Results

By type

          2021-05-24 23:33:13,631 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-05-24 23:33:17,242 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-05-24 23:33:19.738  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-05-24 23:33:30.441 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-05-24 23:33:31.437  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-05-24 23:33:32.033  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-05-24 23:33:43.939  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 32.399 seconds (JVM running for 38.34)
2021-05-24 23:47:51.737  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-24 23:47:51.746 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-24 23:47:51.859 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-24 23:47:51.863 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-24 23:47:51.940  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-24 23:47:51.944  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-24 23:47:52.028  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-24 23:47:52.028  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-24 23:47:52.029  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-24 23:47:52.036  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-24 23:47:52.039  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-24 23:47:52.145  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-24 23:47:52.229  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-24 23:47:52.230  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-24 23:47:52.244  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-24 23:47:53.376  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-24 23:47:53.379  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-24 23:47:53.380 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-24 23:47:53.430 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-24 23:47:53.432  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1369
2021-05-24 23:47:53.433  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-24 23:47:53.437  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-24 23:47:53.438  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-24 23:47:53.445  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-24 23:47:53.446  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-24 23:47:53.447 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-24 23:47:53.448 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-24 23:47:53.448 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-24 23:47:53.535 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-24 23:47:53.535 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-24 23:47:53.536 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-24 23:47:53.543 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-24 23:47:53.738 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 541007937511209565484393296736590801390818676575
             IssuerDN: UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 24 23:27:11 UTC 2021
           Final Date: Sat May 24 23:27:11 UTC 2031
            SubjectDN: UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [94:41:37:3d:67:0c:35:62:02:1e:0b:f6:f1:a4:22:63:ec:04:6e:5e]
            modulus: c4dde9ca7765feae6275682169ec834b8134423a382a0687ab63a1311385480d88c2049f3ec2d293bed226f34c08f2d76e6658ba0093742d4ef10dcb0edab26d289314ba296a134a239def57ed928f68d75d720e1503f02f8af891d89aa0168ad8bfebc60fb56bf4d12763518e63586487a42e64637cedcca971170434bcce69502600c2666675f90e307c0917cb6208f01b59b19ab086b0242bc587b661f28a2592770772324a80390f1d02ef4c4c2e0ca6ededc2baddedb35c11057e38688070618fe39b743112122521e3a8c3f97b5e471d629e6ec996c30d65e74f3f3a4291dd480dd5c6c385418d4803e0579c8f3f94622bf4f9a85b0e265bdccade6973d3f3f1656cfd2c059eb9f12121d428254b4fc30c5847e517a42e52052030af78012db1899291f4f76fdad735e6eec30926c753143dd3a5a208a7e09df65cc240ec530be3e0c6121102eaaa09b7fe23dc297371263c27a88460fdedd3175c5e516c6ef06d5184c312fc06170b87a5b36e8b66cfd4a070ca2b1d274c88c8ac7487
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8ee0355d01cd8b5f3bc6b79044c589c6114ee790
                       760f531c5393695e2504c512f0059bd350fc98d9
                       44db475efe183ed42583719da7bb7e6d76617fa6
                       d9a1cd75b31efd4802dc6dad5e56897149cfdcd5
                       197239f153ae43abd88db353e4d090408ce95e1f
                       89efabc58bc30922da6894f25d9cce778dd949bb
                       0b6715bfdc4c8e62eeb11a20321ee1b205d39643
                       382de06659cd24b20e77b7d94593a9d9b478fb99
                       95bbdc7c1e759ff95edd4c8e2be6b4b37928e51f
                       dbd69de9f36d760cd079cf753a273c46838bbfd9
                       93a5cc76221df994126b4e8839a429fd91cf5b7b
                       d799bd6d69c33906a5499b5aee10daa6f92c898c
                       e7705f1d5a695cca626beead422a5aed41e22177
                       44b15f0aba7d4d6614a73b0bd1729f1f3700a15b
                       f77f40690f65b6ea2d8e1540370f41bb240b259c
                       2be3a7e77a7a7fa4e6b943da3b1f9d24e2b38a60
                       31abc3bc010563261fc1463aa8ce1ef9018e5220
                       08c3b7e9aa8c2f886ce39acfd632bf2e897a8cb0
                       a8207898fbcbcf0b82af8657f7665a31d9513a37
                       0dffc802
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [17:42:24:3c:4b:a4:c3:9b:22:01:7f:61:31:57:4e:3b:fb:84:86:f4]
            modulus: 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
    public exponent: 10001

