Results

By type

          2021-05-15 00:10:39,673 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-05-15 00:10:43,767 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-05-15 00:10:46.789  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-05-15 00:10:59.186 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-05-15 00:11:00.286  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-05-15 00:11:01.074  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-05-15 00:11:15.669  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 38.503 seconds (JVM running for 46.252)
2021-05-15 00:18:46.284  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-15 00:18:46.373 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-15 00:18:46.491 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-15 00:18:46.494 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-15 00:18:46.577  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-15 00:18:46.583  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-15 00:18:46.672  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-15 00:18:46.673  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-15 00:18:46.673  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-15 00:18:46.681  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-15 00:18:46.684  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-15 00:18:46.885  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-15 00:18:46.970  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-15 00:18:46.970  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-15 00:18:46.986  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-15 00:18:48.352  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-15 00:18:48.355  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-15 00:18:48.355 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-15 00:18:48.360 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-15 00:18:48.362  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1598
2021-05-15 00:18:48.362  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-15 00:18:48.368  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-15 00:18:48.369  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-15 00:18:48.374  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-15 00:18:48.375  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-15 00:18:48.376 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-15 00:18:48.376 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-15 00:18:48.377 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-15 00:18:48.387 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-15 00:18:48.387 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-15 00:18:48.388 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-15 00:18:48.477 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-15 00:18:48.674 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 354157011699784478991254199799455350018330471336
             IssuerDN: UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 15 00:07:37 UTC 2021
           Final Date: Thu May 15 00:07:37 UTC 2031
            SubjectDN: UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [db:c1:3f:e5:71:6a:c2:f4:b5:ed:5f:7d:dc:d5:08:a0:89:16:eb:06]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1d3e524b2fb2be779f862d4a939164b40773d873
                       84adbf5a69524ec23b06b487d6388851bfd89997
                       80ffaadf113d032847d60b7880f9d3e2fa14f800
                       b51331f7b4949fca4ae5443765abdee035b2247f
                       13505d5194c42ad565e332490cec9e5a3a7df1f1
                       2eac7c52f51fd889b709f22153f28e28d1c314ed
                       5521ca63374240ef1fd6573b2f42f1bea7bea245
                       be1beddc686787b33b2a7034d0bf1b711a14867b
                       5c7fcfae5a765ac1f1c08bed9c9af40c944cb583
                       4c914e23e1da7fc9f2c9ad4ae171fbea9952f046
                       61456414405f5854a9190e589545bc22788c896f
                       f356dcf3337a81b110287fd847cbe437f40c96e0
                       a2d6e193af3e926e0169fbe6e989f33f2780cf59
                       904b414298d408ee79293abd9d41db85f4ffabc9
                       ce586b4384b2f03652b88d2f6dbbc6ad34864452
                       64dcaf0eae77aa42619f30aa028a46d78b87d849
                       ac64d5541d0a3c23f40cdbf2c0d2f4145f19b010
                       85f5394b2dc08a465380c2672ddca5e2601d23f8
                       d7a0ec3b7badf960da8159863b52d867aa11f03e
                       577dc7b3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d2:50:b8:0a:fd:b6:e7:a8:0d:f6:39:94:64:d0:2e:6d:64:da:73:d9]
            modulus: 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
    public exponent: 10001

] 
2021-05-15 01:15:44.440  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-15 01:15:44.443 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-15 01:15:44.468 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-15 01:15:44.470 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-15 01:15:44.471  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-15 01:15:44.472  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-15 01:15:44.473  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-15 01:15:44.473  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-15 01:15:44.475  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-15 01:15:44.483  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-15 01:15:44.484  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-15 01:15:44.484  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-15 01:15:44.487  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-15 01:15:44.685  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-15 01:15:44.686  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-15 01:15:44.686 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-15 01:15:44.691 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-15 01:15:44.767  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1598
2021-05-15 01:15:44.768  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-15 01:15:44.773  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-15 01:15:44.774  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-15 01:15:44.775  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-15 01:15:44.775  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-15 01:15:44.776 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-15 01:15:44.777 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-15 01:15:44.777 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-15 01:15:44.779 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-15 01:15:44.780 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-15 01:15:44.780 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-15 01:15:44.782 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-15 01:15:44.870 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 354157011699784478991254199799455350018330471336
             IssuerDN: UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 15 00:07:37 UTC 2021
           Final Date: Thu May 15 00:07:37 UTC 2031
            SubjectDN: UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [db:c1:3f:e5:71:6a:c2:f4:b5:ed:5f:7d:dc:d5:08:a0:89:16:eb:06]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1d3e524b2fb2be779f862d4a939164b40773d873
                       84adbf5a69524ec23b06b487d6388851bfd89997
                       80ffaadf113d032847d60b7880f9d3e2fa14f800
                       b51331f7b4949fca4ae5443765abdee035b2247f
                       13505d5194c42ad565e332490cec9e5a3a7df1f1
                       2eac7c52f51fd889b709f22153f28e28d1c314ed
                       5521ca63374240ef1fd6573b2f42f1bea7bea245
                       be1beddc686787b33b2a7034d0bf1b711a14867b
                       5c7fcfae5a765ac1f1c08bed9c9af40c944cb583
                       4c914e23e1da7fc9f2c9ad4ae171fbea9952f046
                       61456414405f5854a9190e589545bc22788c896f
                       f356dcf3337a81b110287fd847cbe437f40c96e0
                       a2d6e193af3e926e0169fbe6e989f33f2780cf59
                       904b414298d408ee79293abd9d41db85f4ffabc9
                       ce586b4384b2f03652b88d2f6dbbc6ad34864452
                       64dcaf0eae77aa42619f30aa028a46d78b87d849
                       ac64d5541d0a3c23f40cdbf2c0d2f4145f19b010
                       85f5394b2dc08a465380c2672ddca5e2601d23f8
                       d7a0ec3b7badf960da8159863b52d867aa11f03e
                       577dc7b3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7e:8e:03:b1:5c:47:02:cb:46:32:e3:85:50:23:9c:11:49:9e:47:38]
            modulus: 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
    public exponent: 10001

