5f53
                       733809c417b0e20704f63a9b2abcaac6226f0faf
                       d3272cc283d2141542decbc323c2b86b83da7ba3
                       9ae78452
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [78:88:83:00:52:f4:2d:43:8e:a8:d4:24:8f:34:85:cf:be:9b:72:76]
            modulus: d5fa87820f5dfd90d6b332fa1289bfaea59cd938477fad099fb6fa16c8626daec3acee67be450673fc3df0240591413d75525d87f034282df92e0edda0a66651d8616d3359854c0aeb07501c3d4dfdf2f16e89613c1fb9d33d511f4513e1a58f0347ac4cc0b7cae89b4b89021f13d850d5835e208008c67867756a0568bb04a8dc9caa540b17626414b36413e53d5a0a3c465fa225ba2bacd594ba7e75f51807b4f44c82c6816bdfa7992e199c4f561a8d3e3bac5a54325e2720d49699572b2692110a0fda6b681867841e5054fd8ad7f23c2a26096c4a481e2744ff42e4b62ecf550d25f2da3f2bed5035592eb93be9617e3d274522fcf7ef53623fd412c505
    public exponent: 10001

] 
2021-05-08 01:34:43.183  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-08 01:34:43.186 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-08 01:34:43.188 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-08 01:34:43.191 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-08 01:34:43.192  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-08 01:34:43.194  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-08 01:34:43.195  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-08 01:34:43.195  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-08 01:34:43.196  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-08 01:34:43.214  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-08 01:34:43.214  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-08 01:34:43.216  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-08 01:34:43.221  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-08 01:34:43.445  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-08 01:34:43.445  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-08 01:34:43.446 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-08 01:34:43.449 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-08 01:34:43.449  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1490
2021-05-08 01:34:43.450  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-08 01:34:43.453  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-08 01:34:43.454  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-08 01:34:43.454  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-08 01:34:43.455  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-08 01:34:43.455 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-08 01:34:43.455 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-08 01:34:43.455 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-08 01:34:43.457 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-08 01:34:43.457 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-08 01:34:43.457 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-08 01:34:43.458 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-08 01:34:43.462 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 432021826210262443067290515046765551522872877602
             IssuerDN: UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 08 00:10:10 UTC 2021
           Final Date: Thu May 08 00:10:10 UTC 2031
            SubjectDN: UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [11:c1:5e:57:f5:07:38:db:4f:9d:57:33:84:e5:fb:60:8d:35:21:a8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 54ab279584f34c91971939e09a6174dac926b571
                       e621eaf5a557aabdab871a58c9ea9dbabe44fb17
                       5f357519163c8e6e49e42b8e4811732d8199f633
                       36a66f8505a437d75ff7e3f1dbe49b1c67d1dd1a
                       a005034ce27f55f5b0b81affda7419b399f5c7e3
                       f713ef000eb830cea3c73e9d3b363630c376c800
                       525a49f65ca40d9071dd0b28a2f219588094a082
                       e2d5c1026eb34334fd00ea5cce7b14d7ae63475a
                       bb29cccca75c1ac968e7856905d25b23ddda7a54
                       271e5d3f310fe5bb97472b4ccf20cd1875aa1df2
                       e69f01ee15312507152476e79491e40e5ccd1610
                       ed88631f4cd42ccede1f428825e3655f9b545d4e
                       cba0c3abf39b6c67127da216995c3f9a453d981c
                       328277f9d528a51f13f4592f468cbba5bab63752
                       2f39bed14f4f2c2ed05ca8c26a9a1da0b4c7f6f3
                       b0e3cd322411e53ebe337213d54322bfc7112337
                       a97e7b9cf2df92ced1056900a1fae83138af5f53
                       733809c417b0e20704f63a9b2abcaac6226f0faf
                       d3272cc283d2141542decbc323c2b86b83da7ba3
                       9ae78452
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [14:8b:64:4b:eb:14:be:bf:9f:b0:bd:89:50:aa:6b:c8:0d:ef:d5:19]
            modulus: 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
    public exponent: 10001

] 
2021-05-08 01:35:50.174  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-08 01:35:50.175 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-08 01:35:50.176 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-08 01:35:50.176 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-08 01:35:50.177  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-08 01:35:50.177  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-08 01:35:50.178  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-08 01:35:50.178  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-08 01:35:50.178  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-08 01:35:50.183  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-08 01:35:50.184  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-08 01:35:50.184  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-08 01:35:50.187  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-08 01:35:50.338  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-08 01:35:50.338  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-08 01:35:50.339 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-08 01:35:50.340 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-08 01:35:50.341  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1490