] 
2021-05-25 01:23:15.472  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-25 01:23:15.474 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-25 01:23:15.476 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-25 01:23:15.477 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-25 01:23:15.478  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-25 01:23:15.479  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-25 01:23:15.479  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-25 01:23:15.480  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-25 01:23:15.480  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-25 01:23:15.486  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-25 01:23:15.487  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-25 01:23:15.488  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-25 01:23:15.529  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-25 01:23:15.646  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-25 01:23:15.647  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-25 01:23:15.647 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-25 01:23:15.650 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-25 01:23:15.651  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1369
2021-05-25 01:23:15.651  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-25 01:23:15.653  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-25 01:23:15.653  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-25 01:23:15.654  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-25 01:23:15.654  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-25 01:23:15.654 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-25 01:23:15.655 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-25 01:23:15.655 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-25 01:23:15.728 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-25 01:23:15.728 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-25 01:23:15.729 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-25 01:23:15.730 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-25 01:23:15.742 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 541007937511209565484393296736590801390818676575
             IssuerDN: UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 24 23:27:11 UTC 2021
           Final Date: Sat May 24 23:27:11 UTC 2031
            SubjectDN: UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [94:41:37:3d:67:0c:35:62:02:1e:0b:f6:f1:a4:22:63:ec:04:6e:5e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8ee0355d01cd8b5f3bc6b79044c589c6114ee790
                       760f531c5393695e2504c512f0059bd350fc98d9
                       44db475efe183ed42583719da7bb7e6d76617fa6
                       d9a1cd75b31efd4802dc6dad5e56897149cfdcd5
                       197239f153ae43abd88db353e4d090408ce95e1f
                       89efabc58bc30922da6894f25d9cce778dd949bb
                       0b6715bfdc4c8e62eeb11a20321ee1b205d39643
                       382de06659cd24b20e77b7d94593a9d9b478fb99
                       95bbdc7c1e759ff95edd4c8e2be6b4b37928e51f
                       dbd69de9f36d760cd079cf753a273c46838bbfd9
                       93a5cc76221df994126b4e8839a429fd91cf5b7b
                       d799bd6d69c33906a5499b5aee10daa6f92c898c
                       e7705f1d5a695cca626beead422a5aed41e22177
                       44b15f0aba7d4d6614a73b0bd1729f1f3700a15b
                       f77f40690f65b6ea2d8e1540370f41bb240b259c
                       2be3a7e77a7a7fa4e6b943da3b1f9d24e2b38a60
                       31abc3bc010563261fc1463aa8ce1ef9018e5220
                       08c3b7e9aa8c2f886ce39acfd632bf2e897a8cb0
                       a8207898fbcbcf0b82af8657f7665a31d9513a37
                       0dffc802
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2f:46:a4:d6:ce:fb:10:39:33:5d:54:bc:71:b2:d8:30:e8:e2:38:92]
            modulus: 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
    public exponent: 10001

] 
2021-05-25 01:25:09.799  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-25 01:25:09.800 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-25 01:25:09.801 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-25 01:25:09.802 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-25 01:25:09.802  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-25 01:25:09.803  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-25 01:25:09.803  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-25 01:25:09.804  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-25 01:25:09.804  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-25 01:25:09.809  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-25 01:25:09.809  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-25 01:25:09.810  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-25 01:25:09.811  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-25 01:25:09.903  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-25 01:25:09.904  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-25 01:25:09.905 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-25 01:25:09.907 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-25 01:25:09.907  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1369
2021-05-25 01:25:09.908  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-25 01:25:09.909  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-25 01:25:09.909  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-25 01:25:09.910  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-25 01:25:09.910  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-25 01:25:09.910 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-25 01:25:09.911 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-25 01:25:09.911 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-25 01:25:09.912 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-25 01:25:09.927 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-25 01:25:09.928 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-25 01:25:09.929 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-25 01:25:09.931 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 541007937511209565484393296736590801390818676575
             IssuerDN: UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 24 23:27:11 UTC 2021
           Final Date: Sat May 24 23:27:11 UTC 2031
            SubjectDN: UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [94:41:37:3d:67:0c:35:62:02:1e:0b:f6:f1:a4:22:63:ec:04:6e:5e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8ee0355d01cd8b5f3bc6b79044c589c6114ee790
                       760f531c5393695e2504c512f0059bd350fc98d9
                       44db475efe183ed42583719da7bb7e6d76617fa6
                       d9a1cd75b31efd4802dc6dad5e56897149cfdcd5
                       197239f153ae43abd88db353e4d090408ce95e1f
                       89efabc58bc30922da6894f25d9cce778dd949bb
                       0b6715bfdc4c8e62eeb11a20321ee1b205d39643
                       382de06659cd24b20e77b7d94593a9d9b478fb99
                       95bbdc7c1e759ff95edd4c8e2be6b4b37928e51f
                       dbd69de9f36d760cd079cf753a273c46838bbfd9
                       93a5cc76221df994126b4e8839a429fd91cf5b7b
                       d799bd6d69c33906a5499b5aee10daa6f92c898c
                       e7705f1d5a695cca626beead422a5aed41e22177
                       44b15f0aba7d4d6614a73b0bd1729f1f3700a15b
                       f77f40690f65b6ea2d8e1540370f41bb240b259c
                       2be3a7e77a7a7fa4e6b943da3b1f9d24e2b38a60
                       31abc3bc010563261fc1463aa8ce1ef9018e5220
                       08c3b7e9aa8c2f886ce39acfd632bf2e897a8cb0
                       a8207898fbcbcf0b82af8657f7665a31d9513a37
                       0dffc802
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ce:01:f7:ed:65:d0:c3:1f:3d:59:87:43:4b:d0:00:85:95:30:17:75]
            modulus: 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
    public exponent: 10001