] 
2021-05-15 01:16:29.458  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-15 01:16:29.459 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-15 01:16:29.461 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-15 01:16:29.461 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-15 01:16:29.462  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-15 01:16:29.462  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-15 01:16:29.463  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-15 01:16:29.463  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-15 01:16:29.464  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-15 01:16:29.468  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-15 01:16:29.469  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-15 01:16:29.469  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-15 01:16:29.471  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-15 01:16:29.568  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-15 01:16:29.569  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-15 01:16:29.569 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-15 01:16:29.572 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-15 01:16:29.573  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1598
2021-05-15 01:16:29.574  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-15 01:16:29.576  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-15 01:16:29.576  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-15 01:16:29.577  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-15 01:16:29.577  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-15 01:16:29.578 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-15 01:16:29.578 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-15 01:16:29.579 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-15 01:16:29.579 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-15 01:16:29.580 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-15 01:16:29.580 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-15 01:16:29.581 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-15 01:16:29.584 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 354157011699784478991254199799455350018330471336
             IssuerDN: UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 15 00:07:37 UTC 2021
           Final Date: Thu May 15 00:07:37 UTC 2031
            SubjectDN: UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [db:c1:3f:e5:71:6a:c2:f4:b5:ed:5f:7d:dc:d5:08:a0:89:16:eb:06]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1d3e524b2fb2be779f862d4a939164b40773d873
                       84adbf5a69524ec23b06b487d6388851bfd89997
                       80ffaadf113d032847d60b7880f9d3e2fa14f800
                       b51331f7b4949fca4ae5443765abdee035b2247f
                       13505d5194c42ad565e332490cec9e5a3a7df1f1
                       2eac7c52f51fd889b709f22153f28e28d1c314ed
                       5521ca63374240ef1fd6573b2f42f1bea7bea245
                       be1beddc686787b33b2a7034d0bf1b711a14867b
                       5c7fcfae5a765ac1f1c08bed9c9af40c944cb583
                       4c914e23e1da7fc9f2c9ad4ae171fbea9952f046
                       61456414405f5854a9190e589545bc22788c896f
                       f356dcf3337a81b110287fd847cbe437f40c96e0
                       a2d6e193af3e926e0169fbe6e989f33f2780cf59
                       904b414298d408ee79293abd9d41db85f4ffabc9
                       ce586b4384b2f03652b88d2f6dbbc6ad34864452
                       64dcaf0eae77aa42619f30aa028a46d78b87d849
                       ac64d5541d0a3c23f40cdbf2c0d2f4145f19b010
                       85f5394b2dc08a465380c2672ddca5e2601d23f8
                       d7a0ec3b7badf960da8159863b52d867aa11f03e
                       577dc7b3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [34:f6:d0:f0:f9:7b:b7:c5:c5:f3:c9:d7:eb:f0:91:24:81:8d:f5:55]
            modulus: 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
    public exponent: 10001

