Results

By type

          2021-05-09 00:08:18,853 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-05-09 00:08:23,052 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-05-09 00:08:25.842  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-05-09 00:08:37.044 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-05-09 00:08:38.051  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-05-09 00:08:38.740  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-05-09 00:08:51.757  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 35.39 seconds (JVM running for 41.94)
2021-05-09 00:19:42.861  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-09 00:19:42.952 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-09 00:19:43.068 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-09 00:19:43.072 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-09 00:19:43.149  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-09 00:19:43.153  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-09 00:19:43.246  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-09 00:19:43.247  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-09 00:19:43.248  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-09 00:19:43.255  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-09 00:19:43.259  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-09 00:19:43.453  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-09 00:19:43.461  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-09 00:19:43.462  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-09 00:19:43.550  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-09 00:19:44.694  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-09 00:19:44.699  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-09 00:19:44.700 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-09 00:19:44.708 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-09 00:19:44.711  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1544
2021-05-09 00:19:44.711  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-09 00:19:44.745  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-09 00:19:44.747  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-09 00:19:44.756  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-09 00:19:44.758  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-09 00:19:44.760 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-09 00:19:44.760 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-09 00:19:44.761 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-09 00:19:44.851 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-09 00:19:44.852 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-09 00:19:44.852 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-09 00:19:44.941 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-09 00:19:45.056 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 75647393764761802579210835198800797349368110473
             IssuerDN: UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 09 00:03:43 UTC 2021
           Final Date: Fri May 09 00:03:43 UTC 2031
            SubjectDN: UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f4:e4:9f:f1:14:db:02:e5:fb:2e:03:93:49:e5:ea:b4:c9:22:92:6c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 95797d2b48a31a5458db8c0106ca6e28cb0dc651
                       ca2aa048143cc71673d9d1abfcc8eaf1af1497d5
                       526ee1b504e27797a705e9b9716ca4a1cf5c4265
                       5ec17ce10a96f6fa2cedf4e24bb7c4bc2f69752b
                       68689c73f3125ef2964ea62bb21ee108e6185ffd
                       5697aa8198e6bd3af064ec71626411d2418745fa
                       bc1fc9ec856dddc4811ce702f9a06864447435df
                       a645f73132d4e479bc87ddbb3ad0608ca20ad924
                       e2f851a817c2af6c548e435e22c020b408927a69
                       c9392227acbb33bb93342def2031190337a436fb
                       011bd33aecb6716119d57f97585c8a2f7bf5e437
                       0fcf50c84925cbbde8d0fe31651ed134c5282d55
                       4f8cadf1a01b6bb798d14e8f393e8c7568f27257
                       a5638ddeea3e5506ef1ed923b46631a32de89db8
                       63f09bcaf32313d1708285251cf1a91a05e643b8
                       0a93998af5a862aba72f24829933a745ade0eeac
                       8bc6358ddb89d79b4dec255e5bc4398cfcce65e4
                       4596365423d586da4f25b78d1c3532af2e7a9d22
                       8f86b7e36f98be43d3c1134d2bd3ff35d7204015
                       4ae607e3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [97:66:cf:8d:78:31:41:f7:b6:75:44:8c:fa:88:98:61:22:80:40:ed]
            modulus: 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
    public exponent: 10001

] 
2021-05-09 01:20:40.964  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-09 01:20:40.966 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-09 01:20:40.969 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-09 01:20:40.970 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-09 01:20:40.970  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-09 01:20:41.039  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-09 01:20:41.040  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-09 01:20:41.040  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-09 01:20:41.041  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-09 01:20:41.047  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-09 01:20:41.048  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-09 01:20:41.048  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-09 01:20:41.050  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-09 01:20:41.350  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-09 01:20:41.350  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-09 01:20:41.351 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-09 01:20:41.353 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-09 01:20:41.353  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1544
2021-05-09 01:20:41.354  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-09 01:20:41.355  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-09 01:20:41.356  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-09 01:20:41.356  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-09 01:20:41.357  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-09 01:20:41.357 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-09 01:20:41.358 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-09 01:20:41.358 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-09 01:20:41.359 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-09 01:20:41.360 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-09 01:20:41.360 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-09 01:20:41.361 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-09 01:20:41.364 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 75647393764761802579210835198800797349368110473
             IssuerDN: UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 09 00:03:43 UTC 2021
           Final Date: Fri May 09 00:03:43 UTC 2031
            SubjectDN: UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f4:e4:9f:f1:14:db:02:e5:fb:2e:03:93:49:e5:ea:b4:c9:22:92:6c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 95797d2b48a31a5458db8c0106ca6e28cb0dc651
                       ca2aa048143cc71673d9d1abfcc8eaf1af1497d5
                       526ee1b504e27797a705e9b9716ca4a1cf5c4265
                       5ec17ce10a96f6fa2cedf4e24bb7c4bc2f69752b
                       68689c73f3125ef2964ea62bb21ee108e6185ffd
                       5697aa8198e6bd3af064ec71626411d2418745fa
                       bc1fc9ec856dddc4811ce702f9a06864447435df
                       a645f73132d4e479bc87ddbb3ad0608ca20ad924
                       e2f851a817c2af6c548e435e22c020b408927a69
                       c9392227acbb33bb93342def2031190337a436fb
                       011bd33aecb6716119d57f97585c8a2f7bf5e437
                       0fcf50c84925cbbde8d0fe31651ed134c5282d55
                       4f8cadf1a01b6bb798d14e8f393e8c7568f27257
                       a5638ddeea3e5506ef1ed923b46631a32de89db8
                       63f09bcaf32313d1708285251cf1a91a05e643b8
                       0a93998af5a862aba72f24829933a745ade0eeac
                       8bc6358ddb89d79b4dec255e5bc4398cfcce65e4
                       4596365423d586da4f25b78d1c3532af2e7a9d22
                       8f86b7e36f98be43d3c1134d2bd3ff35d7204015
                       4ae607e3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ee:19:38:dc:7e:74:7b:41:55:a5:02:8d:83:6a:33:16:3a:94:94:cf]
            modulus: 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
    public exponent: 10001