] 
2021-05-25 01:28:30.444  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-25 01:28:30.446 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-25 01:28:30.447 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-25 01:28:30.448 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-25 01:28:30.449  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-25 01:28:30.449  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-25 01:28:30.450  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-25 01:28:30.450  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-25 01:28:30.451  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-25 01:28:30.455  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-25 01:28:30.456  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-25 01:28:30.456  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-25 01:28:30.457  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-25 01:28:30.556  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-25 01:28:30.557  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-25 01:28:30.558 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-25 01:28:30.559 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-25 01:28:30.559  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1369
2021-05-25 01:28:30.560  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-25 01:28:30.561  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-25 01:28:30.561  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-25 01:28:30.562  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-25 01:28:30.562  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-25 01:28:30.563 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-25 01:28:30.563 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-25 01:28:30.563 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-25 01:28:30.564 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-25 01:28:30.564 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-25 01:28:30.565 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-25 01:28:30.566 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-25 01:28:30.629 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 541007937511209565484393296736590801390818676575
             IssuerDN: UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 24 23:27:11 UTC 2021
           Final Date: Sat May 24 23:27:11 UTC 2031
            SubjectDN: UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [94:41:37:3d:67:0c:35:62:02:1e:0b:f6:f1:a4:22:63:ec:04:6e:5e]
            modulus: c4dde9ca7765feae6275682169ec834b8134423a382a0687ab63a1311385480d88c2049f3ec2d293bed226f34c08f2d76e6658ba0093742d4ef10dcb0edab26d289314ba296a134a239def57ed928f68d75d720e1503f02f8af891d89aa0168ad8bfebc60fb56bf4d12763518e63586487a42e64637cedcca971170434bcce69502600c2666675f90e307c0917cb6208f01b59b19ab086b0242bc587b661f28a2592770772324a80390f1d02ef4c4c2e0ca6ededc2baddedb35c11057e38688070618fe39b743112122521e3a8c3f97b5e471d629e6ec996c30d65e74f3f3a4291dd480dd5c6c385418d4803e0579c8f3f94622bf4f9a85b0e265bdccade6973d3f3f1656cfd2c059eb9f12121d428254b4fc30c5847e517a42e52052030af78012db1899291f4f76fdad735e6eec30926c753143dd3a5a208a7e09df65cc240ec530be3e0c6121102eaaa09b7fe23dc297371263c27a88460fdedd3175c5e516c6ef06d5184c312fc06170b87a5b36e8b66cfd4a070ca2b1d274c88c8ac7487
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8ee0355d01cd8b5f3bc6b79044c589c6114ee790
                       760f531c5393695e2504c512f0059bd350fc98d9
                       44db475efe183ed42583719da7bb7e6d76617fa6
                       d9a1cd75b31efd4802dc6dad5e56897149cfdcd5
                       197239f153ae43abd88db353e4d090408ce95e1f
                       89efabc58bc30922da6894f25d9cce778dd949bb
                       0b6715bfdc4c8e62eeb11a20321ee1b205d39643
                       382de06659cd24b20e77b7d94593a9d9b478fb99
                       95bbdc7c1e759ff95edd4c8e2be6b4b37928e51f
                       dbd69de9f36d760cd079cf753a273c46838bbfd9
                       93a5cc76221df994126b4e8839a429fd91cf5b7b
                       d799bd6d69c33906a5499b5aee10daa6f92c898c
                       e7705f1d5a695cca626beead422a5aed41e22177
                       44b15f0aba7d4d6614a73b0bd1729f1f3700a15b
                       f77f40690f65b6ea2d8e1540370f41bb240b259c
                       2be3a7e77a7a7fa4e6b943da3b1f9d24e2b38a60
                       31abc3bc010563261fc1463aa8ce1ef9018e5220
                       08c3b7e9aa8c2f886ce39acfd632bf2e897a8cb0
                       a8207898fbcbcf0b82af8657f7665a31d9513a37
                       0dffc802
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bf:47:c9:e1:1d:fe:99:88:9b:a5:db:e7:9b:1f:66:c7:4e:82:7e:f3]
            modulus: 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
    public exponent: 10001

