Results

By type

          2021-05-10 00:10:43,581 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-05-10 00:10:46,992 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-05-10 00:10:49.481  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-05-10 00:11:00.094 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-05-10 00:11:01.092  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-05-10 00:11:01.873  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-05-10 00:11:13.771  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 32.096 seconds (JVM running for 38.606)
2021-05-10 00:13:37.072  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-10 00:13:37.082 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-10 00:13:37.284 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-10 00:13:37.288 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-10 00:13:37.300  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-10 00:13:37.373  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-10 00:13:37.378  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-10 00:13:37.379  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-10 00:13:37.379  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-10 00:13:37.473  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-10 00:13:37.477  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-10 00:13:37.579  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-10 00:13:37.586  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-10 00:13:37.586  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-10 00:13:37.679  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-10 00:13:38.979  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-10 00:13:38.982  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-10 00:13:38.983 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-10 00:13:39.071 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-10 00:13:39.073  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1980
2021-05-10 00:13:39.073  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-10 00:13:39.078  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-10 00:13:39.078  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-10 00:13:39.176  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-10 00:13:39.178  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-10 00:13:39.179 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-10 00:13:39.180 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-10 00:13:39.181 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-10 00:13:39.283 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-10 00:13:39.284 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-10 00:13:39.284 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-10 00:13:39.378 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-10 00:13:39.485 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 364571985512465144543371235995291044537847502198
             IssuerDN: UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 10 00:06:37 UTC 2021
           Final Date: Sat May 10 00:06:37 UTC 2031
            SubjectDN: UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:5a:ae:94:c5:df:d8:b3:30:70:7f:65:80:65:ac:8e:19:dd:07:ea]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1b818988428ab25a7b4408b23ff02839482245d0
                       2e9ffd4e746f6ed74c58f3a98e5c8ef65e6f19c3
                       5bdf18cadf5a1871c6a46f9865ae5982548db4fe
                       3ddbdd68204d8ad12b9087344591bdd3c66aeec4
                       351463bf0bf744d31199391aa0682484bb383c6d
                       5779a45acb613e54ae502a0463c660b9c392bc40
                       bcd3fde8708848f8c56711df661fc95064f653f6
                       68167fd215b2e97fb1cc3ef18a51e91e1bc35b81
                       5280bdfe20bb4565677fef7140f58fbff507d6fe
                       1b2f8de4226786124a34a7b471dfee70438bc7d1
                       923cb3095b94fa1d812e9b954ba932e1441d75d4
                       41dfb26c6f5749694505b9b085f0dd39b9d8e689
                       3d4f9ffe81f14383036f28a888c4be52864a36aa
                       53b2ff2274a37836602cf611b50fc551ec737de3
                       4b30b78c952413142550054419feaa3402685d04
                       62e5a5fa4a1aae83726015da7822710f2e5f30b2
                       d67ec93b680c7ae2bc0a0c4a7a0456fbcc2fb09d
                       7c34949727808add7f64e3f0f5a02b2789d19ca8
                       84d1b92499b7b67c8b1d1e41609cf56fe9a1ffc5
                       4d06f9de
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [33:4e:59:d7:72:43:12:96:91:de:43:8b:07:97:2b:11:49:d5:ac:04]
            modulus: 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
    public exponent: 10001