] 
2021-05-09 01:23:01.295  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-09 01:23:01.296 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-09 01:23:01.298 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-09 01:23:01.299 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-09 01:23:01.299  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-09 01:23:01.300  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-09 01:23:01.300  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-09 01:23:01.301  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-09 01:23:01.302  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-09 01:23:01.310  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-09 01:23:01.311  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-09 01:23:01.311  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-09 01:23:01.313  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-09 01:23:01.443  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-09 01:23:01.444  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-09 01:23:01.444 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-09 01:23:01.447 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-09 01:23:01.447  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1544
2021-05-09 01:23:01.448  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-09 01:23:01.449  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-09 01:23:01.450  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-09 01:23:01.450  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-09 01:23:01.451  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-09 01:23:01.451 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-09 01:23:01.451 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-09 01:23:01.452 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-09 01:23:01.453 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-09 01:23:01.453 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-09 01:23:01.454 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-09 01:23:01.455 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-09 01:23:01.458 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 75647393764761802579210835198800797349368110473
             IssuerDN: UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 09 00:03:43 UTC 2021
           Final Date: Fri May 09 00:03:43 UTC 2031
            SubjectDN: UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f4:e4:9f:f1:14:db:02:e5:fb:2e:03:93:49:e5:ea:b4:c9:22:92:6c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 95797d2b48a31a5458db8c0106ca6e28cb0dc651
                       ca2aa048143cc71673d9d1abfcc8eaf1af1497d5
                       526ee1b504e27797a705e9b9716ca4a1cf5c4265
                       5ec17ce10a96f6fa2cedf4e24bb7c4bc2f69752b
                       68689c73f3125ef2964ea62bb21ee108e6185ffd
                       5697aa8198e6bd3af064ec71626411d2418745fa
                       bc1fc9ec856dddc4811ce702f9a06864447435df
                       a645f73132d4e479bc87ddbb3ad0608ca20ad924
                       e2f851a817c2af6c548e435e22c020b408927a69
                       c9392227acbb33bb93342def2031190337a436fb
                       011bd33aecb6716119d57f97585c8a2f7bf5e437
                       0fcf50c84925cbbde8d0fe31651ed134c5282d55
                       4f8cadf1a01b6bb798d14e8f393e8c7568f27257
                       a5638ddeea3e5506ef1ed923b46631a32de89db8
                       63f09bcaf32313d1708285251cf1a91a05e643b8
                       0a93998af5a862aba72f24829933a745ade0eeac
                       8bc6358ddb89d79b4dec255e5bc4398cfcce65e4
                       4596365423d586da4f25b78d1c3532af2e7a9d22
                       8f86b7e36f98be43d3c1134d2bd3ff35d7204015
                       4ae607e3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [44:ef:60:3c:86:ed:df:d7:e8:75:8f:80:4c:a0:bb:16:8b:32:91:1b]
            modulus: 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
    public exponent: 10001