2021-05-08 01:35:50.341  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-08 01:35:50.343  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-08 01:35:50.343  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-08 01:35:50.343  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-08 01:35:50.344  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-08 01:35:50.405 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-08 01:35:50.406 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-08 01:35:50.406 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-08 01:35:50.407 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-08 01:35:50.407 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-08 01:35:50.407 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-08 01:35:50.408 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-08 01:35:50.411 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 432021826210262443067290515046765551522872877602
             IssuerDN: UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 08 00:10:10 UTC 2021
           Final Date: Thu May 08 00:10:10 UTC 2031
            SubjectDN: UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [11:c1:5e:57:f5:07:38:db:4f:9d:57:33:84:e5:fb:60:8d:35:21:a8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 54ab279584f34c91971939e09a6174dac926b571
                       e621eaf5a557aabdab871a58c9ea9dbabe44fb17
                       5f357519163c8e6e49e42b8e4811732d8199f633
                       36a66f8505a437d75ff7e3f1dbe49b1c67d1dd1a
                       a005034ce27f55f5b0b81affda7419b399f5c7e3
                       f713ef000eb830cea3c73e9d3b363630c376c800
                       525a49f65ca40d9071dd0b28a2f219588094a082
                       e2d5c1026eb34334fd00ea5cce7b14d7ae63475a
                       bb29cccca75c1ac968e7856905d25b23ddda7a54
                       271e5d3f310fe5bb97472b4ccf20cd1875aa1df2
                       e69f01ee15312507152476e79491e40e5ccd1610
                       ed88631f4cd42ccede1f428825e3655f9b545d4e
                       cba0c3abf39b6c67127da216995c3f9a453d981c
                       328277f9d528a51f13f4592f468cbba5bab63752
                       2f39bed14f4f2c2ed05ca8c26a9a1da0b4c7f6f3
                       b0e3cd322411e53ebe337213d54322bfc7112337
                       a97e7b9cf2df92ced1056900a1fae83138af5f53
                       733809c417b0e20704f63a9b2abcaac6226f0faf
                       d3272cc283d2141542decbc323c2b86b83da7ba3
                       9ae78452
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [59:1d:8a:3e:f6:95:77:d8:68:92:23:c6:cb:0f:b3:43:5a:eb:4f:65]
            modulus: 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
    public exponent: 10001

] 
2021-05-08 01:38:20.483  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-08 01:38:20.484 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-08 01:38:20.485 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-08 01:38:20.485 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-08 01:38:20.486  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-08 01:38:20.486  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-08 01:38:20.487  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-08 01:38:20.487  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-08 01:38:20.487  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-08 01:38:20.495  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-08 01:38:20.496  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-08 01:38:20.496  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-08 01:38:20.497  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-08 01:38:20.633  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-08 01:38:20.633  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-08 01:38:20.633 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-08 01:38:20.635 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-08 01:38:20.635  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1490
2021-05-08 01:38:20.636  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-08 01:38:20.637  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-08 01:38:20.637  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-08 01:38:20.638  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-08 01:38:20.638  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-08 01:38:20.638 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-08 01:38:20.638 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-08 01:38:20.639 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-08 01:38:20.639 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-08 01:38:20.640 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-08 01:38:20.640 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-08 01:38:20.641 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-08 01:38:20.643 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 432021826210262443067290515046765551522872877602
             IssuerDN: UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 08 00:10:10 UTC 2021
           Final Date: Thu May 08 00:10:10 UTC 2031
            SubjectDN: UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [11:c1:5e:57:f5:07:38:db:4f:9d:57:33:84:e5:fb:60:8d:35:21:a8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 54ab279584f34c91971939e09a6174dac926b571
                       e621eaf5a557aabdab871a58c9ea9dbabe44fb17
                       5f357519163c8e6e49e42b8e4811732d8199f633
                       36a66f8505a437d75ff7e3f1dbe49b1c67d1dd1a
                       a005034ce27f55f5b0b81affda7419b399f5c7e3
                       f713ef000eb830cea3c73e9d3b363630c376c800
                       525a49f65ca40d9071dd0b28a2f219588094a082
                       e2d5c1026eb34334fd00ea5cce7b14d7ae63475a
                       bb29cccca75c1ac968e7856905d25b23ddda7a54
                       271e5d3f310fe5bb97472b4ccf20cd1875aa1df2
                       e69f01ee15312507152476e79491e40e5ccd1610
                       ed88631f4cd42ccede1f428825e3655f9b545d4e
                       cba0c3abf39b6c67127da216995c3f9a453d981c
                       328277f9d528a51f13f4592f468cbba5bab63752
                       2f39bed14f4f2c2ed05ca8c26a9a1da0b4c7f6f3
                       b0e3cd322411e53ebe337213d54322bfc7112337
                       a97e7b9cf2df92ced1056900a1fae83138af5f53
                       733809c417b0e20704f63a9b2abcaac6226f0faf
                       d3272cc283d2141542decbc323c2b86b83da7ba3
                       9ae78452
