2021-05-27 23:54:42,312 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-05-27 23:54:46,510 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-05-27 23:54:49.902  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-05-27 23:55:02.313 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-05-27 23:55:03.616  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-05-27 23:55:04.504  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-05-27 23:55:19.014  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 39.013 seconds (JVM running for 46.694) 2021-05-28 00:02:40.314  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-28 00:02:40.411 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-28 00:02:40.523 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-28 00:02:40.527 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-28 00:02:40.613  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-28 00:02:40.701  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-28 00:02:40.709  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-28 00:02:40.710  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 00:02:40.711  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-28 00:02:40.717  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-28 00:02:40.809  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-28 00:02:41.008  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-28 00:02:41.016  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 00:02:41.017  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 00:02:41.115  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-28 00:02:42.910  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-28 00:02:42.998  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-28 00:02:43.000 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-28 00:02:43.010 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-28 00:02:43.012  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1089 2021-05-28 00:02:43.012  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-28 00:02:43.099  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-28 00:02:43.101  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-28 00:02:43.108  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-28 00:02:43.109  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-28 00:02:43.110 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 00:02:43.110 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 00:02:43.111 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 00:02:43.207 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 00:02:43.208 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 00:02:43.209 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 00:02:43.216 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-28 00:02:43.315 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 187184206351421476390261190492235198478949669861 IssuerDN: UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 27 23:44:31 UTC 2021 Final Date: Tue May 27 23:44:31 UTC 2031 SubjectDN: UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [34:65:17:d9:4c:93:16:1c:58:fa:55:4b:e6:2f:1c:f5:0e:32:eb:4b] modulus: a677a83ce5232057ca7947902e7c78d2cf008a6542121c67cb8c77e1c7e882c19ecca11ebf1cfc152bfac03f0fb8f1c2aaebc935844454736161d12879cef8cf2bebfb621b281e2bf942dcba16b59d7bb9d669190c72a3bc0b792204a72fd7cd01ab03e0b36530c4f0e2608254cc43620ac6af17c13a76a044509c084991607add9626a3a07a65378dc2a1837a16a0a327c9eba293f3da489d65f17c79b6e885358ad912d9ac2ec0ee96e6e54b304a57a48167dce01acd00cf638ceaca4bc440c67ebf5e97a89173583572814a5f9e456e91dae9f04a330571068bbdee9071f602460fc2bf8626c6fd912a7ab0296278ff42c9100a0c3437fa90dd3d37148ed339413a68297bf3beb7dfc515a24adf6a8c8b33b7bd9e3847d18bda8dbf3297da867c23824954f94691194bc94c559818b5717475df870b5a4c0ced5009a571742aa9da7555bb01204672559c8a031d21e632f775d670e343420ad8d0c17c8131fd70d6a51ae2918bbe133d25c8eb385340f7e31bb46c31379e7409d2da9f43b9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 393794b8fdd92fbd1ca7373d2bee0ffe57217bc3 bb3cbe5dc74a3c238b9de32af0248be66f27f705 f04d5f0e4e49f9ae0a875dea91e6516a9e1982fc b9e335fee8cd39575ed2847a9dc1bde6c5bb7378 323ffec4051eb3e9e6e75692b485f8e08c7180b5 a305f2d21572105f609afcc4af592943b5681c42 4beca84f7c8e5456652f2eec3ddb5f283d846268 58fa98ce9b6c1b1d16cbecde6184984ef9c82f48 00183e0d310d219807447db13897fb0606ddb065 29bb80ed54a076b354ae55d78445489662afe8eb fa42edee76176da680b6f4d4c52c2caea593b5cd ed23b7b41487ded45041784ec1908ba78918511b 1a6b275702c00b49928084f2a1768b1028c5d4a1 cfdb5a17ebe797b17dc1c87b20e6e83829d2d08c f06e77bb3c0147c4e5fbc40066598aa08060106c 1aa93de62f8aa69f0b2c1d9c1c89f7e3a4d2edf4 cb58c8ae55aeb3c39566cf0ae290bfefecce53cc 52fbe2c36a8af18827b38e31c014a4e84c0db647 5f60ec8029bb9c04e6d8347b9685a9ebf3ad2b9b 243d1397 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d8:65:15:57:f7:70:fb:23:5b:ed:0e:9b:d7:d6:50:47:f5:63:56:36] modulus: ab61cbadef20f31b4296773431b3d6885ea0bda12a809838d465034be44d000b0276f704ee40db09694b41c8f8389e768a1d113c58c68bd61dc4681efe313d421359ffa3f75576158d27a069d8a00e5fe77decec3d3207e189b5af1108171b7c8db5a59e761f53e00aec830e12326070eeb9c707e58b6ee99beb3ba92dad22ad4a4e06746d09ab252d0012bb306b8ccbf69a0763acf5290b624e835c0508fcac9e3d1a246ee3bcb221cf87ff4d05c310f01c454d82ee1c7e56f7c1ff6589eac44355cbfc7122b1966b4fc6cc49e6bc9843149401a144d2c1b0370d5f64c32493501d56251423b18a0c3b9441d53a9f5d7a1383ab4b94ce538aba0db1a1c553df public exponent: 10001 ] 2021-05-28 01:25:05.744  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-28 01:25:05.746 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-28 01:25:05.749 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-28 01:25:05.750 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-28 01:25:05.751  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-28 01:25:05.752  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-28 01:25:05.752  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-28 01:25:05.752  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-28 01:25:05.753  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-28 01:25:05.800  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-28 01:25:05.802  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 01:25:05.802  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 01:25:05.805  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-28 01:25:06.657  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-28 01:25:06.658  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-28 01:25:06.658 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-28 01:25:06.662 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-28 01:25:06.663  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1089 2021-05-28 01:25:06.664  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-28 01:25:06.667  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-28 01:25:06.667  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-28 01:25:06.668  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-28 01:25:06.668  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-28 01:25:06.669 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 01:25:06.669 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 01:25:06.670 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 01:25:06.670 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 01:25:06.670 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 01:25:06.671 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 01:25:06.671 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-28 01:25:06.674 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 187184206351421476390261190492235198478949669861 IssuerDN: UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 27 23:44:31 UTC 2021 Final Date: Tue May 27 23:44:31 UTC 2031 SubjectDN: UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [34:65:17:d9:4c:93:16:1c:58:fa:55:4b:e6:2f:1c:f5:0e:32:eb:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 393794b8fdd92fbd1ca7373d2bee0ffe57217bc3 bb3cbe5dc74a3c238b9de32af0248be66f27f705 f04d5f0e4e49f9ae0a875dea91e6516a9e1982fc b9e335fee8cd39575ed2847a9dc1bde6c5bb7378 323ffec4051eb3e9e6e75692b485f8e08c7180b5 a305f2d21572105f609afcc4af592943b5681c42 4beca84f7c8e5456652f2eec3ddb5f283d846268 58fa98ce9b6c1b1d16cbecde6184984ef9c82f48 00183e0d310d219807447db13897fb0606ddb065 29bb80ed54a076b354ae55d78445489662afe8eb fa42edee76176da680b6f4d4c52c2caea593b5cd ed23b7b41487ded45041784ec1908ba78918511b 1a6b275702c00b49928084f2a1768b1028c5d4a1 cfdb5a17ebe797b17dc1c87b20e6e83829d2d08c f06e77bb3c0147c4e5fbc40066598aa08060106c 1aa93de62f8aa69f0b2c1d9c1c89f7e3a4d2edf4 cb58c8ae55aeb3c39566cf0ae290bfefecce53cc 52fbe2c36a8af18827b38e31c014a4e84c0db647 5f60ec8029bb9c04e6d8347b9685a9ebf3ad2b9b 243d1397 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1e:82:1b:3a:53:41:a7:81:29:15:ca:fb:19:80:fd:15:a3:66:24:2f] modulus: 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 public exponent: 10001 ] 2021-05-28 01:26:50.385  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-28 01:26:50.387 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-28 01:26:50.389 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-05-28 01:26:50.389 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-28 01:26:50.390  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-05-28 01:26:50.391  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-28 01:26:50.391  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-28 01:26:50.392  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-28 01:26:50.392  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-28 01:26:50.397  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-28 01:26:50.398  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 01:26:50.398  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 01:26:50.401  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-28 01:26:50.490  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-28 01:26:50.499  