] 
2021-05-25 01:29:08.680  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-25 01:29:08.681 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-25 01:29:08.682 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-25 01:29:08.682 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-25 01:29:08.683  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-25 01:29:08.684  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-25 01:29:08.684  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-25 01:29:08.685  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-25 01:29:08.685  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-25 01:29:08.689  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-25 01:29:08.690  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-25 01:29:08.690  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-25 01:29:08.691  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-25 01:29:08.836  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-25 01:29:08.837  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-25 01:29:08.837 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-25 01:29:08.839 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-25 01:29:08.839  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1369
2021-05-25 01:29:08.840  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-25 01:29:08.841  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-25 01:29:08.841  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-25 01:29:08.842  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-25 01:29:08.842  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-25 01:29:08.842 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-25 01:29:08.843 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-25 01:29:08.843 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-25 01:29:08.843 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-25 01:29:08.844 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-25 01:29:08.844 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-25 01:29:08.845 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-25 01:29:08.848 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 541007937511209565484393296736590801390818676575
             IssuerDN: UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 24 23:27:11 UTC 2021
           Final Date: Sat May 24 23:27:11 UTC 2031
            SubjectDN: UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [94:41:37:3d:67:0c:35:62:02:1e:0b:f6:f1:a4:22:63:ec:04:6e:5e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8ee0355d01cd8b5f3bc6b79044c589c6114ee790
                       760f531c5393695e2504c512f0059bd350fc98d9
                       44db475efe183ed42583719da7bb7e6d76617fa6
                       d9a1cd75b31efd4802dc6dad5e56897149cfdcd5
                       197239f153ae43abd88db353e4d090408ce95e1f
                       89efabc58bc30922da6894f25d9cce778dd949bb
                       0b6715bfdc4c8e62eeb11a20321ee1b205d39643
                       382de06659cd24b20e77b7d94593a9d9b478fb99
                       95bbdc7c1e759ff95edd4c8e2be6b4b37928e51f
                       dbd69de9f36d760cd079cf753a273c46838bbfd9
                       93a5cc76221df994126b4e8839a429fd91cf5b7b
                       d799bd6d69c33906a5499b5aee10daa6f92c898c
                       e7705f1d5a695cca626beead422a5aed41e22177
                       44b15f0aba7d4d6614a73b0bd1729f1f3700a15b
                       f77f40690f65b6ea2d8e1540370f41bb240b259c
                       2be3a7e77a7a7fa4e6b943da3b1f9d24e2b38a60
                       31abc3bc010563261fc1463aa8ce1ef9018e5220
                       08c3b7e9aa8c2f886ce39acfd632bf2e897a8cb0
                       a8207898fbcbcf0b82af8657f7665a31d9513a37
                       0dffc802
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ad:43:ac:9b:d8:c0:b1:dc:ba:37:44:e0:c5:be:b6:f5:d8:05:23:ac]
            modulus: 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
    public exponent: 10001

] 
2021-05-25 01:29:15.688  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-25 01:29:15.689 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-25 01:29:15.690 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-25 01:29:15.691 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-25 01:29:15.691  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-25 01:29:15.692  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-25 01:29:15.692  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-25 01:29:15.693  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-25 01:29:15.693  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-25 01:29:15.698  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-25 01:29:15.698  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-25 01:29:15.699  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-25 01:29:15.700  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-25 01:29:15.774  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-25 01:29:15.775  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-25 01:29:15.775 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-25 01:29:15.828 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-25 01:29:15.828  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1369
2021-05-25 01:29:15.829  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-25 01:29:15.830  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-25 01:29:15.830  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-25 01:29:15.831  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-25 01:29:15.831  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-25 01:29:15.831 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-25 01:29:15.832 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-25 01:29:15.832 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-25 01:29:15.833 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-25 01:29:15.833 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-25 01:29:15.833 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-25 01:29:15.834 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-25 01:29:15.836 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 541007937511209565484393296736590801390818676575
             IssuerDN: UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 24 23:27:11 UTC 2021
           Final Date: Sat May 24 23:27:11 UTC 2031
            SubjectDN: UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [94:41:37:3d:67:0c:35:62:02:1e:0b:f6:f1:a4:22:63:ec:04:6e:5e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8ee0355d01cd8b5f3bc6b79044c589c6114ee790
                       760f531c5393695e2504c512f0059bd350fc98d9
                       44db475efe183ed42583719da7bb7e6d76617fa6
                       d9a1cd75b31efd4802dc6dad5e56897149cfdcd5
                       197239f153ae43abd88db353e4d090408ce95e1f
                       89efabc58bc30922da6894f25d9cce778dd949bb
                       0b6715bfdc4c8e62eeb11a20321ee1b205d39643
                       382de06659cd24b20e77b7d94593a9d9b478fb99
                       95bbdc7c1e759ff95edd4c8e2be6b4b37928e51f
                       dbd69de9f36d760cd079cf753a273c46838bbfd9
                       93a5cc76221df994126b4e8839a429fd91cf5b7b
                       d799bd6d69c33906a5499b5aee10daa6f92c898c
                       e7705f1d5a695cca626beead422a5aed41e22177
                       44b15f0aba7d4d6614a73b0bd1729f1f3700a15b
                       f77f40690f65b6ea2d8e1540370f41bb240b259c
                       2be3a7e77a7a7fa4e6b943da3b1f9d24e2b38a60
                       31abc3bc010563261fc1463aa8ce1ef9018e5220
                       08c3b7e9aa8c2f886ce39acfd632bf2e897a8cb0
                       a8207898fbcbcf0b82af8657f7665a31d9513a37
                       0dffc802
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [20:aa:30:a0:ba:11:69:ca:44:6d:2d:3c:53:c1:d1:27:8e:b1:69:6a]
            modulus: 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
    public exponent: 10001