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6b:06:71:5a:82:89:4e:d9:13:2e:de:bd:3b:40:4f:5e:96:eb:cf:2f]
            modulus: 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
    public exponent: 10001

] 
2021-05-08 01:39:13.951  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-08 01:39:13.952 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-08 01:39:13.953 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-08 01:39:13.953 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-08 01:39:13.954  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-08 01:39:13.954  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-08 01:39:13.955  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-08 01:39:13.955  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-08 01:39:13.955  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-08 01:39:13.960  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-08 01:39:13.961  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-08 01:39:13.961  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-08 01:39:13.962  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-08 01:39:14.160  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-08 01:39:14.161  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-08 01:39:14.161 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-08 01:39:14.162 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-08 01:39:14.163  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1490
2021-05-08 01:39:14.163  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-08 01:39:14.165  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-08 01:39:14.165  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-08 01:39:14.165  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-08 01:39:14.165  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-08 01:39:14.166 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-08 01:39:14.166 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-08 01:39:14.166 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-08 01:39:14.167 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-08 01:39:14.167 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-08 01:39:14.167 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-08 01:39:14.168 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-08 01:39:14.170 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 432021826210262443067290515046765551522872877602
             IssuerDN: UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 08 00:10:10 UTC 2021
           Final Date: Thu May 08 00:10:10 UTC 2031
            SubjectDN: UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [11:c1:5e:57:f5:07:38:db:4f:9d:57:33:84:e5:fb:60:8d:35:21:a8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 54ab279584f34c91971939e09a6174dac926b571
                       e621eaf5a557aabdab871a58c9ea9dbabe44fb17
                       5f357519163c8e6e49e42b8e4811732d8199f633
                       36a66f8505a437d75ff7e3f1dbe49b1c67d1dd1a
                       a005034ce27f55f5b0b81affda7419b399f5c7e3
                       f713ef000eb830cea3c73e9d3b363630c376c800
                       525a49f65ca40d9071dd0b28a2f219588094a082
                       e2d5c1026eb34334fd00ea5cce7b14d7ae63475a
                       bb29cccca75c1ac968e7856905d25b23ddda7a54
                       271e5d3f310fe5bb97472b4ccf20cd1875aa1df2
                       e69f01ee15312507152476e79491e40e5ccd1610
                       ed88631f4cd42ccede1f428825e3655f9b545d4e
                       cba0c3abf39b6c67127da216995c3f9a453d981c
                       328277f9d528a51f13f4592f468cbba5bab63752
                       2f39bed14f4f2c2ed05ca8c26a9a1da0b4c7f6f3
                       b0e3cd322411e53ebe337213d54322bfc7112337
                       a97e7b9cf2df92ced1056900a1fae83138af5f53
                       733809c417b0e20704f63a9b2abcaac6226f0faf
                       d3272cc283d2141542decbc323c2b86b83da7ba3
                       9ae78452
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [84:cb:72:b4:99:3b:f8:10:bf:bb:c8:34:72:3b:a7:63:38:99:b9:e5]
            modulus: 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
    public exponent: 10001

] 
2021-05-08 01:39:30.229  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-08 01:39:30.230 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-08 01:39:30.231 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-08 01:39:30.231 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-08 01:39:30.231  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-08 01:39:30.232  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-08 01:39:30.233  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-08 01:39:30.233  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-08 01:39:30.233  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-08 01:39:30.238  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-08 01:39:30.238  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-08 01:39:30.239  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-08 01:39:30.241  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-08 01:39:30.420  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-08 01:39:30.420  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-08 01:39:30.420 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-08 01:39:30.422 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-08 01:39:30.422  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1490
2021-05-08 01:39:30.423  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-08 01:39:30.424  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-08 01:39:30.424  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-08 01:39:30.425  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-08 01:39:30.425  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-08 01:39:30.425 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-08 01:39:30.426 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-08 01:39:30.426 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-08 01:39:30.427 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-08 01:39:30.427 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-08 01:39:30.427 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-08 01:39:30.428 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-08 01:39:30.431 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 432021826210262443067290515046765551522872877602