] 
2021-05-09 01:25:20.271  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-09 01:25:20.272 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-09 01:25:20.273 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-09 01:25:20.274 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-09 01:25:20.274  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-09 01:25:20.275  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-09 01:25:20.276  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-09 01:25:20.276  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-09 01:25:20.277  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-09 01:25:20.281  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-09 01:25:20.282  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-09 01:25:20.282  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-09 01:25:20.283  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-09 01:25:20.440  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-09 01:25:20.440  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-09 01:25:20.441 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-09 01:25:20.442 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-09 01:25:20.443  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1544
2021-05-09 01:25:20.444  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-09 01:25:20.445  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-09 01:25:20.445  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-09 01:25:20.446  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-09 01:25:20.446  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-09 01:25:20.447 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-09 01:25:20.447 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-09 01:25:20.447 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-09 01:25:20.448 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-09 01:25:20.448 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-09 01:25:20.449 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-09 01:25:20.450 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-09 01:25:20.452 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 75647393764761802579210835198800797349368110473
             IssuerDN: UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 09 00:03:43 UTC 2021
           Final Date: Fri May 09 00:03:43 UTC 2031
            SubjectDN: UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f4:e4:9f:f1:14:db:02:e5:fb:2e:03:93:49:e5:ea:b4:c9:22:92:6c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 95797d2b48a31a5458db8c0106ca6e28cb0dc651
                       ca2aa048143cc71673d9d1abfcc8eaf1af1497d5
                       526ee1b504e27797a705e9b9716ca4a1cf5c4265
                       5ec17ce10a96f6fa2cedf4e24bb7c4bc2f69752b
                       68689c73f3125ef2964ea62bb21ee108e6185ffd
                       5697aa8198e6bd3af064ec71626411d2418745fa
                       bc1fc9ec856dddc4811ce702f9a06864447435df
                       a645f73132d4e479bc87ddbb3ad0608ca20ad924
                       e2f851a817c2af6c548e435e22c020b408927a69
                       c9392227acbb33bb93342def2031190337a436fb
                       011bd33aecb6716119d57f97585c8a2f7bf5e437
                       0fcf50c84925cbbde8d0fe31651ed134c5282d55
                       4f8cadf1a01b6bb798d14e8f393e8c7568f27257
                       a5638ddeea3e5506ef1ed923b46631a32de89db8
                       63f09bcaf32313d1708285251cf1a91a05e643b8
                       0a93998af5a862aba72f24829933a745ade0eeac
                       8bc6358ddb89d79b4dec255e5bc4398cfcce65e4
                       4596365423d586da4f25b78d1c3532af2e7a9d22
                       8f86b7e36f98be43d3c1134d2bd3ff35d7204015
                       4ae607e3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [65:c2:ab:06:4b:93:12:97:65:0f:1a:cf:a1:fa:df:ec:76:97:ea:b4]
            modulus: 8dc32620f50a40c0e067a4c9aced057af7ce37ad0d1b4db741baec6052dc0d3b94a6cf0b98135701a1f5bd139ab870f82affe26a8269232a102329c5bb1b5d8ec366204ade5dee11049031bcacac353f530797d425447f344cf9c74449ea3916b4d31dcc6640d82aa16a0247d354803bd6b13ec880efbf81f6bbea9620efb6a25634cf336cb7097c5286a490d08be71d68cfdb725fc2af22e2186836e2890d96fbfbccc3c43baec378a30fcc79c20267ce2ccb649c92982e62c3e361d2017abcc462431d1b49936a1bc0b4205a8d947987a158defbb9273af42864916acc58190f6403804c7a0690fe0ada0972f896824e2c2e1a3a693eddf1e235578cd18a6f
    public exponent: 10001

] 
2021-05-09 01:26:01.778  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-09 01:26:01.779 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-09 01:26:01.780 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-09 01:26:01.781 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-09 01:26:01.781  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-09 01:26:01.782  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-09 01:26:01.782  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-09 01:26:01.783  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-09 01:26:01.783  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-09 01:26:01.787  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-09 01:26:01.788  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-09 01:26:01.788  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-09 01:26:01.789  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-09 01:26:01.946  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-09 01:26:01.947 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-09 01:26:01.949 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-09 01:26:01.949 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-09 01:26:01.950  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-09 01:26:01.951  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-09 01:26:01.951  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-09 01:26:01.952  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-09 01:26:01.953  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-09 01:26:01.955  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-09 01:26:01.955  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-09 01:26:01.956 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-09 01:26:01.957 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-09 01:26:01.958  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1544
2021-05-09 01:26:01.958  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-09 01:26:01.959  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-09 01:26:01.960  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-09 01:26:01.960  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-09 01:26:01.960  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-09 01:26:01.960 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-09 01:26:01.961 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-09 01:26:01.961 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-09 01:26:02.039 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-09 01:26:02.040 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-09 01:26:02.040 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-09 01:26:02.041  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-09 01:26:02.041 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-09 01:26:02.041  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-09 01:26:02.042  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-09 01:26:02.043  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-09 01:26:02.044 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 75647393764761802579210835198800797349368110473
             IssuerDN: UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 09 00:03:43 UTC 2021
           Final Date: Fri May 09 00:03:43 UTC 2031
            SubjectDN: UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f4:e4:9f:f1:14:db:02:e5:fb:2e:03:93:49:e5:ea:b4:c9:22:92:6c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 95797d2b48a31a5458db8c0106ca6e28cb0dc651
                       ca2aa048143cc71673d9d1abfcc8eaf1af1497d5
                       526ee1b504e27797a705e9b9716ca4a1cf5c4265
                       5ec17ce10a96f6fa2cedf4e24bb7c4bc2f69752b
                       68689c73f3125ef2964ea62bb21ee108e6185ffd
                       5697aa8198e6bd3af064ec71626411d2418745fa
                       bc1fc9ec856dddc4811ce702f9a06864447435df
                       a645f73132d4e479bc87ddbb3ad0608ca20ad924
                       e2f851a817c2af6c548e435e22c020b408927a69
                       c9392227acbb33bb93342def2031190337a436fb
                       011bd33aecb6716119d57f97585c8a2f7bf5e437
                       0fcf50c84925cbbde8d0fe31651ed134c5282d55
                       4f8cadf1a01b6bb798d14e8f393e8c7568f27257
                       a5638ddeea3e5506ef1ed923b46631a32de89db8
                       63f09bcaf32313d1708285251cf1a91a05e643b8
                       0a93998af5a862aba72f24829933a745ade0eeac
                       8bc6358ddb89d79b4dec255e5bc4398cfcce65e4
                       4596365423d586da4f25b78d1c3532af2e7a9d22
                       8f86b7e36f98be43d3c1134d2bd3ff35d7204015
                       4ae607e3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [80:92:1a:ed:ee:61:0b:e0:a1:40:b7:32:f5:cb:e7:ef:a4:6d:74:aa]
            modulus: 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
    public exponent: 10001