] 
2021-05-15 01:19:48.154  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-15 01:19:48.156 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-15 01:19:48.157 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-15 01:19:48.158 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-15 01:19:48.158  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-15 01:19:48.159  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-15 01:19:48.159  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-15 01:19:48.160  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-15 01:19:48.160  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-15 01:19:48.164  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-15 01:19:48.165  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-15 01:19:48.165  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-15 01:19:48.167  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-15 01:19:48.309  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-15 01:19:48.310  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-15 01:19:48.310 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-15 01:19:48.314 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-15 01:19:48.316  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1598
2021-05-15 01:19:48.317  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-15 01:19:48.320  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-15 01:19:48.321  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-15 01:19:48.321  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-15 01:19:48.322  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-15 01:19:48.322 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-15 01:19:48.322 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-15 01:19:48.322 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-15 01:19:48.324 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-15 01:19:48.325 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-15 01:19:48.327 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-15 01:19:48.367 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-15 01:19:48.379 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 354157011699784478991254199799455350018330471336
             IssuerDN: UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 15 00:07:37 UTC 2021
           Final Date: Thu May 15 00:07:37 UTC 2031
            SubjectDN: UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [db:c1:3f:e5:71:6a:c2:f4:b5:ed:5f:7d:dc:d5:08:a0:89:16:eb:06]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1d3e524b2fb2be779f862d4a939164b40773d873
                       84adbf5a69524ec23b06b487d6388851bfd89997
                       80ffaadf113d032847d60b7880f9d3e2fa14f800
                       b51331f7b4949fca4ae5443765abdee035b2247f
                       13505d5194c42ad565e332490cec9e5a3a7df1f1
                       2eac7c52f51fd889b709f22153f28e28d1c314ed
                       5521ca63374240ef1fd6573b2f42f1bea7bea245
                       be1beddc686787b33b2a7034d0bf1b711a14867b
                       5c7fcfae5a765ac1f1c08bed9c9af40c944cb583
                       4c914e23e1da7fc9f2c9ad4ae171fbea9952f046
                       61456414405f5854a9190e589545bc22788c896f
                       f356dcf3337a81b110287fd847cbe437f40c96e0
                       a2d6e193af3e926e0169fbe6e989f33f2780cf59
                       904b414298d408ee79293abd9d41db85f4ffabc9
                       ce586b4384b2f03652b88d2f6dbbc6ad34864452
                       64dcaf0eae77aa42619f30aa028a46d78b87d849
                       ac64d5541d0a3c23f40cdbf2c0d2f4145f19b010
                       85f5394b2dc08a465380c2672ddca5e2601d23f8
                       d7a0ec3b7badf960da8159863b52d867aa11f03e
                       577dc7b3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [36:9f:02:23:20:3b:03:20:a8:c1:64:3e:e0:86:47:70:c2:87:c1:44]
            modulus: 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
    public exponent: 10001

] 
2021-05-15 01:20:59.850  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-15 01:20:59.852 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-15 01:20:59.857 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-15 01:20:59.858 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-15 01:20:59.858  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-15 01:20:59.859  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-15 01:20:59.859  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-15 01:20:59.859  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-15 01:20:59.860  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-15 01:20:59.864  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-15 01:20:59.864  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-15 01:20:59.867  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-15 01:20:59.869  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-15 01:20:59.991  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-15 01:20:59.992  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-15 01:20:59.993 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-15 01:20:59.994 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-15 01:20:59.995  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1598
2021-05-15 01:20:59.995  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-15 01:20:59.997  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-15 01:20:59.997  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-15 01:20:59.998  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-15 01:20:59.998  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-15 01:20:59.999 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-15 01:20:59.999 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-15 01:20:59.999 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-15 01:21:00.000 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-15 01:21:00.001 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-15 01:21:00.001 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-15 01:21:00.002 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-15 01:21:00.067 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 354157011699784478991254199799455350018330471336
             IssuerDN: UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 15 00:07:37 UTC 2021
           Final Date: Thu May 15 00:07:37 UTC 2031
            SubjectDN: UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [db:c1:3f:e5:71:6a:c2:f4:b5:ed:5f:7d:dc:d5:08:a0:89:16:eb:06]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1d3e524b2fb2be779f862d4a939164b40773d873
                       84adbf5a69524ec23b06b487d6388851bfd89997
                       80ffaadf113d032847d60b7880f9d3e2fa14f800
                       b51331f7b4949fca4ae5443765abdee035b2247f
                       13505d5194c42ad565e332490cec9e5a3a7df1f1
                       2eac7c52f51fd889b709f22153f28e28d1c314ed
                       5521ca63374240ef1fd6573b2f42f1bea7bea245
                       be1beddc686787b33b2a7034d0bf1b711a14867b
                       5c7fcfae5a765ac1f1c08bed9c9af40c944cb583
                       4c914e23e1da7fc9f2c9ad4ae171fbea9952f046
                       61456414405f5854a9190e589545bc22788c896f
                       f356dcf3337a81b110287fd847cbe437f40c96e0
                       a2d6e193af3e926e0169fbe6e989f33f2780cf59
                       904b414298d408ee79293abd9d41db85f4ffabc9
                       ce586b4384b2f03652b88d2f6dbbc6ad34864452
                       64dcaf0eae77aa42619f30aa028a46d78b87d849
                       ac64d5541d0a3c23f40cdbf2c0d2f4145f19b010
                       85f5394b2dc08a465380c2672ddca5e2601d23f8
                       d7a0ec3b7badf960da8159863b52d867aa11f03e
                       577dc7b3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4b:a5:80:ca:f1:16:c5:1a:29:be:5d:4b:e5:5e:ce:98:6c:9a:27:91]
            modulus: 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
    public exponent: 10001