] 
2021-05-10 01:09:24.685  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-10 01:09:24.687 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-10 01:09:24.689 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-10 01:09:24.690 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-10 01:09:24.690  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-10 01:09:24.691  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-10 01:09:24.692  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-10 01:09:24.692  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-10 01:09:24.693  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-10 01:09:24.704  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-10 01:09:24.705  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-10 01:09:24.705  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-10 01:09:24.708  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-10 01:09:24.961  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-10 01:09:24.971  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-10 01:09:24.971 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-10 01:09:24.973 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-10 01:09:24.974  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1980
2021-05-10 01:09:24.974  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-10 01:09:24.978  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-10 01:09:24.979  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-10 01:09:24.979  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-10 01:09:24.979  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-10 01:09:24.980 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-10 01:09:24.980 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-10 01:09:24.981 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-10 01:09:24.982 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-10 01:09:24.982 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-10 01:09:24.982 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-10 01:09:24.983 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-10 01:09:25.071 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 364571985512465144543371235995291044537847502198
             IssuerDN: UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 10 00:06:37 UTC 2021
           Final Date: Sat May 10 00:06:37 UTC 2031
            SubjectDN: UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:5a:ae:94:c5:df:d8:b3:30:70:7f:65:80:65:ac:8e:19:dd:07:ea]
            modulus: a85cc0f9ba7b9aafa87925dd11e9a29b9c96713eee987a07d848d98291205dd2b65c9dec2e41086f78ab75d780349cf17a3595f04e3d836c20ba9a9ffd2243bb8e629f788adb1d50d37fe3b9b79f54355f4d2df7d60ecdb715aeae976f19f62ccea9bfd103f3d4d03d18505f1c6c59bfcd182acd755e7f745c27e8f1c5afb85274f926cb58d70b55cc73bd448882ff74e26f95411f6ee80f577417db2c07548ae0931a5575a6056c220f8c61706dc643f645ae69612c85c2c9369f5cc0fd786dd9b5697beaa1345487974e65abf48b58ceda566924d2ac24cbc5f588fc6e2d3abd8cd40c8f3c86d380bea0fee9141004d4de8391236b8c8acfa538d903b6ea2d5f8b9100db65b40704a91709830b8f22d514a337f782b12719fb89f654ef4cff7c611f5237ad508edf4cf3be8277ac966e6719eb13c2d45ea63be438364da36cc6b72f13fe6f5e98bc64b3b89485ee53f1e6b4e99184209a4505efe2772416d690ff3da901009fc3bf0866a575a96b043c02d8ae48fdcae93832bbbaf6b8e7ab
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1b818988428ab25a7b4408b23ff02839482245d0
                       2e9ffd4e746f6ed74c58f3a98e5c8ef65e6f19c3
                       5bdf18cadf5a1871c6a46f9865ae5982548db4fe
                       3ddbdd68204d8ad12b9087344591bdd3c66aeec4
                       351463bf0bf744d31199391aa0682484bb383c6d
                       5779a45acb613e54ae502a0463c660b9c392bc40
                       bcd3fde8708848f8c56711df661fc95064f653f6
                       68167fd215b2e97fb1cc3ef18a51e91e1bc35b81
                       5280bdfe20bb4565677fef7140f58fbff507d6fe
                       1b2f8de4226786124a34a7b471dfee70438bc7d1
                       923cb3095b94fa1d812e9b954ba932e1441d75d4
                       41dfb26c6f5749694505b9b085f0dd39b9d8e689
                       3d4f9ffe81f14383036f28a888c4be52864a36aa
                       53b2ff2274a37836602cf611b50fc551ec737de3
                       4b30b78c952413142550054419feaa3402685d04
                       62e5a5fa4a1aae83726015da7822710f2e5f30b2
                       d67ec93b680c7ae2bc0a0c4a7a0456fbcc2fb09d
                       7c34949727808add7f64e3f0f5a02b2789d19ca8
                       84d1b92499b7b67c8b1d1e41609cf56fe9a1ffc5
                       4d06f9de
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bb:9a:5e:e6:88:ac:57:9d:21:5f:96:99:79:6d:a0:7a:d4:19:56:6a]
            modulus: 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
    public exponent: 10001

] 
2021-05-10 01:10:34.216  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-10 01:10:34.218 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-10 01:10:34.219 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-10 01:10:34.220 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-10 01:10:34.221  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-10 01:10:34.221  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-10 01:10:34.222  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-10 01:10:34.222  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-10 01:10:34.223  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-10 01:10:34.229  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-10 01:10:34.229  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-10 01:10:34.230  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-10 01:10:34.233  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-10 01:10:34.476  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-10 01:10:34.477  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-10 01:10:34.477 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-10 01:10:34.480 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-10 01:10:34.480  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1980
2021-05-10 01:10:34.481  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-10 01:10:34.482  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-10 01:10:34.483  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-10 01:10:34.483  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-10 01:10:34.484  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-10 01:10:34.485 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-10 01:10:34.485 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-10 01:10:34.485 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-10 01:10:34.487 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-10 01:10:34.487 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-10 01:10:34.487 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-10 01:10:34.488 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-10 01:10:34.571 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 364571985512465144543371235995291044537847502198
             IssuerDN: UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 10 00:06:37 UTC 2021
           Final Date: Sat May 10 00:06:37 UTC 2031
            SubjectDN: UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:5a:ae:94:c5:df:d8:b3:30:70:7f:65:80:65:ac:8e:19:dd:07:ea]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1b818988428ab25a7b4408b23ff02839482245d0
                       2e9ffd4e746f6ed74c58f3a98e5c8ef65e6f19c3
                       5bdf18cadf5a1871c6a46f9865ae5982548db4fe
                       3ddbdd68204d8ad12b9087344591bdd3c66aeec4
                       351463bf0bf744d31199391aa0682484bb383c6d
                       5779a45acb613e54ae502a0463c660b9c392bc40
                       bcd3fde8708848f8c56711df661fc95064f653f6
                       68167fd215b2e97fb1cc3ef18a51e91e1bc35b81
                       5280bdfe20bb4565677fef7140f58fbff507d6fe
                       1b2f8de4226786124a34a7b471dfee70438bc7d1
                       923cb3095b94fa1d812e9b954ba932e1441d75d4
                       41dfb26c6f5749694505b9b085f0dd39b9d8e689
                       3d4f9ffe81f14383036f28a888c4be52864a36aa
                       53b2ff2274a37836602cf611b50fc551ec737de3
                       4b30b78c952413142550054419feaa3402685d04
                       62e5a5fa4a1aae83726015da7822710f2e5f30b2
                       d67ec93b680c7ae2bc0a0c4a7a0456fbcc2fb09d
                       7c34949727808add7f64e3f0f5a02b2789d19ca8
                       84d1b92499b7b67c8b1d1e41609cf56fe9a1ffc5
                       4d06f9de
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [54:c5:ed:c8:b7:70:fb:ea:a6:b9:23:26:55:88:5e:b9:84:b0:c1:5a]
            modulus: 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
    public exponent: 10001