] 
2021-05-09 01:26:02.092  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-09 01:26:02.093  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-09 01:26:02.093 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-09 01:26:02.140 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-09 01:26:02.141  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1544
2021-05-09 01:26:02.141  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-09 01:26:02.142  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-09 01:26:02.142  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-09 01:26:02.143  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-09 01:26:02.143  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-09 01:26:02.143 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-09 01:26:02.144 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-09 01:26:02.144 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-09 01:26:02.144 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-09 01:26:02.145 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-09 01:26:02.145 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-09 01:26:02.146 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-09 01:26:02.149 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 75647393764761802579210835198800797349368110473
             IssuerDN: UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 09 00:03:43 UTC 2021
           Final Date: Fri May 09 00:03:43 UTC 2031
            SubjectDN: UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f4:e4:9f:f1:14:db:02:e5:fb:2e:03:93:49:e5:ea:b4:c9:22:92:6c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 95797d2b48a31a5458db8c0106ca6e28cb0dc651
                       ca2aa048143cc71673d9d1abfcc8eaf1af1497d5
                       526ee1b504e27797a705e9b9716ca4a1cf5c4265
                       5ec17ce10a96f6fa2cedf4e24bb7c4bc2f69752b
                       68689c73f3125ef2964ea62bb21ee108e6185ffd
                       5697aa8198e6bd3af064ec71626411d2418745fa
                       bc1fc9ec856dddc4811ce702f9a06864447435df
                       a645f73132d4e479bc87ddbb3ad0608ca20ad924
                       e2f851a817c2af6c548e435e22c020b408927a69
                       c9392227acbb33bb93342def2031190337a436fb
                       011bd33aecb6716119d57f97585c8a2f7bf5e437
                       0fcf50c84925cbbde8d0fe31651ed134c5282d55
                       4f8cadf1a01b6bb798d14e8f393e8c7568f27257
                       a5638ddeea3e5506ef1ed923b46631a32de89db8
                       63f09bcaf32313d1708285251cf1a91a05e643b8
                       0a93998af5a862aba72f24829933a745ade0eeac
                       8bc6358ddb89d79b4dec255e5bc4398cfcce65e4
                       4596365423d586da4f25b78d1c3532af2e7a9d22
                       8f86b7e36f98be43d3c1134d2bd3ff35d7204015
                       4ae607e3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [76:55:e1:90:4c:0f:7b:53:83:12:ae:41:28:6f:ec:4a:60:1b:5d:54]
            modulus: 86a03b6b1ff63d9acb97f54efce87b390885195ba81824db301f3b7407a71da62fc8c568fbfd514e04e14a68fb8a90abde7ebd3847a3230dfbf4e95dc8a0b52d1584248bea3b9a45854f042abcbb10514cbd1877b115206c07593fd4dc11b96106dbe6043a9a43a2d565b2a60885fc05626739098061e74725201a9bd006f9f02b46d83e3fa0505ae98039b95ef181df8ff8844dd9d08091466c1b14051202664e5f7481f9787d8501d6662ac5e75d1c6458a5fc4072079fb1f49fc270df00ab737fd59d7129d5c497c4ec4f21e57d344df1caff40c81e0d28c41e905baa32cbaea321369c3fabc1f86e800013c18010a0161c6a5981805d088a53a064160009
    public exponent: 10001