] 
2021-05-25 01:29:46.363  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-25 01:29:46.365 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-25 01:29:46.366 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-25 01:29:46.368 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-25 01:29:46.368  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-25 01:29:46.369  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-25 01:29:46.369  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-25 01:29:46.369  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-25 01:29:46.370  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-25 01:29:46.374  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-25 01:29:46.375  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-25 01:29:46.375  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-25 01:29:46.376  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-25 01:29:46.516  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-25 01:29:46.517  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-25 01:29:46.517 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-25 01:29:46.518 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-25 01:29:46.518  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1369
2021-05-25 01:29:46.519  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-25 01:29:46.520  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-25 01:29:46.520  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-25 01:29:46.520  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-25 01:29:46.521  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-25 01:29:46.521 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-25 01:29:46.521 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-25 01:29:46.522 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-25 01:29:46.523 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-25 01:29:46.523 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-25 01:29:46.523 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-25 01:29:46.524 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-25 01:29:46.527 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 541007937511209565484393296736590801390818676575
             IssuerDN: UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 24 23:27:11 UTC 2021
           Final Date: Sat May 24 23:27:11 UTC 2031
            SubjectDN: UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [94:41:37:3d:67:0c:35:62:02:1e:0b:f6:f1:a4:22:63:ec:04:6e:5e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8ee0355d01cd8b5f3bc6b79044c589c6114ee790
                       760f531c5393695e2504c512f0059bd350fc98d9
                       44db475efe183ed42583719da7bb7e6d76617fa6
                       d9a1cd75b31efd4802dc6dad5e56897149cfdcd5
                       197239f153ae43abd88db353e4d090408ce95e1f
                       89efabc58bc30922da6894f25d9cce778dd949bb
                       0b6715bfdc4c8e62eeb11a20321ee1b205d39643
                       382de06659cd24b20e77b7d94593a9d9b478fb99
                       95bbdc7c1e759ff95edd4c8e2be6b4b37928e51f
                       dbd69de9f36d760cd079cf753a273c46838bbfd9
                       93a5cc76221df994126b4e8839a429fd91cf5b7b
                       d799bd6d69c33906a5499b5aee10daa6f92c898c
                       e7705f1d5a695cca626beead422a5aed41e22177
                       44b15f0aba7d4d6614a73b0bd1729f1f3700a15b
                       f77f40690f65b6ea2d8e1540370f41bb240b259c
                       2be3a7e77a7a7fa4e6b943da3b1f9d24e2b38a60
                       31abc3bc010563261fc1463aa8ce1ef9018e5220
                       08c3b7e9aa8c2f886ce39acfd632bf2e897a8cb0
                       a8207898fbcbcf0b82af8657f7665a31d9513a37
                       0dffc802
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [77:01:be:f8:6d:aa:bf:e3:b5:6b:9c:5f:2f:15:5f:60:0a:54:e3:8b]
            modulus: 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
    public exponent: 10001

] 
2021-05-25 01:31:01.520  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-25 01:31:01.521 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-25 01:31:01.522 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-25 01:31:01.522 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-25 01:31:01.523  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-25 01:31:01.523  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-25 01:31:01.524  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-25 01:31:01.524  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-25 01:31:01.524  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-25 01:31:01.528  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-25 01:31:01.529  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-25 01:31:01.529  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-25 01:31:01.530  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-25 01:31:01.602  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-25 01:31:01.603  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-25 01:31:01.603 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-25 01:31:01.604 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-25 01:31:01.605  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1369
2021-05-25 01:31:01.605  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-25 01:31:01.607  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-25 01:31:01.627  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-25 01:31:01.627  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-25 01:31:01.628  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-25 01:31:01.628 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-25 01:31:01.628 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-25 01:31:01.629 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-25 01:31:01.629 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-25 01:31:01.630 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-25 01:31:01.630 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-25 01:31:01.630 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-25 01:31:01.633 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 541007937511209565484393296736590801390818676575
             IssuerDN: UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 24 23:27:11 UTC 2021
           Final Date: Sat May 24 23:27:11 UTC 2031
            SubjectDN: UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [94:41:37:3d:67:0c:35:62:02:1e:0b:f6:f1:a4:22:63:ec:04:6e:5e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8ee0355d01cd8b5f3bc6b79044c589c6114ee790
                       760f531c5393695e2504c512f0059bd350fc98d9
                       44db475efe183ed42583719da7bb7e6d76617fa6
                       d9a1cd75b31efd4802dc6dad5e56897149cfdcd5
                       197239f153ae43abd88db353e4d090408ce95e1f
                       89efabc58bc30922da6894f25d9cce778dd949bb
                       0b6715bfdc4c8e62eeb11a20321ee1b205d39643
                       382de06659cd24b20e77b7d94593a9d9b478fb99
                       95bbdc7c1e759ff95edd4c8e2be6b4b37928e51f
                       dbd69de9f36d760cd079cf753a273c46838bbfd9
                       93a5cc76221df994126b4e8839a429fd91cf5b7b
                       d799bd6d69c33906a5499b5aee10daa6f92c898c
                       e7705f1d5a695cca626beead422a5aed41e22177
                       44b15f0aba7d4d6614a73b0bd1729f1f3700a15b
                       f77f40690f65b6ea2d8e1540370f41bb240b259c
                       2be3a7e77a7a7fa4e6b943da3b1f9d24e2b38a60
                       31abc3bc010563261fc1463aa8ce1ef9018e5220
                       08c3b7e9aa8c2f886ce39acfd632bf2e897a8cb0
                       a8207898fbcbcf0b82af8657f7665a31d9513a37
                       0dffc802
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6d:5f:b2:2e:61:de:84:67:07:a9:dd:36:1a:c7:86:46:eb:f2:ff:48]
            modulus: b19bbee5cf82112bec22feb330014d6ae1ba48ba86b2756cc2b74967481c3cd44a0b56a1244967713e8cb405007d86af2d52c9107ed658ea277fd26657d9a635249e2f047850cb63a4aed7ab6c8180d669442351698daa6cc46b6c110a8dd3ea55894e2ebc79453c14d8d9441a23ed850398afd7cea8fe59df17d9dba135313c270650a333d6fd22c6ecb37aa7501385353787ed874f8bb377849503419e51143dff8e7278518ff5685168ad285791c8e6f5e6069ca25b1dcfe0d209064d8feed20c466b18bd76aaea8616e084ed81fc7931113a3e30f3108f7de2fa46c891854e295f56c67e01b8e6a41991dfb6b4a86dd5bf75aa2c88236f1838658387596f
    public exponent: 10001