] 
2021-05-15 01:21:12.087  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-15 01:21:12.088 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-15 01:21:12.090 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-15 01:21:12.091 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-15 01:21:12.092  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-15 01:21:12.092  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-15 01:21:12.093  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-15 01:21:12.093  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-15 01:21:12.093  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-15 01:21:12.104  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-15 01:21:12.105  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-15 01:21:12.105  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-15 01:21:12.106  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-15 01:21:12.262  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-15 01:21:12.263  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-15 01:21:12.263 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-15 01:21:12.265 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-15 01:21:12.266  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1598
2021-05-15 01:21:12.266  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-15 01:21:12.267  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-15 01:21:12.268  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-15 01:21:12.268  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-15 01:21:12.268  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-15 01:21:12.269 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-15 01:21:12.269 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-15 01:21:12.269 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-15 01:21:12.270 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-15 01:21:12.270 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-15 01:21:12.270 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-15 01:21:12.271 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-15 01:21:12.274 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 354157011699784478991254199799455350018330471336
             IssuerDN: UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 15 00:07:37 UTC 2021
           Final Date: Thu May 15 00:07:37 UTC 2031
            SubjectDN: UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [db:c1:3f:e5:71:6a:c2:f4:b5:ed:5f:7d:dc:d5:08:a0:89:16:eb:06]
            modulus: b6e007d1204fd8e69fa619e661edad5a09821a6e4ec68265b5819d79fec6be6236a58c08fad4355ea97e7bcfdff2e60a0b3f5a5344fc8331e4fc32349102e11c027fcf315c0541def39a96a6984459be27de03013c5be9b4e0194ad887019f63126137d4aca8435a5f240206f66d9fe7bcb9f30bead611a37937c4514146cf419ba39aba1f53f0873ec1cf058f671e59de0a2c483dc5091df6f655cfe3f9003b48e32d0606c634950f86af50e09453faed850f0980ccc61f45a2b182477fe6be4a2bdf61ed53947501055818377c16852c4748bf351460d5e07a7bbd72eee301759db0621b346108d23944c30b2176edc7e7d3311145f14a00f9c73a3a8de9d12d9fae9cce20ad4b87cfd1bd0f53ecaf3618af3c8643fefa73a7ee5c8239d7d007c1915c863f84b7fefadd9bc2d73405acaab67d1b0d7c3a7c9269ac1d4fbac61a1c10a7746b9886d40aa5ab89579c543b948b27620f04e3ae6e9b9b0ef37d03cd09e729ed14c7b0322a559adb39aa9ca4944d0b679ae8c6f92710094c40b4f3
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1d3e524b2fb2be779f862d4a939164b40773d873
                       84adbf5a69524ec23b06b487d6388851bfd89997
                       80ffaadf113d032847d60b7880f9d3e2fa14f800
                       b51331f7b4949fca4ae5443765abdee035b2247f
                       13505d5194c42ad565e332490cec9e5a3a7df1f1
                       2eac7c52f51fd889b709f22153f28e28d1c314ed
                       5521ca63374240ef1fd6573b2f42f1bea7bea245
                       be1beddc686787b33b2a7034d0bf1b711a14867b
                       5c7fcfae5a765ac1f1c08bed9c9af40c944cb583
                       4c914e23e1da7fc9f2c9ad4ae171fbea9952f046
                       61456414405f5854a9190e589545bc22788c896f
                       f356dcf3337a81b110287fd847cbe437f40c96e0
                       a2d6e193af3e926e0169fbe6e989f33f2780cf59
                       904b414298d408ee79293abd9d41db85f4ffabc9
                       ce586b4384b2f03652b88d2f6dbbc6ad34864452
                       64dcaf0eae77aa42619f30aa028a46d78b87d849
                       ac64d5541d0a3c23f40cdbf2c0d2f4145f19b010
                       85f5394b2dc08a465380c2672ddca5e2601d23f8
                       d7a0ec3b7badf960da8159863b52d867aa11f03e
                       577dc7b3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [19:7a:a1:cd:9e:13:49:2d:ae:24:15:79:bb:4c:66:e0:06:6f:22:37]
            modulus: 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
    public exponent: 10001