] 
2021-05-10 01:13:21.496  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-10 01:13:21.498 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-10 01:13:21.499 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-10 01:13:21.500 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-10 01:13:21.500  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-10 01:13:21.501  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-10 01:13:21.502  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-10 01:13:21.502  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-10 01:13:21.503  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-10 01:13:21.507  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-10 01:13:21.508  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-10 01:13:21.508  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-10 01:13:21.510  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-10 01:13:21.652  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-10 01:13:21.670  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-10 01:13:21.671 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-10 01:13:21.674 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-10 01:13:21.675  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1980
2021-05-10 01:13:21.676  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-10 01:13:21.678  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-10 01:13:21.679  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-10 01:13:21.679  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-10 01:13:21.680  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-10 01:13:21.681 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-10 01:13:21.681 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-10 01:13:21.682 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-10 01:13:21.682 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-10 01:13:21.683 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-10 01:13:21.684 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-10 01:13:21.685 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-10 01:13:21.689 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 364571985512465144543371235995291044537847502198
             IssuerDN: UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 10 00:06:37 UTC 2021
           Final Date: Sat May 10 00:06:37 UTC 2031
            SubjectDN: UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:5a:ae:94:c5:df:d8:b3:30:70:7f:65:80:65:ac:8e:19:dd:07:ea]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1b818988428ab25a7b4408b23ff02839482245d0
                       2e9ffd4e746f6ed74c58f3a98e5c8ef65e6f19c3
                       5bdf18cadf5a1871c6a46f9865ae5982548db4fe
                       3ddbdd68204d8ad12b9087344591bdd3c66aeec4
                       351463bf0bf744d31199391aa0682484bb383c6d
                       5779a45acb613e54ae502a0463c660b9c392bc40
                       bcd3fde8708848f8c56711df661fc95064f653f6
                       68167fd215b2e97fb1cc3ef18a51e91e1bc35b81
                       5280bdfe20bb4565677fef7140f58fbff507d6fe
                       1b2f8de4226786124a34a7b471dfee70438bc7d1
                       923cb3095b94fa1d812e9b954ba932e1441d75d4
                       41dfb26c6f5749694505b9b085f0dd39b9d8e689
                       3d4f9ffe81f14383036f28a888c4be52864a36aa
                       53b2ff2274a37836602cf611b50fc551ec737de3
                       4b30b78c952413142550054419feaa3402685d04
                       62e5a5fa4a1aae83726015da7822710f2e5f30b2
                       d67ec93b680c7ae2bc0a0c4a7a0456fbcc2fb09d
                       7c34949727808add7f64e3f0f5a02b2789d19ca8
                       84d1b92499b7b67c8b1d1e41609cf56fe9a1ffc5
                       4d06f9de
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a1:fc:69:23:9a:cb:9e:24:42:91:13:52:e4:f5:d7:d4:7a:ed:56:7a]
            modulus: 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
    public exponent: 10001

] 
2021-05-10 01:13:57.759  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-10 01:13:57.760 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-10 01:13:57.761 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-10 01:13:57.762 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-10 01:13:57.763  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-10 01:13:57.763  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-10 01:13:57.764  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-10 01:13:57.764  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-10 01:13:57.764  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-10 01:13:57.769  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-10 01:13:57.769  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-10 01:13:57.770  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-10 01:13:57.771  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-10 01:13:57.890  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-10 01:13:57.890  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-10 01:13:57.891 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-10 01:13:57.892 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-10 01:13:57.893  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1980
2021-05-10 01:13:57.893  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-10 01:13:57.895  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-10 01:13:57.896  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-10 01:13:57.896  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-10 01:13:57.896  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-10 01:13:57.897 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-10 01:13:57.897 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-10 01:13:57.897 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-10 01:13:57.898 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-10 01:13:57.898 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-10 01:13:57.899 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-10 01:13:57.900 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-10 01:13:57.905 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 364571985512465144543371235995291044537847502198
             IssuerDN: UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 10 00:06:37 UTC 2021
           Final Date: Sat May 10 00:06:37 UTC 2031
            SubjectDN: UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:5a:ae:94:c5:df:d8:b3:30:70:7f:65:80:65:ac:8e:19:dd:07:ea]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1b818988428ab25a7b4408b23ff02839482245d0
                       2e9ffd4e746f6ed74c58f3a98e5c8ef65e6f19c3
                       5bdf18cadf5a1871c6a46f9865ae5982548db4fe
                       3ddbdd68204d8ad12b9087344591bdd3c66aeec4
                       351463bf0bf744d31199391aa0682484bb383c6d
                       5779a45acb613e54ae502a0463c660b9c392bc40
                       bcd3fde8708848f8c56711df661fc95064f653f6
                       68167fd215b2e97fb1cc3ef18a51e91e1bc35b81
                       5280bdfe20bb4565677fef7140f58fbff507d6fe
                       1b2f8de4226786124a34a7b471dfee70438bc7d1
                       923cb3095b94fa1d812e9b954ba932e1441d75d4
                       41dfb26c6f5749694505b9b085f0dd39b9d8e689
                       3d4f9ffe81f14383036f28a888c4be52864a36aa
                       53b2ff2274a37836602cf611b50fc551ec737de3
                       4b30b78c952413142550054419feaa3402685d04
                       62e5a5fa4a1aae83726015da7822710f2e5f30b2
                       d67ec93b680c7ae2bc0a0c4a7a0456fbcc2fb09d
                       7c34949727808add7f64e3f0f5a02b2789d19ca8
                       84d1b92499b7b67c8b1d1e41609cf56fe9a1ffc5
                       4d06f9de
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b8:21:b6:9f:06:55:20:02:1c:12:07:79:ad:a1:3b:07:9a:90:ab:b1]
            modulus: 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
    public exponent: 10001