] 
2021-05-09 01:26:30.950  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-09 01:26:30.951 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-09 01:26:30.952 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-09 01:26:30.952 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-09 01:26:30.952  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-09 01:26:30.953  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-09 01:26:30.953  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-09 01:26:30.954  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-09 01:26:30.954  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-09 01:26:30.958  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-09 01:26:30.959  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-09 01:26:30.959  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-09 01:26:30.960  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-09 01:26:31.039  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-09 01:26:31.040  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-09 01:26:31.040 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-09 01:26:31.041 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-09 01:26:31.042  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1544
2021-05-09 01:26:31.042  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-09 01:26:31.043  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-09 01:26:31.043  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-09 01:26:31.044  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-09 01:26:31.044  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-09 01:26:31.044 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-09 01:26:31.045 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-09 01:26:31.045 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-09 01:26:31.046 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-09 01:26:31.046 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-09 01:26:31.046 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-09 01:26:31.047 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-09 01:26:31.049 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 75647393764761802579210835198800797349368110473
             IssuerDN: UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 09 00:03:43 UTC 2021
           Final Date: Fri May 09 00:03:43 UTC 2031
            SubjectDN: UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f4:e4:9f:f1:14:db:02:e5:fb:2e:03:93:49:e5:ea:b4:c9:22:92:6c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 95797d2b48a31a5458db8c0106ca6e28cb0dc651
                       ca2aa048143cc71673d9d1abfcc8eaf1af1497d5
                       526ee1b504e27797a705e9b9716ca4a1cf5c4265
                       5ec17ce10a96f6fa2cedf4e24bb7c4bc2f69752b
                       68689c73f3125ef2964ea62bb21ee108e6185ffd
                       5697aa8198e6bd3af064ec71626411d2418745fa
                       bc1fc9ec856dddc4811ce702f9a06864447435df
                       a645f73132d4e479bc87ddbb3ad0608ca20ad924
                       e2f851a817c2af6c548e435e22c020b408927a69
                       c9392227acbb33bb93342def2031190337a436fb
                       011bd33aecb6716119d57f97585c8a2f7bf5e437
                       0fcf50c84925cbbde8d0fe31651ed134c5282d55
                       4f8cadf1a01b6bb798d14e8f393e8c7568f27257
                       a5638ddeea3e5506ef1ed923b46631a32de89db8
                       63f09bcaf32313d1708285251cf1a91a05e643b8
                       0a93998af5a862aba72f24829933a745ade0eeac
                       8bc6358ddb89d79b4dec255e5bc4398cfcce65e4
                       4596365423d586da4f25b78d1c3532af2e7a9d22
                       8f86b7e36f98be43d3c1134d2bd3ff35d7204015
                       4ae607e3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [28:68:74:24:12:f8:ba:73:cf:8a:62:2f:92:de:39:78:6c:55:dd:c2]
            modulus: 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
    public exponent: 10001

] 
2021-05-09 01:28:17.590  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-09 01:28:17.591 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-09 01:28:17.592 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-09 01:28:17.592 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-09 01:28:17.593  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-09 01:28:17.593  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-09 01:28:17.594  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-09 01:28:17.594  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-09 01:28:17.594  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-09 01:28:17.598  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-09 01:28:17.598  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-09 01:28:17.599  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-09 01:28:17.600  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-09 01:28:17.684  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-09 01:28:17.685  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-09 01:28:17.685 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-09 01:28:17.687 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-09 01:28:17.687  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1544
2021-05-09 01:28:17.688  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-09 01:28:17.690  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-09 01:28:17.690  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-09 01:28:17.691  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-09 01:28:17.691  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-09 01:28:17.692 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-09 01:28:17.692 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-09 01:28:17.692 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-09 01:28:17.693 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-09 01:28:17.694 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-09 01:28:17.694 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-09 01:28:17.695 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-09 01:28:17.699 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 75647393764761802579210835198800797349368110473
             IssuerDN: UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 09 00:03:43 UTC 2021
           Final Date: Fri May 09 00:03:43 UTC 2031
            SubjectDN: UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f4:e4:9f:f1:14:db:02:e5:fb:2e:03:93:49:e5:ea:b4:c9:22:92:6c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 95797d2b48a31a5458db8c0106ca6e28cb0dc651
                       ca2aa048143cc71673d9d1abfcc8eaf1af1497d5
                       526ee1b504e27797a705e9b9716ca4a1cf5c4265
                       5ec17ce10a96f6fa2cedf4e24bb7c4bc2f69752b
                       68689c73f3125ef2964ea62bb21ee108e6185ffd
                       5697aa8198e6bd3af064ec71626411d2418745fa
                       bc1fc9ec856dddc4811ce702f9a06864447435df
                       a645f73132d4e479bc87ddbb3ad0608ca20ad924
                       e2f851a817c2af6c548e435e22c020b408927a69
                       c9392227acbb33bb93342def2031190337a436fb
                       011bd33aecb6716119d57f97585c8a2f7bf5e437
                       0fcf50c84925cbbde8d0fe31651ed134c5282d55
                       4f8cadf1a01b6bb798d14e8f393e8c7568f27257
                       a5638ddeea3e5506ef1ed923b46631a32de89db8
                       63f09bcaf32313d1708285251cf1a91a05e643b8
                       0a93998af5a862aba72f24829933a745ade0eeac
                       8bc6358ddb89d79b4dec255e5bc4398cfcce65e4
                       4596365423d586da4f25b78d1c3532af2e7a9d22
                       8f86b7e36f98be43d3c1134d2bd3ff35d7204015
                       4ae607e3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ce:f4:ff:cc:a6:e4:c8:d2:b0:48:55:56:fe:b8:06:26:81:cc:68:0e]
            modulus: ce8e8a1e72e7ac05a183b36f80b9ea419fa0cf2ee16284ae265d4a149c951f60532ebcd9b6e99303d7b16b9c7fac31b7bb191c8b3d57cd23b9ce26a5b8117448d6f871b8008de361bdae0e555b3fbf9de3f22439a081eea412f64b96296fee38f0f6e68799d12a5efaf5ae3e84132018522edb156bbfe5d181cc7124ad4269395cc78c2c51babc86662e81424095c02481cd81b2a55020d3418e51e34907b8bdf0124c4a1c335f7418138a435c606f30ea7952fadafb381b80dc8468f635efb22c787fa3a7bc2493f63db7b3e3faf33b9d83eaa7584cafabb1c89afcf7cb54a325ac611de3dae10d71e59884d0ad72c1c329db38ccb77f24a57845451ea03eb1
    public exponent: 10001