] 
2021-05-15 01:21:26.883  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-15 01:21:26.885 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-15 01:21:26.887 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-15 01:21:26.887 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-15 01:21:26.888  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-15 01:21:26.888  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-15 01:21:26.889  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-15 01:21:26.889  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-15 01:21:26.889  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-15 01:21:26.893  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-15 01:21:26.893  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-15 01:21:26.894  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-15 01:21:26.895  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-15 01:21:26.968  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-15 01:21:26.969  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-15 01:21:26.970 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-15 01:21:26.972 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-15 01:21:26.974  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1598
2021-05-15 01:21:26.974  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-15 01:21:26.977  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-15 01:21:26.977  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-15 01:21:26.978  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-15 01:21:26.978  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-15 01:21:26.978 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-15 01:21:26.979 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-15 01:21:26.979 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-15 01:21:26.980 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-15 01:21:26.980 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-15 01:21:26.981 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-15 01:21:26.981 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-15 01:21:26.984 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 354157011699784478991254199799455350018330471336
             IssuerDN: UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 15 00:07:37 UTC 2021
           Final Date: Thu May 15 00:07:37 UTC 2031
            SubjectDN: UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [db:c1:3f:e5:71:6a:c2:f4:b5:ed:5f:7d:dc:d5:08:a0:89:16:eb:06]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1d3e524b2fb2be779f862d4a939164b40773d873
                       84adbf5a69524ec23b06b487d6388851bfd89997
                       80ffaadf113d032847d60b7880f9d3e2fa14f800
                       b51331f7b4949fca4ae5443765abdee035b2247f
                       13505d5194c42ad565e332490cec9e5a3a7df1f1
                       2eac7c52f51fd889b709f22153f28e28d1c314ed
                       5521ca63374240ef1fd6573b2f42f1bea7bea245
                       be1beddc686787b33b2a7034d0bf1b711a14867b
                       5c7fcfae5a765ac1f1c08bed9c9af40c944cb583
                       4c914e23e1da7fc9f2c9ad4ae171fbea9952f046
                       61456414405f5854a9190e589545bc22788c896f
                       f356dcf3337a81b110287fd847cbe437f40c96e0
                       a2d6e193af3e926e0169fbe6e989f33f2780cf59
                       904b414298d408ee79293abd9d41db85f4ffabc9
                       ce586b4384b2f03652b88d2f6dbbc6ad34864452
                       64dcaf0eae77aa42619f30aa028a46d78b87d849
                       ac64d5541d0a3c23f40cdbf2c0d2f4145f19b010
                       85f5394b2dc08a465380c2672ddca5e2601d23f8
                       d7a0ec3b7badf960da8159863b52d867aa11f03e
                       577dc7b3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [34:51:67:18:40:b6:77:95:48:c9:74:8d:26:fe:e7:29:ad:99:45:6b]
            modulus: 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
    public exponent: 10001

] 
2021-05-15 01:22:26.090  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-15 01:22:26.091 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-15 01:22:26.093 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-15 01:22:26.093 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-15 01:22:26.093  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-15 01:22:26.094  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-15 01:22:26.094  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-15 01:22:26.094  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-15 01:22:26.094  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-15 01:22:26.098  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-15 01:22:26.098  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-15 01:22:26.099  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-15 01:22:26.100  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-15 01:22:26.172  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-15 01:22:26.173  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-15 01:22:26.173 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-15 01:22:26.175 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-15 01:22:26.176  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1598
2021-05-15 01:22:26.177  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-15 01:22:26.179  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-15 01:22:26.180  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-15 01:22:26.181  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-15 01:22:26.181  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-15 01:22:26.181 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-15 01:22:26.182 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-15 01:22:26.182 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-15 01:22:26.182 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-15 01:22:26.182 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-15 01:22:26.183 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-15 01:22:26.183 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-15 01:22:26.185 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 354157011699784478991254199799455350018330471336
             IssuerDN: UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 15 00:07:37 UTC 2021
           Final Date: Thu May 15 00:07:37 UTC 2031
            SubjectDN: UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [db:c1:3f:e5:71:6a:c2:f4:b5:ed:5f:7d:dc:d5:08:a0:89:16:eb:06]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1d3e524b2fb2be779f862d4a939164b40773d873
                       84adbf5a69524ec23b06b487d6388851bfd89997
                       80ffaadf113d032847d60b7880f9d3e2fa14f800
                       b51331f7b4949fca4ae5443765abdee035b2247f
                       13505d5194c42ad565e332490cec9e5a3a7df1f1
                       2eac7c52f51fd889b709f22153f28e28d1c314ed
                       5521ca63374240ef1fd6573b2f42f1bea7bea245
                       be1beddc686787b33b2a7034d0bf1b711a14867b
                       5c7fcfae5a765ac1f1c08bed9c9af40c944cb583
                       4c914e23e1da7fc9f2c9ad4ae171fbea9952f046
                       61456414405f5854a9190e589545bc22788c896f
                       f356dcf3337a81b110287fd847cbe437f40c96e0
                       a2d6e193af3e926e0169fbe6e989f33f2780cf59
                       904b414298d408ee79293abd9d41db85f4ffabc9
                       ce586b4384b2f03652b88d2f6dbbc6ad34864452
                       64dcaf0eae77aa42619f30aa028a46d78b87d849
                       ac64d5541d0a3c23f40cdbf2c0d2f4145f19b010
                       85f5394b2dc08a465380c2672ddca5e2601d23f8
                       d7a0ec3b7badf960da8159863b52d867aa11f03e
                       577dc7b3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2b:23:51:1a:b5:a9:3c:4e:db:f1:7f:1e:7e:b7:29:e6:22:bb:61:ee]
            modulus: 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
    public exponent: 10001