] 
2021-05-10 01:14:34.210  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-10 01:14:34.211 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-10 01:14:34.213 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-10 01:14:34.213 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-10 01:14:34.214  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-10 01:14:34.214  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-10 01:14:34.215  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-10 01:14:34.215  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-10 01:14:34.215  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-10 01:14:34.220  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-10 01:14:34.221  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-10 01:14:34.221  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-10 01:14:34.222  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-10 01:14:34.388  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-10 01:14:34.389  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-10 01:14:34.389 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-10 01:14:34.391 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-10 01:14:34.391  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1980
2021-05-10 01:14:34.391  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-10 01:14:34.393  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-10 01:14:34.393  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-10 01:14:34.393  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-10 01:14:34.394  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-10 01:14:34.394 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-10 01:14:34.394 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-10 01:14:34.395 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-10 01:14:34.396 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-10 01:14:34.396 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-10 01:14:34.396 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-10 01:14:34.397 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-10 01:14:34.400 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 364571985512465144543371235995291044537847502198
             IssuerDN: UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 10 00:06:37 UTC 2021
           Final Date: Sat May 10 00:06:37 UTC 2031
            SubjectDN: UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:5a:ae:94:c5:df:d8:b3:30:70:7f:65:80:65:ac:8e:19:dd:07:ea]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1b818988428ab25a7b4408b23ff02839482245d0
                       2e9ffd4e746f6ed74c58f3a98e5c8ef65e6f19c3
                       5bdf18cadf5a1871c6a46f9865ae5982548db4fe
                       3ddbdd68204d8ad12b9087344591bdd3c66aeec4
                       351463bf0bf744d31199391aa0682484bb383c6d
                       5779a45acb613e54ae502a0463c660b9c392bc40
                       bcd3fde8708848f8c56711df661fc95064f653f6
                       68167fd215b2e97fb1cc3ef18a51e91e1bc35b81
                       5280bdfe20bb4565677fef7140f58fbff507d6fe
                       1b2f8de4226786124a34a7b471dfee70438bc7d1
                       923cb3095b94fa1d812e9b954ba932e1441d75d4
                       41dfb26c6f5749694505b9b085f0dd39b9d8e689
                       3d4f9ffe81f14383036f28a888c4be52864a36aa
                       53b2ff2274a37836602cf611b50fc551ec737de3
                       4b30b78c952413142550054419feaa3402685d04
                       62e5a5fa4a1aae83726015da7822710f2e5f30b2
                       d67ec93b680c7ae2bc0a0c4a7a0456fbcc2fb09d
                       7c34949727808add7f64e3f0f5a02b2789d19ca8
                       84d1b92499b7b67c8b1d1e41609cf56fe9a1ffc5
                       4d06f9de
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cf:fa:05:44:04:e8:c5:61:76:81:fd:51:bd:7a:66:cc:e3:33:0f:ce]
            modulus: 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
    public exponent: 10001