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-28 01:26:50.500 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-28 01:26:50.504 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-28 01:26:50.506  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1089 2021-05-28 01:26:50.507  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-28 01:26:50.509  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-28 01:26:50.510  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-28 01:26:50.510  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-28 01:26:50.511  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-28 01:26:50.511 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 01:26:50.512 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 01:26:50.512 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 01:26:50.513 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 01:26:50.514 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 01:26:50.514 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 01:26:50.599 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-28 01:26:50.605 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 187184206351421476390261190492235198478949669861 IssuerDN: UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 27 23:44:31 UTC 2021 Final Date: Tue May 27 23:44:31 UTC 2031 SubjectDN: UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [34:65:17:d9:4c:93:16:1c:58:fa:55:4b:e6:2f:1c:f5:0e:32:eb:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 393794b8fdd92fbd1ca7373d2bee0ffe57217bc3 bb3cbe5dc74a3c238b9de32af0248be66f27f705 f04d5f0e4e49f9ae0a875dea91e6516a9e1982fc b9e335fee8cd39575ed2847a9dc1bde6c5bb7378 323ffec4051eb3e9e6e75692b485f8e08c7180b5 a305f2d21572105f609afcc4af592943b5681c42 4beca84f7c8e5456652f2eec3ddb5f283d846268 58fa98ce9b6c1b1d16cbecde6184984ef9c82f48 00183e0d310d219807447db13897fb0606ddb065 29bb80ed54a076b354ae55d78445489662afe8eb fa42edee76176da680b6f4d4c52c2caea593b5cd ed23b7b41487ded45041784ec1908ba78918511b 1a6b275702c00b49928084f2a1768b1028c5d4a1 cfdb5a17ebe797b17dc1c87b20e6e83829d2d08c f06e77bb3c0147c4e5fbc40066598aa08060106c 1aa93de62f8aa69f0b2c1d9c1c89f7e3a4d2edf4 cb58c8ae55aeb3c39566cf0ae290bfefecce53cc 52fbe2c36a8af18827b38e31c014a4e84c0db647 5f60ec8029bb9c04e6d8347b9685a9ebf3ad2b9b 243d1397 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [92:7d:2a:49:8c:14:6e:39:9d:bc:83:33:83:66:91:cb:f2:76:40:0d] modulus: 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 public exponent: 10001 ] 2021-05-28 01:30:19.557  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-28 01:30:19.560 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-28 01:30:19.561 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-28 01:30:19.562 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-28 01:30:19.563  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-28 01:30:19.563  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-28 01:30:19.564  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-28 01:30:19.564  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-28 01:30:19.564  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-28 01:30:19.573  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-28 01:30:19.573  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 01:30:19.573  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 01:30:19.574  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-28 01:30:19.738  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-28 01:30:19.799  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-28 01:30:19.799 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-28 01:30:19.802 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-28 01:30:19.804  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1089 2021-05-28 01:30:19.804  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-28 01:30:19.806  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-28 01:30:19.806  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-28 01:30:19.807  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-28 01:30:19.807  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-28 01:30:19.807 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 01:30:19.808 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 01:30:19.808 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 01:30:19.809 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 01:30:19.809 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 01:30:19.810 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 01:30:19.811 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-28 01:30:19.814 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 187184206351421476390261190492235198478949669861 IssuerDN: UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 27 23:44:31 UTC 2021 Final Date: Tue May 27 23:44:31 UTC 2031 SubjectDN: UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [34:65:17:d9:4c:93:16:1c:58:fa:55:4b:e6:2f:1c:f5:0e:32:eb:4b] modulus: a677a83ce5232057ca7947902e7c78d2cf008a6542121c67cb8c77e1c7e882c19ecca11ebf1cfc152bfac03f0fb8f1c2aaebc935844454736161d12879cef8cf2bebfb621b281e2bf942dcba16b59d7bb9d669190c72a3bc0b792204a72fd7cd01ab03e0b36530c4f0e2608254cc43620ac6af17c13a76a044509c084991607add9626a3a07a65378dc2a1837a16a0a327c9eba293f3da489d65f17c79b6e885358ad912d9ac2ec0ee96e6e54b304a57a48167dce01acd00cf638ceaca4bc440c67ebf5e97a89173583572814a5f9e456e91dae9f04a330571068bbdee9071f602460fc2bf8626c6fd912a7ab0296278ff42c9100a0c3437fa90dd3d37148ed339413a68297bf3beb7dfc515a24adf6a8c8b33b7bd9e3847d18bda8dbf3297da867c23824954f94691194bc94c559818b5717475df870b5a4c0ced5009a571742aa9da7555bb01204672559c8a031d21e632f775d670e343420ad8d0c17c8131fd70d6a51ae2918bbe133d25c8eb385340f7e31bb46c31379e7409d2da9f43b9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 393794b8fdd92fbd1ca7373d2bee0ffe57217bc3 bb3cbe5dc74a3c238b9de32af0248be66f27f705 f04d5f0e4e49f9ae0a875dea91e6516a9e1982fc b9e335fee8cd39575ed2847a9dc1bde6c5bb7378 323ffec4051eb3e9e6e75692b485f8e08c7180b5 a305f2d21572105f609afcc4af592943b5681c42 4beca84f7c8e5456652f2eec3ddb5f283d846268 58fa98ce9b6c1b1d16cbecde6184984ef9c82f48 00183e0d310d219807447db13897fb0606ddb065 29bb80ed54a076b354ae55d78445489662afe8eb fa42edee76176da680b6f4d4c52c2caea593b5cd ed23b7b41487ded45041784ec1908ba78918511b 1a6b275702c00b49928084f2a1768b1028c5d4a1 cfdb5a17ebe797b17dc1c87b20e6e83829d2d08c f06e77bb3c0147c4e5fbc40066598aa08060106c 1aa93de62f8aa69f0b2c1d9c1c89f7e3a4d2edf4 cb58c8ae55aeb3c39566cf0ae290bfefecce53cc 52fbe2c36a8af18827b38e31c014a4e84c0db647 5f60ec8029bb9c04e6d8347b9685a9ebf3ad2b9b 243d1397 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7e:ff:cf:ae:c9:07:69:ca:17:3c:bb:54:c2:3f:1f:7b:3b:ed:04:c8] modulus: 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 public exponent: 10001 ] 2021-05-28 01:30:38.549  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-28 01:30:38.551 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-28 01:30:38.552 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-28 01:30:38.553 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-28 01:30:38.553  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-28 01:30:38.553  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-28 01:30:38.554  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-28 01:30:38.554  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-28 01:30:38.554  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-28 01:30:38.558  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-28 01:30:38.559  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 01:30:38.559  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 01:30:38.560  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-28 01:30:38.641  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-28 01:30:38.641  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-28 01:30:38.642 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-28 01:30:38.699 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-28 01:30:38.699  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1089 2021-05-28 01:30:38.700  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-28 01:30:38.702  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-28 01:30:38.702  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-28 01:30:38.703  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-28 01:30:38.703  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-28 01:30:38.704 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 01:30:38.704 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 01:30:38.704 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 01:30:38.705 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 01:30:38.705 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 01:30:38.705 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 01:30:38.706 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-28 01:30:38.709 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 187184206351421476390261190492235198478949669861 IssuerDN: UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 27 23:44:31 UTC 2021 Final Date: Tue May 27 23:44:31 UTC 2031 SubjectDN: UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [34:65:17:d9:4c:93:16:1c:58:fa:55:4b:e6:2f:1c:f5:0e:32:eb:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 393794b8fdd92fbd1ca7373d2bee0ffe57217bc3 bb3cbe5dc74a3c238b9de32af0248be66f27f705 f04d5f0e4e49f9ae0a875dea91e6516a9e1982fc b9e335fee8cd39575ed2847a9dc1bde6c5bb7378 323ffec4051eb3e9e6e75692b485f8e08c7180b5 a305f2d21572105f609afcc4af592943b5681c42 4beca84f7c8e5456652f2eec3ddb5f283d846268 58fa98ce9b6c1b1d16cbecde6184984ef9c82f48 00183e0d310d219807447db13897fb0606ddb065 29bb80ed54a076b354ae55d78445489662afe8eb fa42edee76176da680b6f4d4c52c2caea593b5cd ed23b7b41487ded45041784ec1908ba78918511b 1a6b275702c00b49928084f2a1768b1028c5d4a1 cfdb5a17ebe797b17dc1c87b20e6e83829d2d08c f06e77bb3c0147c4e5fbc40066598aa08060106c 1aa93de62f8aa69f0b2c1d9c1c89f7e3a4d2edf4 