             IssuerDN: UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 08 00:10:10 UTC 2021
           Final Date: Thu May 08 00:10:10 UTC 2031
            SubjectDN: UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [11:c1:5e:57:f5:07:38:db:4f:9d:57:33:84:e5:fb:60:8d:35:21:a8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 54ab279584f34c91971939e09a6174dac926b571
                       e621eaf5a557aabdab871a58c9ea9dbabe44fb17
                       5f357519163c8e6e49e42b8e4811732d8199f633
                       36a66f8505a437d75ff7e3f1dbe49b1c67d1dd1a
                       a005034ce27f55f5b0b81affda7419b399f5c7e3
                       f713ef000eb830cea3c73e9d3b363630c376c800
                       525a49f65ca40d9071dd0b28a2f219588094a082
                       e2d5c1026eb34334fd00ea5cce7b14d7ae63475a
                       bb29cccca75c1ac968e7856905d25b23ddda7a54
                       271e5d3f310fe5bb97472b4ccf20cd1875aa1df2
                       e69f01ee15312507152476e79491e40e5ccd1610
                       ed88631f4cd42ccede1f428825e3655f9b545d4e
                       cba0c3abf39b6c67127da216995c3f9a453d981c
                       328277f9d528a51f13f4592f468cbba5bab63752
                       2f39bed14f4f2c2ed05ca8c26a9a1da0b4c7f6f3
                       b0e3cd322411e53ebe337213d54322bfc7112337
                       a97e7b9cf2df92ced1056900a1fae83138af5f53
                       733809c417b0e20704f63a9b2abcaac6226f0faf
                       d3272cc283d2141542decbc323c2b86b83da7ba3
                       9ae78452
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [36:f0:6a:e3:66:be:1b:97:3c:b4:a5:2f:1c:cd:71:83:32:fc:fe:a6]
            modulus: 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
    public exponent: 10001

] 
2021-05-08 01:40:08.391  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-08 01:40:08.392 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-08 01:40:08.393 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-08 01:40:08.394 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-08 01:40:08.394  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-08 01:40:08.395  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-08 01:40:08.395  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-08 01:40:08.397  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-08 01:40:08.398  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-08 01:40:08.402  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-08 01:40:08.402  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-08 01:40:08.403  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-08 01:40:08.404  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-08 01:40:08.485  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-08 01:40:08.486  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-08 01:40:08.486 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-08 01:40:08.487 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-08 01:40:08.487  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1490
2021-05-08 01:40:08.488  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-08 01:40:08.489  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-08 01:40:08.489  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-08 01:40:08.489  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-08 01:40:08.489  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-08 01:40:08.490 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-08 01:40:08.490 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-08 01:40:08.490 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-08 01:40:08.491 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-08 01:40:08.491 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-08 01:40:08.491 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-08 01:40:08.492 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-08 01:40:08.495 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 432021826210262443067290515046765551522872877602
             IssuerDN: UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 08 00:10:10 UTC 2021
           Final Date: Thu May 08 00:10:10 UTC 2031
            SubjectDN: UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [11:c1:5e:57:f5:07:38:db:4f:9d:57:33:84:e5:fb:60:8d:35:21:a8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 54ab279584f34c91971939e09a6174dac926b571
                       e621eaf5a557aabdab871a58c9ea9dbabe44fb17
                       5f357519163c8e6e49e42b8e4811732d8199f633
                       36a66f8505a437d75ff7e3f1dbe49b1c67d1dd1a
                       a005034ce27f55f5b0b81affda7419b399f5c7e3
                       f713ef000eb830cea3c73e9d3b363630c376c800
                       525a49f65ca40d9071dd0b28a2f219588094a082
                       e2d5c1026eb34334fd00ea5cce7b14d7ae63475a
                       bb29cccca75c1ac968e7856905d25b23ddda7a54
                       271e5d3f310fe5bb97472b4ccf20cd1875aa1df2
                       e69f01ee15312507152476e79491e40e5ccd1610
                       ed88631f4cd42ccede1f428825e3655f9b545d4e
                       cba0c3abf39b6c67127da216995c3f9a453d981c
                       328277f9d528a51f13f4592f468cbba5bab63752
                       2f39bed14f4f2c2ed05ca8c26a9a1da0b4c7f6f3
                       b0e3cd322411e53ebe337213d54322bfc7112337
                       a97e7b9cf2df92ced1056900a1fae83138af5f53
                       733809c417b0e20704f63a9b2abcaac6226f0faf
                       d3272cc283d2141542decbc323c2b86b83da7ba3
                       9ae78452
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e0:6a:aa:e1:95:59:bf:be:9c:58:70:a0:b5:0f:88:ac:58:2b:7b:2c]
            modulus: 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
    public exponent: 10001

] 