] 
2021-05-15 01:24:04.946  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-15 01:24:04.947 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-15 01:24:04.948 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-15 01:24:04.949 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-15 01:24:04.949  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-15 01:24:04.950  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-15 01:24:04.950  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-15 01:24:04.950  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-15 01:24:04.950  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-15 01:24:04.954  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-15 01:24:04.954  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-15 01:24:04.954  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-15 01:24:04.955  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-15 01:24:05.072  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-15 01:24:05.073  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-15 01:24:05.073 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-15 01:24:05.074 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-15 01:24:05.075  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1598
2021-05-15 01:24:05.075  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-15 01:24:05.077  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-15 01:24:05.077  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-15 01:24:05.078  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-15 01:24:05.078  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-15 01:24:05.078 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-15 01:24:05.079 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-15 01:24:05.079 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-15 01:24:05.079 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-15 01:24:05.080 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-15 01:24:05.080 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-15 01:24:05.080 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-15 01:24:05.083 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 354157011699784478991254199799455350018330471336
             IssuerDN: UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 15 00:07:37 UTC 2021
           Final Date: Thu May 15 00:07:37 UTC 2031
            SubjectDN: UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [db:c1:3f:e5:71:6a:c2:f4:b5:ed:5f:7d:dc:d5:08:a0:89:16:eb:06]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1d3e524b2fb2be779f862d4a939164b40773d873
                       84adbf5a69524ec23b06b487d6388851bfd89997
                       80ffaadf113d032847d60b7880f9d3e2fa14f800
                       b51331f7b4949fca4ae5443765abdee035b2247f
                       13505d5194c42ad565e332490cec9e5a3a7df1f1
                       2eac7c52f51fd889b709f22153f28e28d1c314ed
                       5521ca63374240ef1fd6573b2f42f1bea7bea245
                       be1beddc686787b33b2a7034d0bf1b711a14867b
                       5c7fcfae5a765ac1f1c08bed9c9af40c944cb583
                       4c914e23e1da7fc9f2c9ad4ae171fbea9952f046
                       61456414405f5854a9190e589545bc22788c896f
                       f356dcf3337a81b110287fd847cbe437f40c96e0
                       a2d6e193af3e926e0169fbe6e989f33f2780cf59
                       904b414298d408ee79293abd9d41db85f4ffabc9
                       ce586b4384b2f03652b88d2f6dbbc6ad34864452
                       64dcaf0eae77aa42619f30aa028a46d78b87d849
                       ac64d5541d0a3c23f40cdbf2c0d2f4145f19b010
                       85f5394b2dc08a465380c2672ddca5e2601d23f8
                       d7a0ec3b7badf960da8159863b52d867aa11f03e
                       577dc7b3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f3:69:61:dc:1b:22:91:4d:82:c0:b4:11:52:35:b2:07:5d:82:28:fe]
            modulus: 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
    public exponent: 10001

] 
2021-05-15 01:26:41.891  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-15 01:26:41.892 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-15 01:26:41.893 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-15 01:26:41.894 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-15 01:26:41.894  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-15 01:26:41.895  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-15 01:26:41.895  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-15 01:26:41.895  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-15 01:26:41.896  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-15 01:26:41.901  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-15 01:26:41.901  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-15 01:26:41.902  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-15 01:26:41.903  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-15 01:26:41.992  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-15 01:26:41.993  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-15 01:26:41.994 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-15 01:26:41.995 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-15 01:26:41.996  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1598
2021-05-15 01:26:41.997  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-15 01:26:41.998  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-15 01:26:41.999  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-15 01:26:41.999  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-15 01:26:41.999  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-15 01:26:42.000 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-15 01:26:42.000 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-15 01:26:42.000 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-15 01:26:42.000 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-15 01:26:42.001 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-15 01:26:42.001 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-15 01:26:42.002 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-15 01:26:42.005 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 354157011699784478991254199799455350018330471336
             IssuerDN: UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 15 00:07:37 UTC 2021
           Final Date: Thu May 15 00:07:37 UTC 2031
            SubjectDN: UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [db:c1:3f:e5:71:6a:c2:f4:b5:ed:5f:7d:dc:d5:08:a0:89:16:eb:06]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1d3e524b2fb2be779f862d4a939164b40773d873
                       84adbf5a69524ec23b06b487d6388851bfd89997
                       80ffaadf113d032847d60b7880f9d3e2fa14f800
                       b51331f7b4949fca4ae5443765abdee035b2247f
                       13505d5194c42ad565e332490cec9e5a3a7df1f1
                       2eac7c52f51fd889b709f22153f28e28d1c314ed
                       5521ca63374240ef1fd6573b2f42f1bea7bea245
                       be1beddc686787b33b2a7034d0bf1b711a14867b
                       5c7fcfae5a765ac1f1c08bed9c9af40c944cb583
                       4c914e23e1da7fc9f2c9ad4ae171fbea9952f046
                       61456414405f5854a9190e589545bc22788c896f
                       f356dcf3337a81b110287fd847cbe437f40c96e0
                       a2d6e193af3e926e0169fbe6e989f33f2780cf59
                       904b414298d408ee79293abd9d41db85f4ffabc9
                       ce586b4384b2f03652b88d2f6dbbc6ad34864452
                       64dcaf0eae77aa42619f30aa028a46d78b87d849
                       ac64d5541d0a3c23f40cdbf2c0d2f4145f19b010
                       85f5394b2dc08a465380c2672ddca5e2601d23f8
                       d7a0ec3b7badf960da8159863b52d867aa11f03e
                       577dc7b3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4b:b2:79:99:d4:8c:42:cb:f2:12:3a:df:fd:91:60:73:5f:64:34:97]
            modulus: 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
    public exponent: 10001