] 
2021-05-09 01:28:19.842  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-09 01:28:19.843 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-09 01:28:19.844 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-09 01:28:19.845 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-09 01:28:19.845  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-09 01:28:19.845  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-09 01:28:19.846  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-09 01:28:19.846  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-09 01:28:19.846  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-09 01:28:19.851  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-09 01:28:19.852  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-09 01:28:19.852  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-09 01:28:19.853  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-09 01:28:19.936  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-09 01:28:19.936  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-09 01:28:19.937 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-09 01:28:19.939 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-09 01:28:19.940  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1544
2021-05-09 01:28:19.940  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-09 01:28:19.942  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-09 01:28:19.942  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-09 01:28:19.943  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-09 01:28:19.943  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-09 01:28:19.943 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-09 01:28:19.943 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-09 01:28:19.944 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-09 01:28:19.944 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-09 01:28:19.944 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-09 01:28:19.944 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-09 01:28:19.945 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-09 01:28:19.947 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 75647393764761802579210835198800797349368110473
             IssuerDN: UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 09 00:03:43 UTC 2021
           Final Date: Fri May 09 00:03:43 UTC 2031
            SubjectDN: UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f4:e4:9f:f1:14:db:02:e5:fb:2e:03:93:49:e5:ea:b4:c9:22:92:6c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 95797d2b48a31a5458db8c0106ca6e28cb0dc651
                       ca2aa048143cc71673d9d1abfcc8eaf1af1497d5
                       526ee1b504e27797a705e9b9716ca4a1cf5c4265
                       5ec17ce10a96f6fa2cedf4e24bb7c4bc2f69752b
                       68689c73f3125ef2964ea62bb21ee108e6185ffd
                       5697aa8198e6bd3af064ec71626411d2418745fa
                       bc1fc9ec856dddc4811ce702f9a06864447435df
                       a645f73132d4e479bc87ddbb3ad0608ca20ad924
                       e2f851a817c2af6c548e435e22c020b408927a69
                       c9392227acbb33bb93342def2031190337a436fb
                       011bd33aecb6716119d57f97585c8a2f7bf5e437
                       0fcf50c84925cbbde8d0fe31651ed134c5282d55
                       4f8cadf1a01b6bb798d14e8f393e8c7568f27257
                       a5638ddeea3e5506ef1ed923b46631a32de89db8
                       63f09bcaf32313d1708285251cf1a91a05e643b8
                       0a93998af5a862aba72f24829933a745ade0eeac
                       8bc6358ddb89d79b4dec255e5bc4398cfcce65e4
                       4596365423d586da4f25b78d1c3532af2e7a9d22
                       8f86b7e36f98be43d3c1134d2bd3ff35d7204015
                       4ae607e3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c1:8a:35:12:a1:7a:4a:cc:ce:50:f8:da:82:f4:e1:bc:c5:c3:57:a1]
            modulus: 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
    public exponent: 10001

] 
2021-05-09 01:30:53.329  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-09 01:30:53.330 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-09 01:30:53.331 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-09 01:30:53.331 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-09 01:30:53.331  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-09 01:30:53.332  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-09 01:30:53.332  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-09 01:30:53.332  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-09 01:30:53.333  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-09 01:30:53.336  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-09 01:30:53.337  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-09 01:30:53.337  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-09 01:30:53.338  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-09 01:30:53.432  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-09 01:30:53.432  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-09 01:30:53.433 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-09 01:30:53.439 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-09 01:30:53.440  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1544
2021-05-09 01:30:53.440  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-09 01:30:53.441  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-09 01:30:53.442  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-09 01:30:53.442  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-09 01:30:53.442  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-09 01:30:53.442 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-09 01:30:53.443 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-09 01:30:53.443 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-09 01:30:53.443 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-09 01:30:53.443 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-09 01:30:53.444 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-09 01:30:53.444 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-09 01:30:53.446 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 75647393764761802579210835198800797349368110473
             IssuerDN: UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 09 00:03:43 UTC 2021
           Final Date: Fri May 09 00:03:43 UTC 2031
            SubjectDN: UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f4:e4:9f:f1:14:db:02:e5:fb:2e:03:93:49:e5:ea:b4:c9:22:92:6c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 95797d2b48a31a5458db8c0106ca6e28cb0dc651
                       ca2aa048143cc71673d9d1abfcc8eaf1af1497d5
                       526ee1b504e27797a705e9b9716ca4a1cf5c4265
                       5ec17ce10a96f6fa2cedf4e24bb7c4bc2f69752b
                       68689c73f3125ef2964ea62bb21ee108e6185ffd
                       5697aa8198e6bd3af064ec71626411d2418745fa
                       bc1fc9ec856dddc4811ce702f9a06864447435df
                       a645f73132d4e479bc87ddbb3ad0608ca20ad924
                       e2f851a817c2af6c548e435e22c020b408927a69
                       c9392227acbb33bb93342def2031190337a436fb
                       011bd33aecb6716119d57f97585c8a2f7bf5e437
                       0fcf50c84925cbbde8d0fe31651ed134c5282d55
                       4f8cadf1a01b6bb798d14e8f393e8c7568f27257
                       a5638ddeea3e5506ef1ed923b46631a32de89db8
                       63f09bcaf32313d1708285251cf1a91a05e643b8
                       0a93998af5a862aba72f24829933a745ade0eeac
                       8bc6358ddb89d79b4dec255e5bc4398cfcce65e4
                       4596365423d586da4f25b78d1c3532af2e7a9d22
                       8f86b7e36f98be43d3c1134d2bd3ff35d7204015
                       4ae607e3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [57:eb:02:98:4c:2e:bf:ac:fc:2b:93:a9:5e:27:f4:e5:45:b3:35:73]
            modulus: 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
    public exponent: 10001