2021-05-08 01:40:16.675  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-08 01:40:16.676 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-08 01:40:16.677 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-08 01:40:16.678 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-08 01:40:16.678  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-08 01:40:16.678  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-08 01:40:16.678  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-08 01:40:16.679  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-08 01:40:16.679  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-08 01:40:16.683  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-08 01:40:16.683  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-08 01:40:16.684  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-08 01:40:16.685  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-08 01:40:16.779  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-08 01:40:16.780  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-08 01:40:16.780 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-08 01:40:16.782 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-08 01:40:16.783  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1490
2021-05-08 01:40:16.783  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-08 01:40:16.785  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-08 01:40:16.785  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-08 01:40:16.786  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-08 01:40:16.786  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-08 01:40:16.786 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-08 01:40:16.786 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-08 01:40:16.787 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-08 01:40:16.787 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-08 01:40:16.787 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-08 01:40:16.787 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-08 01:40:16.788 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-08 01:40:16.790 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 432021826210262443067290515046765551522872877602
             IssuerDN: UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 08 00:10:10 UTC 2021
           Final Date: Thu May 08 00:10:10 UTC 2031
            SubjectDN: UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [11:c1:5e:57:f5:07:38:db:4f:9d:57:33:84:e5:fb:60:8d:35:21:a8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 54ab279584f34c91971939e09a6174dac926b571
                       e621eaf5a557aabdab871a58c9ea9dbabe44fb17
                       5f357519163c8e6e49e42b8e4811732d8199f633
                       36a66f8505a437d75ff7e3f1dbe49b1c67d1dd1a
                       a005034ce27f55f5b0b81affda7419b399f5c7e3
                       f713ef000eb830cea3c73e9d3b363630c376c800
                       525a49f65ca40d9071dd0b28a2f219588094a082
                       e2d5c1026eb34334fd00ea5cce7b14d7ae63475a
                       bb29cccca75c1ac968e7856905d25b23ddda7a54
                       271e5d3f310fe5bb97472b4ccf20cd1875aa1df2
                       e69f01ee15312507152476e79491e40e5ccd1610
                       ed88631f4cd42ccede1f428825e3655f9b545d4e
                       cba0c3abf39b6c67127da216995c3f9a453d981c
                       328277f9d528a51f13f4592f468cbba5bab63752
                       2f39bed14f4f2c2ed05ca8c26a9a1da0b4c7f6f3
                       b0e3cd322411e53ebe337213d54322bfc7112337
                       a97e7b9cf2df92ced1056900a1fae83138af5f53
                       733809c417b0e20704f63a9b2abcaac6226f0faf
                       d3272cc283d2141542decbc323c2b86b83da7ba3
                       9ae78452
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [39:b5:dc:5d:e5:2a:1e:c7:7e:0c:ca:de:ed:a2:c7:05:61:bc:0b:c1]
            modulus: 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
    public exponent: 10001

] 
2021-05-08 01:41:56.369  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-08 01:41:56.370 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-08 01:41:56.372 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-08 01:41:56.372 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-08 01:41:56.373  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-08 01:41:56.373  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-08 01:41:56.374  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-08 01:41:56.374  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-08 01:41:56.374  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-08 01:41:56.378  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-08 01:41:56.379  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-08 01:41:56.379  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-08 01:41:56.381  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-08 01:41:56.479  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-08 01:41:56.479  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-08 01:41:56.479 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-08 01:41:56.481 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-08 01:41:56.481  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1490
2021-05-08 01:41:56.481  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-08 01:41:56.483  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-08 01:41:56.483  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-08 01:41:56.483  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-08 01:41:56.484  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-08 01:41:56.484 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-08 01:41:56.484 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-08 01:41:56.485 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-08 01:41:56.485 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-08 01:41:56.486 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-08 01:41:56.486 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-08 01:41:56.486 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-08 01:41:56.506 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 432021826210262443067290515046765551522872877602
             IssuerDN: UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 08 00:10:10 UTC 2021
           Final Date: Thu May 08 00:10:10 UTC 2031
            SubjectDN: UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [11:c1:5e:57:f5:07:38:db:4f:9d:57:33:84:e5:fb:60:8d:35:21:a8]