] 
2021-05-15 01:29:31.146  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-15 01:29:31.147 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-15 01:29:31.149 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-15 01:29:31.149 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-15 01:29:31.150  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-15 01:29:31.150  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-15 01:29:31.150  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-15 01:29:31.151  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-15 01:29:31.151  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-15 01:29:31.156  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-15 01:29:31.157  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-15 01:29:31.157  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-15 01:29:31.158  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-15 01:29:31.245  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-15 01:29:31.245  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-15 01:29:31.246 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-15 01:29:31.248 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-15 01:29:31.248  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1598
2021-05-15 01:29:31.249  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-15 01:29:31.251  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-15 01:29:31.251  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-15 01:29:31.252  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-15 01:29:31.252  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-15 01:29:31.253 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-15 01:29:31.253 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-15 01:29:31.253 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-15 01:29:31.254 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-15 01:29:31.254 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-15 01:29:31.254 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-15 01:29:31.255 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-15 01:29:31.257 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 354157011699784478991254199799455350018330471336
             IssuerDN: UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 15 00:07:37 UTC 2021
           Final Date: Thu May 15 00:07:37 UTC 2031
            SubjectDN: UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [db:c1:3f:e5:71:6a:c2:f4:b5:ed:5f:7d:dc:d5:08:a0:89:16:eb:06]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1d3e524b2fb2be779f862d4a939164b40773d873
                       84adbf5a69524ec23b06b487d6388851bfd89997
                       80ffaadf113d032847d60b7880f9d3e2fa14f800
                       b51331f7b4949fca4ae5443765abdee035b2247f
                       13505d5194c42ad565e332490cec9e5a3a7df1f1
                       2eac7c52f51fd889b709f22153f28e28d1c314ed
                       5521ca63374240ef1fd6573b2f42f1bea7bea245
                       be1beddc686787b33b2a7034d0bf1b711a14867b
                       5c7fcfae5a765ac1f1c08bed9c9af40c944cb583
                       4c914e23e1da7fc9f2c9ad4ae171fbea9952f046
                       61456414405f5854a9190e589545bc22788c896f
                       f356dcf3337a81b110287fd847cbe437f40c96e0
                       a2d6e193af3e926e0169fbe6e989f33f2780cf59
                       904b414298d408ee79293abd9d41db85f4ffabc9
                       ce586b4384b2f03652b88d2f6dbbc6ad34864452
                       64dcaf0eae77aa42619f30aa028a46d78b87d849
                       ac64d5541d0a3c23f40cdbf2c0d2f4145f19b010
                       85f5394b2dc08a465380c2672ddca5e2601d23f8
                       d7a0ec3b7badf960da8159863b52d867aa11f03e
                       577dc7b3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [22:9d:fd:b5:a9:fe:93:25:9d:e3:b4:69:94:e2:85:08:6a:2c:6c:3e]
            modulus: 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
    public exponent: 10001

] 
2021-05-15 01:31:30.566  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-15 01:31:30.567 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-15 01:31:30.568 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-15 01:31:30.568 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-15 01:31:30.569  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-15 01:31:30.569  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-15 01:31:30.570  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-15 01:31:30.570  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-15 01:31:30.570  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-15 01:31:30.575  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-15 01:31:30.576  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-15 01:31:30.576  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-15 01:31:30.577  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-15 01:31:30.689  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-15 01:31:30.689  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-15 01:31:30.689 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-15 01:31:30.691 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-15 01:31:30.692  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1598
2021-05-15 01:31:30.692  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-15 01:31:30.693  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-15 01:31:30.693  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-15 01:31:30.693  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-15 01:31:30.694  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-15 01:31:30.694 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-15 01:31:30.694 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-15 01:31:30.694 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-15 01:31:30.695 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-15 01:31:30.695 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-15 01:31:30.695 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-15 01:31:30.696 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-15 01:31:30.768 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 354157011699784478991254199799455350018330471336
             IssuerDN: UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 15 00:07:37 UTC 2021
           Final Date: Thu May 15 00:07:37 UTC 2031
            SubjectDN: UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [db:c1:3f:e5:71:6a:c2:f4:b5:ed:5f:7d:dc:d5:08:a0:89:16:eb:06]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1d3e524b2fb2be779f862d4a939164b40773d873
                       84adbf5a69524ec23b06b487d6388851bfd89997
                       80ffaadf113d032847d60b7880f9d3e2fa14f800
                       b51331f7b4949fca4ae5443765abdee035b2247f
                       13505d5194c42ad565e332490cec9e5a3a7df1f1
                       2eac7c52f51fd889b709f22153f28e28d1c314ed
                       5521ca63374240ef1fd6573b2f42f1bea7bea245
                       be1beddc686787b33b2a7034d0bf1b711a14867b
                       5c7fcfae5a765ac1f1c08bed9c9af40c944cb583
                       4c914e23e1da7fc9f2c9ad4ae171fbea9952f046
                       61456414405f5854a9190e589545bc22788c896f
                       f356dcf3337a81b110287fd847cbe437f40c96e0
                       a2d6e193af3e926e0169fbe6e989f33f2780cf59
                       904b414298d408ee79293abd9d41db85f4ffabc9
                       ce586b4384b2f03652b88d2f6dbbc6ad34864452
                       64dcaf0eae77aa42619f30aa028a46d78b87d849
                       ac64d5541d0a3c23f40cdbf2c0d2f4145f19b010
                       85f5394b2dc08a465380c2672ddca5e2601d23f8
                       d7a0ec3b7badf960da8159863b52d867aa11f03e
                       577dc7b3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [28:d3:68:41:5f:f3:b0:5d:5f:cf:e6:d7:6f:8d:8c:c7:0b:07:ee:2f]
            modulus: 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
    public exponent: 10001