] 
2021-05-09 01:33:49.784  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-09 01:33:49.786 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-09 01:33:49.787 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-09 01:33:49.787 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-09 01:33:49.787  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-09 01:33:49.788  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-09 01:33:49.788  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-09 01:33:49.789  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-09 01:33:49.789  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-09 01:33:49.793  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-09 01:33:49.793  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-09 01:33:49.794  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-09 01:33:49.795  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-09 01:33:49.881  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-09 01:33:49.881  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-09 01:33:49.882 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-09 01:33:49.883 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-09 01:33:49.883  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1544
2021-05-09 01:33:49.883  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-09 01:33:49.884  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-09 01:33:49.885  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-09 01:33:49.885  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-09 01:33:49.885  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-09 01:33:49.886 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-09 01:33:49.886 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-09 01:33:49.886 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-09 01:33:49.887 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-09 01:33:49.887 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-09 01:33:49.887 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-09 01:33:49.888 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-09 01:33:49.890 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 75647393764761802579210835198800797349368110473
             IssuerDN: UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 09 00:03:43 UTC 2021
           Final Date: Fri May 09 00:03:43 UTC 2031
            SubjectDN: UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f4:e4:9f:f1:14:db:02:e5:fb:2e:03:93:49:e5:ea:b4:c9:22:92:6c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 95797d2b48a31a5458db8c0106ca6e28cb0dc651
                       ca2aa048143cc71673d9d1abfcc8eaf1af1497d5
                       526ee1b504e27797a705e9b9716ca4a1cf5c4265
                       5ec17ce10a96f6fa2cedf4e24bb7c4bc2f69752b
                       68689c73f3125ef2964ea62bb21ee108e6185ffd
                       5697aa8198e6bd3af064ec71626411d2418745fa
                       bc1fc9ec856dddc4811ce702f9a06864447435df
                       a645f73132d4e479bc87ddbb3ad0608ca20ad924
                       e2f851a817c2af6c548e435e22c020b408927a69
                       c9392227acbb33bb93342def2031190337a436fb
                       011bd33aecb6716119d57f97585c8a2f7bf5e437
                       0fcf50c84925cbbde8d0fe31651ed134c5282d55
                       4f8cadf1a01b6bb798d14e8f393e8c7568f27257
                       a5638ddeea3e5506ef1ed923b46631a32de89db8
                       63f09bcaf32313d1708285251cf1a91a05e643b8
                       0a93998af5a862aba72f24829933a745ade0eeac
                       8bc6358ddb89d79b4dec255e5bc4398cfcce65e4
                       4596365423d586da4f25b78d1c3532af2e7a9d22
                       8f86b7e36f98be43d3c1134d2bd3ff35d7204015
                       4ae607e3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9f:ac:25:32:c3:22:03:87:b0:76:b3:78:21:d8:08:ce:00:dc:78:f2]
            modulus: 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
    public exponent: 10001