            modulus: aacee225c999c117e0fd9f864b80bae5b68aa10c673a1b9870754639b339911a25606029f419c4389b219ae10aae07925535beaf5c48bee262121cfb9e534c62e9ab3419e12a8bb0c44a8d52a1c3a776ef8693356dabc1d554f4f83f6ed3f68196ace847f546e5b88cf136ee152e0235f5b386b4f02166ce81bead3cb4ce2771f7a9c952fad8bc69f1328088a6d58bef68d9789d7d95e38629ced29cacfa7b5703d4beb62a92ed164ad122e6b2fb5342064a6f48540371d2a1692c9c61c84d1247b6d477a0bb266727ddfae315a7b58b4aeb7aab338dbc4de392d31b146efbe318d9d922fa66f2d498da5cf48b9e86a438cc1974590a5a42010df4f5af32ee088c5d010176f671ff821215c68f93f76b94fe026e60bf95072cfdff1e3bc710797047909bb1a13a1c6fee9b1fd1cc414a2f154b3deb2c7a93f4307cedb3cdaa3c9e558bb602f9c479012aed347461160703b71a38a7ac1895e062454c8dd7a13d4fd852bbb53eab9d0478b998104673e33a0d343257f1ef1723dd76699d51d757
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 54ab279584f34c91971939e09a6174dac926b571
                       e621eaf5a557aabdab871a58c9ea9dbabe44fb17
                       5f357519163c8e6e49e42b8e4811732d8199f633
                       36a66f8505a437d75ff7e3f1dbe49b1c67d1dd1a
                       a005034ce27f55f5b0b81affda7419b399f5c7e3
                       f713ef000eb830cea3c73e9d3b363630c376c800
                       525a49f65ca40d9071dd0b28a2f219588094a082
                       e2d5c1026eb34334fd00ea5cce7b14d7ae63475a
                       bb29cccca75c1ac968e7856905d25b23ddda7a54
                       271e5d3f310fe5bb97472b4ccf20cd1875aa1df2
                       e69f01ee15312507152476e79491e40e5ccd1610
                       ed88631f4cd42ccede1f428825e3655f9b545d4e
                       cba0c3abf39b6c67127da216995c3f9a453d981c
                       328277f9d528a51f13f4592f468cbba5bab63752
                       2f39bed14f4f2c2ed05ca8c26a9a1da0b4c7f6f3
                       b0e3cd322411e53ebe337213d54322bfc7112337
                       a97e7b9cf2df92ced1056900a1fae83138af5f53
                       733809c417b0e20704f63a9b2abcaac6226f0faf
                       d3272cc283d2141542decbc323c2b86b83da7ba3
                       9ae78452
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [35:f9:b4:14:40:0f:15:60:aa:b3:f6:58:45:07:00:df:36:01:8b:a2]
            modulus: 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
    public exponent: 10001

] 
2021-05-08 01:43:16.365  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-08 01:43:16.366 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-08 01:43:16.367 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-08 01:43:16.368 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-08 01:43:16.368  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-08 01:43:16.369  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-08 01:43:16.369  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-08 01:43:16.369  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-08 01:43:16.370  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-08 01:43:16.375  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-08 01:43:16.376  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-08 01:43:16.376  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-08 01:43:16.378  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-08 01:43:16.478  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-08 01:43:16.478  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-08 01:43:16.479 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-08 01:43:16.480 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-08 01:43:16.480  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1490
2021-05-08 01:43:16.481  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-08 01:43:16.482  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-08 01:43:16.482  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-08 01:43:16.482  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-08 01:43:16.483  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-08 01:43:16.483 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-08 01:43:16.483 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-08 01:43:16.483 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-08 01:43:16.484 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-08 01:43:16.484 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-08 01:43:16.484 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-08 01:43:16.485 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-08 01:43:16.488 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 432021826210262443067290515046765551522872877602
             IssuerDN: UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 08 00:10:10 UTC 2021
           Final Date: Thu May 08 00:10:10 UTC 2031
            SubjectDN: UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [11:c1:5e:57:f5:07:38:db:4f:9d:57:33:84:e5:fb:60:8d:35:21:a8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 54ab279584f34c91971939e09a6174dac926b571
                       e621eaf5a557aabdab871a58c9ea9dbabe44fb17
                       5f357519163c8e6e49e42b8e4811732d8199f633
                       36a66f8505a437d75ff7e3f1dbe49b1c67d1dd1a
                       a005034ce27f55f5b0b81affda7419b399f5c7e3
                       f713ef000eb830cea3c73e9d3b363630c376c800
                       525a49f65ca40d9071dd0b28a2f219588094a082
                       e2d5c1026eb34334fd00ea5cce7b14d7ae63475a
                       bb29cccca75c1ac968e7856905d25b23ddda7a54
                       271e5d3f310fe5bb97472b4ccf20cd1875aa1df2
                       e69f01ee15312507152476e79491e40e5ccd1610
                       ed88631f4cd42ccede1f428825e3655f9b545d4e
                       cba0c3abf39b6c67127da216995c3f9a453d981c
                       328277f9d528a51f13f4592f468cbba5bab63752
                       2f39bed14f4f2c2ed05ca8c26a9a1da0b4c7f6f3
                       b0e3cd322411e53ebe337213d54322bfc7112337
                       a97e7b9cf2df92ced1056900a1fae83138af5f53
                       733809c417b0e20704f63a9b2abcaac6226f0faf
                       d3272cc283d2141542decbc323c2b86b83da7ba3
                       9ae78452
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [99:f1:bb:91:55:91:40:76:50:e5:fc:e7:05:c0:1e:ab:d9:ed:94:64]
            modulus: 857ee3effc4e159eb4048d6ca7884089aaa6211fdc4cddbd336dd4264ee4bfc033866dfd2abbe5efb633ce2ae02898d6f47a161ab72f36ff54ff14ce135f4b10cf38cb4cab591d4e54d1a28d93c9de5eb1a20245bf3672767ea2d95df8485fbe8895897b25dbd15937bce9c4b479e99b6f02f3c54b7f1064ad3b148085229207f8cbc7b8ebd62322a560a6d8479d0102334336f94fe3013127f2e747f852755dc21de08c1a7ef341969df383e34106777b3545883a73f1da26671026ad94b6b24db694bedd696421f49197d23da21a67d17be31dbb5a47513ea8ff8e2f2babd982f26b893577e4e879a891a33f74a837ad54c7dc33cb7732981cf797922eb70b