] 
2021-05-25 01:31:57.577  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-25 01:31:57.578 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-25 01:31:57.580 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-25 01:31:57.580 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-25 01:31:57.580  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-25 01:31:57.581  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-25 01:31:57.581  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-25 01:31:57.582  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-25 01:31:57.582  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-25 01:31:57.586  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-25 01:31:57.587  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-25 01:31:57.587  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-25 01:31:57.588  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-25 01:31:57.678  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-25 01:31:57.678  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-25 01:31:57.679 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-25 01:31:57.680 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-25 01:31:57.680  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1369
2021-05-25 01:31:57.680  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-25 01:31:57.681  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-25 01:31:57.682  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-25 01:31:57.682  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-25 01:31:57.682  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-25 01:31:57.683 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-25 01:31:57.683 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-25 01:31:57.683 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-25 01:31:57.684 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-25 01:31:57.684 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-25 01:31:57.684 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-25 01:31:57.685 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-25 01:31:57.687 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 541007937511209565484393296736590801390818676575
             IssuerDN: UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 24 23:27:11 UTC 2021
           Final Date: Sat May 24 23:27:11 UTC 2031
            SubjectDN: UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [94:41:37:3d:67:0c:35:62:02:1e:0b:f6:f1:a4:22:63:ec:04:6e:5e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8ee0355d01cd8b5f3bc6b79044c589c6114ee790
                       760f531c5393695e2504c512f0059bd350fc98d9
                       44db475efe183ed42583719da7bb7e6d76617fa6
                       d9a1cd75b31efd4802dc6dad5e56897149cfdcd5
                       197239f153ae43abd88db353e4d090408ce95e1f
                       89efabc58bc30922da6894f25d9cce778dd949bb
                       0b6715bfdc4c8e62eeb11a20321ee1b205d39643
                       382de06659cd24b20e77b7d94593a9d9b478fb99
                       95bbdc7c1e759ff95edd4c8e2be6b4b37928e51f
                       dbd69de9f36d760cd079cf753a273c46838bbfd9
                       93a5cc76221df994126b4e8839a429fd91cf5b7b
                       d799bd6d69c33906a5499b5aee10daa6f92c898c
                       e7705f1d5a695cca626beead422a5aed41e22177
                       44b15f0aba7d4d6614a73b0bd1729f1f3700a15b
                       f77f40690f65b6ea2d8e1540370f41bb240b259c
                       2be3a7e77a7a7fa4e6b943da3b1f9d24e2b38a60
                       31abc3bc010563261fc1463aa8ce1ef9018e5220
                       08c3b7e9aa8c2f886ce39acfd632bf2e897a8cb0
                       a8207898fbcbcf0b82af8657f7665a31d9513a37
                       0dffc802
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f0:7e:2b:ea:3f:e9:25:0d:97:6d:41:40:5e:be:5b:61:0a:9f:b1:f0]
            modulus: 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
    public exponent: 10001