] 
2021-05-15 01:32:53.466  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-15 01:32:53.468 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-15 01:32:53.469 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-15 01:32:53.470 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-15 01:32:53.470  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-15 01:32:53.471  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-15 01:32:53.471  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-15 01:32:53.471  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-15 01:32:53.471  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-15 01:32:53.475  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-15 01:32:53.475  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-15 01:32:53.475  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-15 01:32:53.476  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-15 01:32:53.550  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-15 01:32:53.550  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-15 01:32:53.551 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-15 01:32:53.552 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-15 01:32:53.553  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1598
2021-05-15 01:32:53.553  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-15 01:32:53.555  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-15 01:32:53.556  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-15 01:32:53.556  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-15 01:32:53.557  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-15 01:32:53.557 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-15 01:32:53.557 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-15 01:32:53.558 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-15 01:32:53.558 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-15 01:32:53.559 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-15 01:32:53.559 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-15 01:32:53.560 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-15 01:32:53.568 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 354157011699784478991254199799455350018330471336
             IssuerDN: UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 15 00:07:37 UTC 2021
           Final Date: Thu May 15 00:07:37 UTC 2031
            SubjectDN: UID=c-00f56de0712be9ec4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [db:c1:3f:e5:71:6a:c2:f4:b5:ed:5f:7d:dc:d5:08:a0:89:16:eb:06]
            modulus: b6e007d1204fd8e69fa619e661edad5a09821a6e4ec68265b5819d79fec6be6236a58c08fad4355ea97e7bcfdff2e60a0b3f5a5344fc8331e4fc32349102e11c027fcf315c0541def39a96a6984459be27de03013c5be9b4e0194ad887019f63126137d4aca8435a5f240206f66d9fe7bcb9f30bead611a37937c4514146cf419ba39aba1f53f0873ec1cf058f671e59de0a2c483dc5091df6f655cfe3f9003b48e32d0606c634950f86af50e09453faed850f0980ccc61f45a2b182477fe6be4a2bdf61ed53947501055818377c16852c4748bf351460d5e07a7bbd72eee301759db0621b346108d23944c30b2176edc7e7d3311145f14a00f9c73a3a8de9d12d9fae9cce20ad4b87cfd1bd0f53ecaf3618af3c8643fefa73a7ee5c8239d7d007c1915c863f84b7fefadd9bc2d73405acaab67d1b0d7c3a7c9269ac1d4fbac61a1c10a7746b9886d40aa5ab89579c543b948b27620f04e3ae6e9b9b0ef37d03cd09e729ed14c7b0322a559adb39aa9ca4944d0b679ae8c6f92710094c40b4f3
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1d3e524b2fb2be779f862d4a939164b40773d873
                       84adbf5a69524ec23b06b487d6388851bfd89997
                       80ffaadf113d032847d60b7880f9d3e2fa14f800
                       b51331f7b4949fca4ae5443765abdee035b2247f
                       13505d5194c42ad565e332490cec9e5a3a7df1f1
                       2eac7c52f51fd889b709f22153f28e28d1c314ed
                       5521ca63374240ef1fd6573b2f42f1bea7bea245
                       be1beddc686787b33b2a7034d0bf1b711a14867b
                       5c7fcfae5a765ac1f1c08bed9c9af40c944cb583
                       4c914e23e1da7fc9f2c9ad4ae171fbea9952f046
                       61456414405f5854a9190e589545bc22788c896f
                       f356dcf3337a81b110287fd847cbe437f40c96e0
                       a2d6e193af3e926e0169fbe6e989f33f2780cf59
                       904b414298d408ee79293abd9d41db85f4ffabc9
                       ce586b4384b2f03652b88d2f6dbbc6ad34864452
                       64dcaf0eae77aa42619f30aa028a46d78b87d849
                       ac64d5541d0a3c23f40cdbf2c0d2f4145f19b010
                       85f5394b2dc08a465380c2672ddca5e2601d23f8
                       d7a0ec3b7badf960da8159863b52d867aa11f03e
                       577dc7b3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7b:0d:54:bf:af:34:12:f5:55:a1:88:7a:a7:e0:5c:fb:73:ff:0d:01]
            modulus: 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
    public exponent: 10001

]