    public exponent: 10001

] 
2021-05-08 01:45:45.256  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-08 01:45:45.257 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-08 01:45:45.258 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-08 01:45:45.259 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-08 01:45:45.259  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-08 01:45:45.259  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-08 01:45:45.260  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-08 01:45:45.260  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-08 01:45:45.261  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-08 01:45:45.265  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-08 01:45:45.265  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-08 01:45:45.266  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-08 01:45:45.267  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-08 01:45:45.632  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-08 01:45:45.633  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-08 01:45:45.633 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-08 01:45:45.634 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-08 01:45:45.635  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1490
2021-05-08 01:45:45.635  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-08 01:45:45.636  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-08 01:45:45.637  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-08 01:45:45.637  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-08 01:45:45.637  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-08 01:45:45.638 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-08 01:45:45.638 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-08 01:45:45.638 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-08 01:45:45.639 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-08 01:45:45.639 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-08 01:45:45.639 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-08 01:45:45.640 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-08 01:45:45.643 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 432021826210262443067290515046765551522872877602
             IssuerDN: UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 08 00:10:10 UTC 2021
           Final Date: Thu May 08 00:10:10 UTC 2031
            SubjectDN: UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [11:c1:5e:57:f5:07:38:db:4f:9d:57:33:84:e5:fb:60:8d:35:21:a8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 54ab279584f34c91971939e09a6174dac926b571
                       e621eaf5a557aabdab871a58c9ea9dbabe44fb17
                       5f357519163c8e6e49e42b8e4811732d8199f633
                       36a66f8505a437d75ff7e3f1dbe49b1c67d1dd1a
                       a005034ce27f55f5b0b81affda7419b399f5c7e3
                       f713ef000eb830cea3c73e9d3b363630c376c800
                       525a49f65ca40d9071dd0b28a2f219588094a082
                       e2d5c1026eb34334fd00ea5cce7b14d7ae63475a
                       bb29cccca75c1ac968e7856905d25b23ddda7a54
                       271e5d3f310fe5bb97472b4ccf20cd1875aa1df2
                       e69f01ee15312507152476e79491e40e5ccd1610
                       ed88631f4cd42ccede1f428825e3655f9b545d4e
                       cba0c3abf39b6c67127da216995c3f9a453d981c
                       328277f9d528a51f13f4592f468cbba5bab63752
                       2f39bed14f4f2c2ed05ca8c26a9a1da0b4c7f6f3
                       b0e3cd322411e53ebe337213d54322bfc7112337
                       a97e7b9cf2df92ced1056900a1fae83138af5f53
                       733809c417b0e20704f63a9b2abcaac6226f0faf
                       d3272cc283d2141542decbc323c2b86b83da7ba3
                       9ae78452
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [42:39:a1:14:2a:a8:75:34:ea:6a:84:01:49:e1:8d:f2:32:0f:ca:10]
            modulus: 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
    public exponent: 10001

] 
2021-05-08 01:47:36.355  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-08 01:47:36.356 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-08 01:47:36.357 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-08 01:47:36.357 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-08 01:47:36.358  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-08 01:47:36.358  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-08 01:47:36.358  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-08 01:47:36.359  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-08 01:47:36.359  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-08 01:47:36.364  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-08 01:47:36.365  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-08 01:47:36.365  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-08 01:47:36.366  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-08 01:47:36.436  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-08 01:47:36.437  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-08 01:47:36.437 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-08 01:47:36.438 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-08 01:47:36.438  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1490
2021-05-08 01:47:36.439  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-08 01:47:36.440  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-08 01:47:36.440  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-08 01:47:36.440  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-08 01:47:36.440  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-08 01:47:36.441 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-08 01:47:36.441 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-08 01:47:36.441 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-08 01:47:36.442 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-08 01:47:36.442 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-08 01:47:36.442 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-08 01:47:36.443 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-08 01:47:36.445 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 432021826210262443067290515046765551522872877602