] 
2021-05-25 01:35:06.582  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-25 01:35:06.583 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-25 01:35:06.584 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-25 01:35:06.585 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-25 01:35:06.585  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-25 01:35:06.586  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-25 01:35:06.586  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-25 01:35:06.586  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-25 01:35:06.587  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-25 01:35:06.591  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-25 01:35:06.592  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-25 01:35:06.592  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-25 01:35:06.593  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-25 01:35:06.690  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-25 01:35:06.691  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-25 01:35:06.691 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-25 01:35:06.692 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-25 01:35:06.729  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1369
2021-05-25 01:35:06.729  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-25 01:35:06.730  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-25 01:35:06.731  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-25 01:35:06.731  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-25 01:35:06.731  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-25 01:35:06.732 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-25 01:35:06.732 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-25 01:35:06.732 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-25 01:35:06.733 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-25 01:35:06.733 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-25 01:35:06.733 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-25 01:35:06.734 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-25 01:35:06.737 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 541007937511209565484393296736590801390818676575
             IssuerDN: UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 24 23:27:11 UTC 2021
           Final Date: Sat May 24 23:27:11 UTC 2031
            SubjectDN: UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [94:41:37:3d:67:0c:35:62:02:1e:0b:f6:f1:a4:22:63:ec:04:6e:5e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8ee0355d01cd8b5f3bc6b79044c589c6114ee790
                       760f531c5393695e2504c512f0059bd350fc98d9
                       44db475efe183ed42583719da7bb7e6d76617fa6
                       d9a1cd75b31efd4802dc6dad5e56897149cfdcd5
                       197239f153ae43abd88db353e4d090408ce95e1f
                       89efabc58bc30922da6894f25d9cce778dd949bb
                       0b6715bfdc4c8e62eeb11a20321ee1b205d39643
                       382de06659cd24b20e77b7d94593a9d9b478fb99
                       95bbdc7c1e759ff95edd4c8e2be6b4b37928e51f
                       dbd69de9f36d760cd079cf753a273c46838bbfd9
                       93a5cc76221df994126b4e8839a429fd91cf5b7b
                       d799bd6d69c33906a5499b5aee10daa6f92c898c
                       e7705f1d5a695cca626beead422a5aed41e22177
                       44b15f0aba7d4d6614a73b0bd1729f1f3700a15b
                       f77f40690f65b6ea2d8e1540370f41bb240b259c
                       2be3a7e77a7a7fa4e6b943da3b1f9d24e2b38a60
                       31abc3bc010563261fc1463aa8ce1ef9018e5220
                       08c3b7e9aa8c2f886ce39acfd632bf2e897a8cb0
                       a8207898fbcbcf0b82af8657f7665a31d9513a37
                       0dffc802
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [26:e3:9f:96:09:d3:ee:81:45:2a:39:a5:d7:1b:2d:09:53:d3:81:99]
            modulus: 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
    public exponent: 10001

] 
2021-05-25 01:37:45.588  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-25 01:37:45.590 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-25 01:37:45.591 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-25 01:37:45.592 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-25 01:37:45.592  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-25 01:37:45.593  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-25 01:37:45.594  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-25 01:37:45.594  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-25 01:37:45.595  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-25 01:37:45.601  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-25 01:37:45.602  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-25 01:37:45.602  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-25 01:37:45.604  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-25 01:37:45.757  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-25 01:37:45.758  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-25 01:37:45.758 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-25 01:37:45.760 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-25 01:37:45.760  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1369
2021-05-25 01:37:45.761  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-25 01:37:45.762  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-25 01:37:45.763  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-25 01:37:45.763  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-25 01:37:45.764  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-25 01:37:45.764 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-25 01:37:45.764 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-25 01:37:45.765 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-25 01:37:45.766 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-25 01:37:45.766 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-25 01:37:45.766 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-25 01:37:45.767 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-25 01:37:45.771 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 541007937511209565484393296736590801390818676575
             IssuerDN: UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 24 23:27:11 UTC 2021
           Final Date: Sat May 24 23:27:11 UTC 2031
            SubjectDN: UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [94:41:37:3d:67:0c:35:62:02:1e:0b:f6:f1:a4:22:63:ec:04:6e:5e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8ee0355d01cd8b5f3bc6b79044c589c6114ee790
                       760f531c5393695e2504c512f0059bd350fc98d9
                       44db475efe183ed42583719da7bb7e6d76617fa6
                       d9a1cd75b31efd4802dc6dad5e56897149cfdcd5
                       197239f153ae43abd88db353e4d090408ce95e1f
                       89efabc58bc30922da6894f25d9cce778dd949bb
                       0b6715bfdc4c8e62eeb11a20321ee1b205d39643
                       382de06659cd24b20e77b7d94593a9d9b478fb99
                       95bbdc7c1e759ff95edd4c8e2be6b4b37928e51f
                       dbd69de9f36d760cd079cf753a273c46838bbfd9
                       93a5cc76221df994126b4e8839a429fd91cf5b7b
                       d799bd6d69c33906a5499b5aee10daa6f92c898c
                       e7705f1d5a695cca626beead422a5aed41e22177
                       44b15f0aba7d4d6614a73b0bd1729f1f3700a15b
                       f77f40690f65b6ea2d8e1540370f41bb240b259c
                       2be3a7e77a7a7fa4e6b943da3b1f9d24e2b38a60
                       31abc3bc010563261fc1463aa8ce1ef9018e5220
                       08c3b7e9aa8c2f886ce39acfd632bf2e897a8cb0
                       a8207898fbcbcf0b82af8657f7665a31d9513a37
                       0dffc802
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6d:b7:4a:9a:68:2e:24:ba:89:49:c7:c2:fa:9d:83:c2:e9:38:97:03]
            modulus: 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
    public exponent: 10001