] 
2021-05-09 01:35:25.616  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-09 01:35:25.617 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-09 01:35:25.618 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-09 01:35:25.618 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-09 01:35:25.619  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-09 01:35:25.619  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-09 01:35:25.619  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-09 01:35:25.619  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-09 01:35:25.620  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-09 01:35:25.623  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-09 01:35:25.624  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-09 01:35:25.624  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-09 01:35:25.625  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-09 01:35:25.715  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-09 01:35:25.715  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-09 01:35:25.715 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-09 01:35:25.716 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-09 01:35:25.717  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1544
2021-05-09 01:35:25.717  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-09 01:35:25.718  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-09 01:35:25.718  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-09 01:35:25.719  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-09 01:35:25.719  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-09 01:35:25.719 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-09 01:35:25.719 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-09 01:35:25.719 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-09 01:35:25.720 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-09 01:35:25.720 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-09 01:35:25.720 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-09 01:35:25.721 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-09 01:35:25.723 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 75647393764761802579210835198800797349368110473
             IssuerDN: UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 09 00:03:43 UTC 2021
           Final Date: Fri May 09 00:03:43 UTC 2031
            SubjectDN: UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f4:e4:9f:f1:14:db:02:e5:fb:2e:03:93:49:e5:ea:b4:c9:22:92:6c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 95797d2b48a31a5458db8c0106ca6e28cb0dc651
                       ca2aa048143cc71673d9d1abfcc8eaf1af1497d5
                       526ee1b504e27797a705e9b9716ca4a1cf5c4265
                       5ec17ce10a96f6fa2cedf4e24bb7c4bc2f69752b
                       68689c73f3125ef2964ea62bb21ee108e6185ffd
                       5697aa8198e6bd3af064ec71626411d2418745fa
                       bc1fc9ec856dddc4811ce702f9a06864447435df
                       a645f73132d4e479bc87ddbb3ad0608ca20ad924
                       e2f851a817c2af6c548e435e22c020b408927a69
                       c9392227acbb33bb93342def2031190337a436fb
                       011bd33aecb6716119d57f97585c8a2f7bf5e437
                       0fcf50c84925cbbde8d0fe31651ed134c5282d55
                       4f8cadf1a01b6bb798d14e8f393e8c7568f27257
                       a5638ddeea3e5506ef1ed923b46631a32de89db8
                       63f09bcaf32313d1708285251cf1a91a05e643b8
                       0a93998af5a862aba72f24829933a745ade0eeac
                       8bc6358ddb89d79b4dec255e5bc4398cfcce65e4
                       4596365423d586da4f25b78d1c3532af2e7a9d22
                       8f86b7e36f98be43d3c1134d2bd3ff35d7204015
                       4ae607e3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ac:ee:91:ae:7e:b2:28:46:83:61:52:ac:c3:09:f5:62:2d:92:b2:87]
            modulus: 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
    public exponent: 10001

] 
2021-05-09 01:36:57.243  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-09 01:36:57.244 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-09 01:36:57.245 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-09 01:36:57.245 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-09 01:36:57.246  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-09 01:36:57.246  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-09 01:36:57.246  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-09 01:36:57.246  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-09 01:36:57.247  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-09 01:36:57.250  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-09 01:36:57.251  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-09 01:36:57.251  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-09 01:36:57.252  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-09 01:36:57.439  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-09 01:36:57.439  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-09 01:36:57.440 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-09 01:36:57.441 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-09 01:36:57.441  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1544
2021-05-09 01:36:57.442  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-09 01:36:57.443  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-09 01:36:57.443  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-09 01:36:57.444  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-09 01:36:57.444  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-09 01:36:57.445 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-09 01:36:57.445 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-09 01:36:57.445 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-09 01:36:57.446 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-09 01:36:57.446 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-09 01:36:57.446 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-09 01:36:57.447 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-09 01:36:57.451 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 75647393764761802579210835198800797349368110473
             IssuerDN: UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 09 00:03:43 UTC 2021
           Final Date: Fri May 09 00:03:43 UTC 2031
            SubjectDN: UID=c-053da7e8ca5a7dfb3,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f4:e4:9f:f1:14:db:02:e5:fb:2e:03:93:49:e5:ea:b4:c9:22:92:6c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 95797d2b48a31a5458db8c0106ca6e28cb0dc651
                       ca2aa048143cc71673d9d1abfcc8eaf1af1497d5
                       526ee1b504e27797a705e9b9716ca4a1cf5c4265
                       5ec17ce10a96f6fa2cedf4e24bb7c4bc2f69752b
                       68689c73f3125ef2964ea62bb21ee108e6185ffd
                       5697aa8198e6bd3af064ec71626411d2418745fa
                       bc1fc9ec856dddc4811ce702f9a06864447435df
                       a645f73132d4e479bc87ddbb3ad0608ca20ad924
                       e2f851a817c2af6c548e435e22c020b408927a69
                       c9392227acbb33bb93342def2031190337a436fb
                       011bd33aecb6716119d57f97585c8a2f7bf5e437
                       0fcf50c84925cbbde8d0fe31651ed134c5282d55
                       4f8cadf1a01b6bb798d14e8f393e8c7568f27257
                       a5638ddeea3e5506ef1ed923b46631a32de89db8
                       63f09bcaf32313d1708285251cf1a91a05e643b8
                       0a93998af5a862aba72f24829933a745ade0eeac
                       8bc6358ddb89d79b4dec255e5bc4398cfcce65e4
                       4596365423d586da4f25b78d1c3532af2e7a9d22
                       8f86b7e36f98be43d3c1134d2bd3ff35d7204015
                       4ae607e3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [39:45:72:6e:e8:66:2c:46:06:f4:01:a0:57:5a:39:36:5a:c2:5e:e9]
            modulus: 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
    public exponent: 10001

]