] 
2021-05-10 01:14:47.306  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-10 01:14:47.307 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-10 01:14:47.308 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-10 01:14:47.308 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-10 01:14:47.308  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-10 01:14:47.309  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-10 01:14:47.312  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-10 01:14:47.312  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-10 01:14:47.313  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-10 01:14:47.317  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-10 01:14:47.317  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-10 01:14:47.317  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-10 01:14:47.319  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-10 01:14:47.489  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-10 01:14:47.490  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-10 01:14:47.490 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-10 01:14:47.491 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-10 01:14:47.491  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1980
2021-05-10 01:14:47.492  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-10 01:14:47.493  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-10 01:14:47.493  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-10 01:14:47.494  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-10 01:14:47.494  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-10 01:14:47.494 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-10 01:14:47.494 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-10 01:14:47.495 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-10 01:14:47.495 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-10 01:14:47.495 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-10 01:14:47.496 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-10 01:14:47.496 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-10 01:14:47.499 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 364571985512465144543371235995291044537847502198
             IssuerDN: UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 10 00:06:37 UTC 2021
           Final Date: Sat May 10 00:06:37 UTC 2031
            SubjectDN: UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:5a:ae:94:c5:df:d8:b3:30:70:7f:65:80:65:ac:8e:19:dd:07:ea]
            modulus: a85cc0f9ba7b9aafa87925dd11e9a29b9c96713eee987a07d848d98291205dd2b65c9dec2e41086f78ab75d780349cf17a3595f04e3d836c20ba9a9ffd2243bb8e629f788adb1d50d37fe3b9b79f54355f4d2df7d60ecdb715aeae976f19f62ccea9bfd103f3d4d03d18505f1c6c59bfcd182acd755e7f745c27e8f1c5afb85274f926cb58d70b55cc73bd448882ff74e26f95411f6ee80f577417db2c07548ae0931a5575a6056c220f8c61706dc643f645ae69612c85c2c9369f5cc0fd786dd9b5697beaa1345487974e65abf48b58ceda566924d2ac24cbc5f588fc6e2d3abd8cd40c8f3c86d380bea0fee9141004d4de8391236b8c8acfa538d903b6ea2d5f8b9100db65b40704a91709830b8f22d514a337f782b12719fb89f654ef4cff7c611f5237ad508edf4cf3be8277ac966e6719eb13c2d45ea63be438364da36cc6b72f13fe6f5e98bc64b3b89485ee53f1e6b4e99184209a4505efe2772416d690ff3da901009fc3bf0866a575a96b043c02d8ae48fdcae93832bbbaf6b8e7ab
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1b818988428ab25a7b4408b23ff02839482245d0
                       2e9ffd4e746f6ed74c58f3a98e5c8ef65e6f19c3
                       5bdf18cadf5a1871c6a46f9865ae5982548db4fe
                       3ddbdd68204d8ad12b9087344591bdd3c66aeec4
                       351463bf0bf744d31199391aa0682484bb383c6d
                       5779a45acb613e54ae502a0463c660b9c392bc40
                       bcd3fde8708848f8c56711df661fc95064f653f6
                       68167fd215b2e97fb1cc3ef18a51e91e1bc35b81
                       5280bdfe20bb4565677fef7140f58fbff507d6fe
                       1b2f8de4226786124a34a7b471dfee70438bc7d1
                       923cb3095b94fa1d812e9b954ba932e1441d75d4
                       41dfb26c6f5749694505b9b085f0dd39b9d8e689
                       3d4f9ffe81f14383036f28a888c4be52864a36aa
                       53b2ff2274a37836602cf611b50fc551ec737de3
                       4b30b78c952413142550054419feaa3402685d04
                       62e5a5fa4a1aae83726015da7822710f2e5f30b2
                       d67ec93b680c7ae2bc0a0c4a7a0456fbcc2fb09d
                       7c34949727808add7f64e3f0f5a02b2789d19ca8
                       84d1b92499b7b67c8b1d1e41609cf56fe9a1ffc5
                       4d06f9de
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fb:fd:d0:e2:61:7e:43:0f:93:c3:49:fa:f6:3f:e8:e9:c2:7a:69:9c]
            modulus: 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
    public exponent: 10001

] 
2021-05-10 01:15:19.182  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-10 01:15:19.183 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-10 01:15:19.184 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-10 01:15:19.185 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-10 01:15:19.185  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-10 01:15:19.185  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-10 01:15:19.186  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-10 01:15:19.186  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-10 01:15:19.186  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-10 01:15:19.190  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-10 01:15:19.191  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-10 01:15:19.191  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-10 01:15:19.192  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-10 01:15:19.315  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-10 01:15:19.316  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-10 01:15:19.316 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-10 01:15:19.317 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-10 01:15:19.317  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1980
2021-05-10 01:15:19.318  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-10 01:15:19.320  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-10 01:15:19.320  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-10 01:15:19.320  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-10 01:15:19.321  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-10 01:15:19.321 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-10 01:15:19.321 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-10 01:15:19.322 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-10 01:15:19.322 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-10 01:15:19.322 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-10 01:15:19.322 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-10 01:15:19.323 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-10 01:15:19.325 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 364571985512465144543371235995291044537847502198
             IssuerDN: UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 10 00:06:37 UTC 2021
           Final Date: Sat May 10 00:06:37 UTC 2031
            SubjectDN: UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:5a:ae:94:c5:df:d8:b3:30:70:7f:65:80:65:ac:8e:19:dd:07:ea]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1b818988428ab25a7b4408b23ff02839482245d0
                       2e9ffd4e746f6ed74c58f3a98e5c8ef65e6f19c3
                       5bdf18cadf5a1871c6a46f9865ae5982548db4fe
                       3ddbdd68204d8ad12b9087344591bdd3c66aeec4
                       351463bf0bf744d31199391aa0682484bb383c6d
                       5779a45acb613e54ae502a0463c660b9c392bc40
                       bcd3fde8708848f8c56711df661fc95064f653f6
                       68167fd215b2e97fb1cc3ef18a51e91e1bc35b81
                       5280bdfe20bb4565677fef7140f58fbff507d6fe
                       1b2f8de4226786124a34a7b471dfee70438bc7d1
                       923cb3095b94fa1d812e9b954ba932e1441d75d4
                       41dfb26c6f5749694505b9b085f0dd39b9d8e689
                       3d4f9ffe81f14383036f28a888c4be52864a36aa
                       53b2ff2274a37836602cf611b50fc551ec737de3
                       4b30b78c952413142550054419feaa3402685d04
                       62e5a5fa4a1aae83726015da7822710f2e5f30b2
                       d67ec93b680c7ae2bc0a0c4a7a0456fbcc2fb09d
                       7c34949727808add7f64e3f0f5a02b2789d19ca8
                       84d1b92499b7b67c8b1d1e41609cf56fe9a1ffc5
                       4d06f9de
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [91:60:d3:62:0f:1c:c9:13:48:dd:12:7d:57:ec:1f:aa:ea:36:b9:73]
            modulus: 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
    public exponent: 10001