] 
2021-05-25 01:39:51.622  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-25 01:39:51.623 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-25 01:39:51.624 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-25 01:39:51.624 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-25 01:39:51.624  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-25 01:39:51.625  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-25 01:39:51.625  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-25 01:39:51.625  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-25 01:39:51.626  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-25 01:39:51.630  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-25 01:39:51.630  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-25 01:39:51.630  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-25 01:39:51.631  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-25 01:39:51.753  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-25 01:39:51.754  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-25 01:39:51.754 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-25 01:39:51.755 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-25 01:39:51.756  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1369
2021-05-25 01:39:51.756  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-25 01:39:51.757  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-25 01:39:51.758  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-25 01:39:51.759  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-25 01:39:51.759  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-25 01:39:51.759 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-25 01:39:51.759 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-25 01:39:51.760 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-25 01:39:51.760 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-25 01:39:51.760 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-25 01:39:51.761 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-25 01:39:51.761 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-25 01:39:51.764 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 541007937511209565484393296736590801390818676575
             IssuerDN: UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 24 23:27:11 UTC 2021
           Final Date: Sat May 24 23:27:11 UTC 2031
            SubjectDN: UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [94:41:37:3d:67:0c:35:62:02:1e:0b:f6:f1:a4:22:63:ec:04:6e:5e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8ee0355d01cd8b5f3bc6b79044c589c6114ee790
                       760f531c5393695e2504c512f0059bd350fc98d9
                       44db475efe183ed42583719da7bb7e6d76617fa6
                       d9a1cd75b31efd4802dc6dad5e56897149cfdcd5
                       197239f153ae43abd88db353e4d090408ce95e1f
                       89efabc58bc30922da6894f25d9cce778dd949bb
                       0b6715bfdc4c8e62eeb11a20321ee1b205d39643
                       382de06659cd24b20e77b7d94593a9d9b478fb99
                       95bbdc7c1e759ff95edd4c8e2be6b4b37928e51f
                       dbd69de9f36d760cd079cf753a273c46838bbfd9
                       93a5cc76221df994126b4e8839a429fd91cf5b7b
                       d799bd6d69c33906a5499b5aee10daa6f92c898c
                       e7705f1d5a695cca626beead422a5aed41e22177
                       44b15f0aba7d4d6614a73b0bd1729f1f3700a15b
                       f77f40690f65b6ea2d8e1540370f41bb240b259c
                       2be3a7e77a7a7fa4e6b943da3b1f9d24e2b38a60
                       31abc3bc010563261fc1463aa8ce1ef9018e5220
                       08c3b7e9aa8c2f886ce39acfd632bf2e897a8cb0
                       a8207898fbcbcf0b82af8657f7665a31d9513a37
                       0dffc802
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6a:95:8f:32:b4:7f:11:ff:17:02:d7:d0:17:96:56:3d:94:df:14:fb]
            modulus: 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
    public exponent: 10001

] 
2021-05-25 01:41:36.377  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-25 01:41:36.378 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-25 01:41:36.379 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-25 01:41:36.380 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-25 01:41:36.380  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-25 01:41:36.381  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-25 01:41:36.381  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-25 01:41:36.381  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-25 01:41:36.382  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-25 01:41:36.386  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-25 01:41:36.386  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-25 01:41:36.386  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-25 01:41:36.387  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-25 01:41:36.481  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-25 01:41:36.481  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-25 01:41:36.482 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-25 01:41:36.483 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-25 01:41:36.483  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1369
2021-05-25 01:41:36.483  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-25 01:41:36.484  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-25 01:41:36.485  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-25 01:41:36.485  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-25 01:41:36.485  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-25 01:41:36.486 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-25 01:41:36.486 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-25 01:41:36.486 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-25 01:41:36.487 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-25 01:41:36.487 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-25 01:41:36.487 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-25 01:41:36.488 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-25 01:41:36.490 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 541007937511209565484393296736590801390818676575
             IssuerDN: UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 24 23:27:11 UTC 2021
           Final Date: Sat May 24 23:27:11 UTC 2031
            SubjectDN: UID=c-04e19616ec7dec0eb,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [94:41:37:3d:67:0c:35:62:02:1e:0b:f6:f1:a4:22:63:ec:04:6e:5e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8ee0355d01cd8b5f3bc6b79044c589c6114ee790
                       760f531c5393695e2504c512f0059bd350fc98d9
                       44db475efe183ed42583719da7bb7e6d76617fa6
                       d9a1cd75b31efd4802dc6dad5e56897149cfdcd5
                       197239f153ae43abd88db353e4d090408ce95e1f
                       89efabc58bc30922da6894f25d9cce778dd949bb
                       0b6715bfdc4c8e62eeb11a20321ee1b205d39643
                       382de06659cd24b20e77b7d94593a9d9b478fb99
                       95bbdc7c1e759ff95edd4c8e2be6b4b37928e51f
                       dbd69de9f36d760cd079cf753a273c46838bbfd9
                       93a5cc76221df994126b4e8839a429fd91cf5b7b
                       d799bd6d69c33906a5499b5aee10daa6f92c898c
                       e7705f1d5a695cca626beead422a5aed41e22177
                       44b15f0aba7d4d6614a73b0bd1729f1f3700a15b
                       f77f40690f65b6ea2d8e1540370f41bb240b259c
                       2be3a7e77a7a7fa4e6b943da3b1f9d24e2b38a60
                       31abc3bc010563261fc1463aa8ce1ef9018e5220
                       08c3b7e9aa8c2f886ce39acfd632bf2e897a8cb0
                       a8207898fbcbcf0b82af8657f7665a31d9513a37
                       0dffc802
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f9:16:2f:c2:fd:46:9e:22:4c:74:95:96:b9:5e:eb:3f:47:1a:19:60]
            modulus: 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
    public exponent: 10001

]