             IssuerDN: UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 08 00:10:10 UTC 2021
           Final Date: Thu May 08 00:10:10 UTC 2031
            SubjectDN: UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [11:c1:5e:57:f5:07:38:db:4f:9d:57:33:84:e5:fb:60:8d:35:21:a8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 54ab279584f34c91971939e09a6174dac926b571
                       e621eaf5a557aabdab871a58c9ea9dbabe44fb17
                       5f357519163c8e6e49e42b8e4811732d8199f633
                       36a66f8505a437d75ff7e3f1dbe49b1c67d1dd1a
                       a005034ce27f55f5b0b81affda7419b399f5c7e3
                       f713ef000eb830cea3c73e9d3b363630c376c800
                       525a49f65ca40d9071dd0b28a2f219588094a082
                       e2d5c1026eb34334fd00ea5cce7b14d7ae63475a
                       bb29cccca75c1ac968e7856905d25b23ddda7a54
                       271e5d3f310fe5bb97472b4ccf20cd1875aa1df2
                       e69f01ee15312507152476e79491e40e5ccd1610
                       ed88631f4cd42ccede1f428825e3655f9b545d4e
                       cba0c3abf39b6c67127da216995c3f9a453d981c
                       328277f9d528a51f13f4592f468cbba5bab63752
                       2f39bed14f4f2c2ed05ca8c26a9a1da0b4c7f6f3
                       b0e3cd322411e53ebe337213d54322bfc7112337
                       a97e7b9cf2df92ced1056900a1fae83138af5f53
                       733809c417b0e20704f63a9b2abcaac6226f0faf
                       d3272cc283d2141542decbc323c2b86b83da7ba3
                       9ae78452
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [67:df:21:5b:40:6b:07:0a:3c:a3:15:a2:96:e4:ad:21:e2:9b:be:0e]
            modulus: 912db48e442bc1e9229e2e64be8981a5e182864ed5bc72514474ca9cd3cf7cd67b2b7087d8b6ec242466933fac100a61b67a1c873324c3a1d39283913b57809e302779a7482c4d05bb9c611ac0be02ae1700d4a33f801e41058b1eadc53dac83aa56baee14de1e04dbdc4120904fa8dc601950a1698af4aeb90078b2e6edc2bf9ee6a070896ca3c76062fc9ce0c3966088d8200cf21a973076bf50a1eab990325155903820a469e6be33c5addd5c6f00a78513e302d7c9394d42abe5c0dc09d1e3ef6c6b029841041d0a10afe486c18d1426e8a72894319d047f322468d52154a02e8031545eb8d560cff86603d36913d5388571c15f7fe22a55567e3d39b303
    public exponent: 10001

] 
2021-05-08 01:49:01.207  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-08 01:49:01.208 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-08 01:49:01.209 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-08 01:49:01.210 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-08 01:49:01.210  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-08 01:49:01.211  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-08 01:49:01.211  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-08 01:49:01.212  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-08 01:49:01.212  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-08 01:49:01.216  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-08 01:49:01.216  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-08 01:49:01.217  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-08 01:49:01.218  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-08 01:49:01.373  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-08 01:49:01.374  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-08 01:49:01.374 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-08 01:49:01.375 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-08 01:49:01.376  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1490
2021-05-08 01:49:01.376  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-08 01:49:01.377  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-08 01:49:01.377  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-08 01:49:01.378  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-08 01:49:01.378  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-08 01:49:01.378 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-08 01:49:01.378 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-08 01:49:01.379 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-08 01:49:01.379 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-08 01:49:01.379 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-08 01:49:01.380 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-08 01:49:01.380 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-08 01:49:01.382 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 432021826210262443067290515046765551522872877602
             IssuerDN: UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 08 00:10:10 UTC 2021
           Final Date: Thu May 08 00:10:10 UTC 2031
            SubjectDN: UID=c-0945a3917a9f2dfbc,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [11:c1:5e:57:f5:07:38:db:4f:9d:57:33:84:e5:fb:60:8d:35:21:a8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 54ab279584f34c91971939e09a6174dac926b571
                       e621eaf5a557aabdab871a58c9ea9dbabe44fb17
                       5f357519163c8e6e49e42b8e4811732d8199f633
                       36a66f8505a437d75ff7e3f1dbe49b1c67d1dd1a
                       a005034ce27f55f5b0b81affda7419b399f5c7e3
                       f713ef000eb830cea3c73e9d3b363630c376c800
                       525a49f65ca40d9071dd0b28a2f219588094a082
                       e2d5c1026eb34334fd00ea5cce7b14d7ae63475a
                       bb29cccca75c1ac968e7856905d25b23ddda7a54
                       271e5d3f310fe5bb97472b4ccf20cd1875aa1df2
                       e69f01ee15312507152476e79491e40e5ccd1610
                       ed88631f4cd42ccede1f428825e3655f9b545d4e
                       cba0c3abf39b6c67127da216995c3f9a453d981c
                       328277f9d528a51f13f4592f468cbba5bab63752
                       2f39bed14f4f2c2ed05ca8c26a9a1da0b4c7f6f3
                       b0e3cd322411e53ebe337213d54322bfc7112337
                       a97e7b9cf2df92ced1056900a1fae83138af5f53
                       733809c417b0e20704f63a9b2abcaac6226f0faf
                       d3272cc283d2141542decbc323c2b86b83da7ba3
                       9ae78452
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b4:18:91:e5:63:e8:39:4e:6d:44:c3:a8:10:28:69:ef:78:b3:ef:be]
            modulus: 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
    public exponent: 10001

]