] 
2021-05-10 01:16:53.532  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-10 01:16:53.533 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-10 01:16:53.534 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-10 01:16:53.534 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-10 01:16:53.535  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-10 01:16:53.535  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-10 01:16:53.536  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-10 01:16:53.536  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-10 01:16:53.536  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-10 01:16:53.540  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-10 01:16:53.540  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-10 01:16:53.541  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-10 01:16:53.542  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-10 01:16:53.667  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-10 01:16:53.668  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-10 01:16:53.668 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-10 01:16:53.669 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-10 01:16:53.670  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1980
2021-05-10 01:16:53.670  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-10 01:16:53.671  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-10 01:16:53.672  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-10 01:16:53.672  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-10 01:16:53.672  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-10 01:16:53.672 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-10 01:16:53.673 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-10 01:16:53.673 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-10 01:16:53.673 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-10 01:16:53.674 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-10 01:16:53.674 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-10 01:16:53.674 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-10 01:16:53.677 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 364571985512465144543371235995291044537847502198
             IssuerDN: UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 10 00:06:37 UTC 2021
           Final Date: Sat May 10 00:06:37 UTC 2031
            SubjectDN: UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:5a:ae:94:c5:df:d8:b3:30:70:7f:65:80:65:ac:8e:19:dd:07:ea]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1b818988428ab25a7b4408b23ff02839482245d0
                       2e9ffd4e746f6ed74c58f3a98e5c8ef65e6f19c3
                       5bdf18cadf5a1871c6a46f9865ae5982548db4fe
                       3ddbdd68204d8ad12b9087344591bdd3c66aeec4
                       351463bf0bf744d31199391aa0682484bb383c6d
                       5779a45acb613e54ae502a0463c660b9c392bc40
                       bcd3fde8708848f8c56711df661fc95064f653f6
                       68167fd215b2e97fb1cc3ef18a51e91e1bc35b81
                       5280bdfe20bb4565677fef7140f58fbff507d6fe
                       1b2f8de4226786124a34a7b471dfee70438bc7d1
                       923cb3095b94fa1d812e9b954ba932e1441d75d4
                       41dfb26c6f5749694505b9b085f0dd39b9d8e689
                       3d4f9ffe81f14383036f28a888c4be52864a36aa
                       53b2ff2274a37836602cf611b50fc551ec737de3
                       4b30b78c952413142550054419feaa3402685d04
                       62e5a5fa4a1aae83726015da7822710f2e5f30b2
                       d67ec93b680c7ae2bc0a0c4a7a0456fbcc2fb09d
                       7c34949727808add7f64e3f0f5a02b2789d19ca8
                       84d1b92499b7b67c8b1d1e41609cf56fe9a1ffc5
                       4d06f9de
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bc:a1:02:64:4e:ac:4c:95:19:07:61:ba:6b:e7:70:ef:4b:3b:e6:ba]
            modulus: a31dd8061e0d9eef64090a5799daeda22c471e20df9a809474009848a5d33aebb89380de2d5f6e458cf5b1d1a6e26b4ce8e033f82caf5ce958eafa5f9ca7dcd61d94598db93dca5884a1bee806b9235cc373db8408d6b1bf7f0374f6207ab0692cb75ca9aced39c391d5fa813c702a8813552e19a1fb1a846ca157f6ebc712d43682953861329b8318cb6d8f67afc869b97a0e16a3f85f0261acdd236ece3ef554a329c5090fb9ab1647afb7ca41736e04d780f6169cf03341e49524faad795794cc946a6de515653865698fbea6c39f97e42d44720c653623ad1c72545c98daf66bfac8e35589c2b8a99813ec57b4cefde15a8a5cf9c8f53a1b2e55aaa69bef
    public exponent: 10001

] 
2021-05-10 01:18:57.190  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-10 01:18:57.191 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-10 01:18:57.192 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-10 01:18:57.192 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-10 01:18:57.193  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-10 01:18:57.193  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-10 01:18:57.194  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-10 01:18:57.194  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-10 01:18:57.194  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-10 01:18:57.198  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-10 01:18:57.198  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-10 01:18:57.199  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-10 01:18:57.200  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-10 01:18:57.358  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-10 01:18:57.359  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-10 01:18:57.359 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-10 01:18:57.360 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-10 01:18:57.361  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1980
2021-05-10 01:18:57.361  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-10 01:18:57.362  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-10 01:18:57.362  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-10 01:18:57.363  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-10 01:18:57.363  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-10 01:18:57.364 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-10 01:18:57.364 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-10 01:18:57.364 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-10 01:18:57.365 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-10 01:18:57.365 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-10 01:18:57.365 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-10 01:18:57.366 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-10 01:18:57.368 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 364571985512465144543371235995291044537847502198
             IssuerDN: UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 10 00:06:37 UTC 2021
           Final Date: Sat May 10 00:06:37 UTC 2031
            SubjectDN: UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:5a:ae:94:c5:df:d8:b3:30:70:7f:65:80:65:ac:8e:19:dd:07:ea]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1b818988428ab25a7b4408b23ff02839482245d0
                       2e9ffd4e746f6ed74c58f3a98e5c8ef65e6f19c3
                       5bdf18cadf5a1871c6a46f9865ae5982548db4fe
                       3ddbdd68204d8ad12b9087344591bdd3c66aeec4
                       351463bf0bf744d31199391aa0682484bb383c6d
                       5779a45acb613e54ae502a0463c660b9c392bc40
                       bcd3fde8708848f8c56711df661fc95064f653f6
                       68167fd215b2e97fb1cc3ef18a51e91e1bc35b81
                       5280bdfe20bb4565677fef7140f58fbff507d6fe
                       1b2f8de4226786124a34a7b471dfee70438bc7d1
                       923cb3095b94fa1d812e9b954ba932e1441d75d4
                       41dfb26c6f5749694505b9b085f0dd39b9d8e689
                       3d4f9ffe81f14383036f28a888c4be52864a36aa
                       53b2ff2274a37836602cf611b50fc551ec737de3
                       4b30b78c952413142550054419feaa3402685d04
                       62e5a5fa4a1aae83726015da7822710f2e5f30b2
                       d67ec93b680c7ae2bc0a0c4a7a0456fbcc2fb09d
                       7c34949727808add7f64e3f0f5a02b2789d19ca8
                       84d1b92499b7b67c8b1d1e41609cf56fe9a1ffc5
                       4d06f9de
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [23:96:bf:d8:7e:72:ae:af:18:ab:c7:a7:fd:c6:cf:25:2c:9b:3a:67]
            modulus: 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
    public exponent: 10001

] 
2021-05-10 01:21:44.009  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-10 01:21:44.010 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-10 01:21:44.011 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-10 01:21:44.011 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-10 01:21:44.011  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-10 01:21:44.012  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-10 01:21:44.012  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-10 01:21:44.012  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-10 01:21:44.013  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-10 01:21:44.017  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-10 01:21:44.017  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-10 01:21:44.017  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-10 01:21:44.019  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-10 01:21:44.127  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-10 01:21:44.127  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-10 01:21:44.127 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-10 01:21:44.129 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-10 01:21:44.129  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1980
2021-05-10 01:21:44.129  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-10 01:21:44.131  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-10 01:21:44.131  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-10 01:21:44.132  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-10 01:21:44.132  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-10 01:21:44.132 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-10 01:21:44.132 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-10 01:21:44.133 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-10 01:21:44.133 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-10 01:21:44.133 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-10 01:21:44.133 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-10 01:21:44.134 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-10 01:21:44.136 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 364571985512465144543371235995291044537847502198
             IssuerDN: UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 10 00:06:37 UTC 2021
           Final Date: Sat May 10 00:06:37 UTC 2031
            SubjectDN: UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:5a:ae:94:c5:df:d8:b3:30:70:7f:65:80:65:ac:8e:19:dd:07:ea]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1b818988428ab25a7b4408b23ff02839482245d0
                       2e9ffd4e746f6ed74c58f3a98e5c8ef65e6f19c3
                       5bdf18cadf5a1871c6a46f9865ae5982548db4fe
                       3ddbdd68204d8ad12b9087344591bdd3c66aeec4
                       351463bf0bf744d31199391aa0682484bb383c6d
                       5779a45acb613e54ae502a0463c660b9c392bc40
                       bcd3fde8708848f8c56711df661fc95064f653f6
                       68167fd215b2e97fb1cc3ef18a51e91e1bc35b81
                       5280bdfe20bb4565677fef7140f58fbff507d6fe
                       1b2f8de4226786124a34a7b471dfee70438bc7d1
                       923cb3095b94fa1d812e9b954ba932e1441d75d4
                       41dfb26c6f5749694505b9b085f0dd39b9d8e689
                       3d4f9ffe81f14383036f28a888c4be52864a36aa
                       53b2ff2274a37836602cf611b50fc551ec737de3
                       4b30b78c952413142550054419feaa3402685d04
                       62e5a5fa4a1aae83726015da7822710f2e5f30b2
                       d67ec93b680c7ae2bc0a0c4a7a0456fbcc2fb09d
                       7c34949727808add7f64e3f0f5a02b2789d19ca8
                       84d1b92499b7b67c8b1d1e41609cf56fe9a1ffc5
                       4d06f9de
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bf:68:57:29:d9:66:da:92:7f:79:03:a7:66:7b:56:37:77:00:82:6f]
            modulus: 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
    public exponent: 10001

] 
2021-05-10 01:23:42.341  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-10 01:23:42.342 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-10 01:23:42.343 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-10 01:23:42.344 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-10 01:23:42.344  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-10 01:23:42.344  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-10 01:23:42.345  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-10 01:23:42.345  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-10 01:23:42.345  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-10 01:23:42.349  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-10 01:23:42.349  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-10 01:23:42.350  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-10 01:23:42.351  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-10 01:23:42.466  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-10 01:23:42.467  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-10 01:23:42.467 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-10 01:23:42.468 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-10 01:23:42.468  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1980
2021-05-10 01:23:42.468  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-10 01:23:42.470  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-10 01:23:42.470  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-10 01:23:42.470  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-10 01:23:42.471  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-10 01:23:42.471 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-10 01:23:42.471 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-10 01:23:42.471 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-10 01:23:42.472 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-10 01:23:42.472 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-10 01:23:42.472 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-10 01:23:42.473 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-10 01:23:42.475 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 364571985512465144543371235995291044537847502198
             IssuerDN: UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 10 00:06:37 UTC 2021
           Final Date: Sat May 10 00:06:37 UTC 2031
            SubjectDN: UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:5a:ae:94:c5:df:d8:b3:30:70:7f:65:80:65:ac:8e:19:dd:07:ea]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1b818988428ab25a7b4408b23ff02839482245d0
                       2e9ffd4e746f6ed74c58f3a98e5c8ef65e6f19c3
                       5bdf18cadf5a1871c6a46f9865ae5982548db4fe
                       3ddbdd68204d8ad12b9087344591bdd3c66aeec4
                       351463bf0bf744d31199391aa0682484bb383c6d
                       5779a45acb613e54ae502a0463c660b9c392bc40
                       bcd3fde8708848f8c56711df661fc95064f653f6
                       68167fd215b2e97fb1cc3ef18a51e91e1bc35b81
                       5280bdfe20bb4565677fef7140f58fbff507d6fe
                       1b2f8de4226786124a34a7b471dfee70438bc7d1
                       923cb3095b94fa1d812e9b954ba932e1441d75d4
                       41dfb26c6f5749694505b9b085f0dd39b9d8e689
                       3d4f9ffe81f14383036f28a888c4be52864a36aa
                       53b2ff2274a37836602cf611b50fc551ec737de3
                       4b30b78c952413142550054419feaa3402685d04
                       62e5a5fa4a1aae83726015da7822710f2e5f30b2
                       d67ec93b680c7ae2bc0a0c4a7a0456fbcc2fb09d
                       7c34949727808add7f64e3f0f5a02b2789d19ca8
                       84d1b92499b7b67c8b1d1e41609cf56fe9a1ffc5
                       4d06f9de
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2a:e5:54:28:dc:60:d4:bc:aa:62:40:26:99:d5:d1:e8:4a:7d:47:69]
            modulus: 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
    public exponent: 10001

] 
2021-05-10 01:25:02.334  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-10 01:25:02.335 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-10 01:25:02.336 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-10 01:25:02.336 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-10 01:25:02.337  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-10 01:25:02.337  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-10 01:25:02.337  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-10 01:25:02.338  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-10 01:25:02.338  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-10 01:25:02.342  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-10 01:25:02.342  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-10 01:25:02.342  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-10 01:25:02.344  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-10 01:25:02.454  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-10 01:25:02.454  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-10 01:25:02.454 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-10 01:25:02.456 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-10 01:25:02.456  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1980
2021-05-10 01:25:02.456  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-10 01:25:02.457  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-10 01:25:02.458  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-10 01:25:02.458  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-10 01:25:02.458  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-10 01:25:02.459 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-10 01:25:02.459 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-10 01:25:02.459 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-10 01:25:02.459 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-10 01:25:02.460 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-10 01:25:02.460 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-10 01:25:02.461 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-10 01:25:02.463 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 364571985512465144543371235995291044537847502198
             IssuerDN: UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 10 00:06:37 UTC 2021
           Final Date: Sat May 10 00:06:37 UTC 2031
            SubjectDN: UID=c-08aa5d65a3448c47a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:5a:ae:94:c5:df:d8:b3:30:70:7f:65:80:65:ac:8e:19:dd:07:ea]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1b818988428ab25a7b4408b23ff02839482245d0
                       2e9ffd4e746f6ed74c58f3a98e5c8ef65e6f19c3
                       5bdf18cadf5a1871c6a46f9865ae5982548db4fe
                       3ddbdd68204d8ad12b9087344591bdd3c66aeec4
                       351463bf0bf744d31199391aa0682484bb383c6d
                       5779a45acb613e54ae502a0463c660b9c392bc40
                       bcd3fde8708848f8c56711df661fc95064f653f6
                       68167fd215b2e97fb1cc3ef18a51e91e1bc35b81
                       5280bdfe20bb4565677fef7140f58fbff507d6fe
                       1b2f8de4226786124a34a7b471dfee70438bc7d1
                       923cb3095b94fa1d812e9b954ba932e1441d75d4
                       41dfb26c6f5749694505b9b085f0dd39b9d8e689
                       3d4f9ffe81f14383036f28a888c4be52864a36aa
                       53b2ff2274a37836602cf611b50fc551ec737de3
                       4b30b78c952413142550054419feaa3402685d04
                       62e5a5fa4a1aae83726015da7822710f2e5f30b2
                       d67ec93b680c7ae2bc0a0c4a7a0456fbcc2fb09d
                       7c34949727808add7f64e3f0f5a02b2789d19ca8
                       84d1b92499b7b67c8b1d1e41609cf56fe9a1ffc5
                       4d06f9de
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [82:00:f2:a2:b7:9d:17:27:d7:75:30:a0:c0:60:4e:fc:5e:36:0a:ee]
            modulus: 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
    public exponent: 10001

]