cb58c8ae55aeb3c39566cf0ae290bfefecce53cc 52fbe2c36a8af18827b38e31c014a4e84c0db647 5f60ec8029bb9c04e6d8347b9685a9ebf3ad2b9b 243d1397 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6d:1a:4b:26:69:21:65:fd:d4:6d:35:5c:a0:de:7e:75:07:06:74:dc] modulus: 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 public exponent: 10001 ] 2021-05-28 01:30:49.232  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-28 01:30:49.233 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-28 01:30:49.234 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-05-28 01:30:49.235 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-28 01:30:49.235  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-05-28 01:30:49.236  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-28 01:30:49.236  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-28 01:30:49.237  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-28 01:30:49.237  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-28 01:30:49.242  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-28 01:30:49.243  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 01:30:49.243  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 01:30:49.244  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-28 01:30:49.322  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-28 01:30:49.322  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-28 01:30:49.323 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-28 01:30:49.325 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-28 01:30:49.325  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1089 2021-05-28 01:30:49.326  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-28 01:30:49.328  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-28 01:30:49.328  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-28 01:30:49.329  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-28 01:30:49.329  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-28 01:30:49.330 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 01:30:49.330 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 01:30:49.330 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 01:30:49.332 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 01:30:49.332 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 01:30:49.333 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 01:30:49.334 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-28 01:30:49.336 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 187184206351421476390261190492235198478949669861 IssuerDN: UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 27 23:44:31 UTC 2021 Final Date: Tue May 27 23:44:31 UTC 2031 SubjectDN: UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [34:65:17:d9:4c:93:16:1c:58:fa:55:4b:e6:2f:1c:f5:0e:32:eb:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 393794b8fdd92fbd1ca7373d2bee0ffe57217bc3 bb3cbe5dc74a3c238b9de32af0248be66f27f705 f04d5f0e4e49f9ae0a875dea91e6516a9e1982fc b9e335fee8cd39575ed2847a9dc1bde6c5bb7378 323ffec4051eb3e9e6e75692b485f8e08c7180b5 a305f2d21572105f609afcc4af592943b5681c42 4beca84f7c8e5456652f2eec3ddb5f283d846268 58fa98ce9b6c1b1d16cbecde6184984ef9c82f48 00183e0d310d219807447db13897fb0606ddb065 29bb80ed54a076b354ae55d78445489662afe8eb fa42edee76176da680b6f4d4c52c2caea593b5cd ed23b7b41487ded45041784ec1908ba78918511b 1a6b275702c00b49928084f2a1768b1028c5d4a1 cfdb5a17ebe797b17dc1c87b20e6e83829d2d08c f06e77bb3c0147c4e5fbc40066598aa08060106c 1aa93de62f8aa69f0b2c1d9c1c89f7e3a4d2edf4 cb58c8ae55aeb3c39566cf0ae290bfefecce53cc 52fbe2c36a8af18827b38e31c014a4e84c0db647 5f60ec8029bb9c04e6d8347b9685a9ebf3ad2b9b 243d1397 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6e:8b:5d:a3:94:90:33:07:de:1b:20:96:73:a7:ec:34:c4:5b:c9:b6] modulus: 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 public exponent: 10001 ] 2021-05-28 01:31:02.609  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-28 01:31:02.610 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-28 01:31:02.612 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-05-28 01:31:02.613 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-28 01:31:02.613  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-05-28 01:31:02.615  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-28 01:31:02.615  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-28 01:31:02.616  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-28 01:31:02.616  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-28 01:31:02.621  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-28 01:31:02.621  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 01:31:02.621  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 01:31:02.622  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-28 01:31:02.786  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-28 01:31:02.803  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-28 01:31:02.803 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-28 01:31:02.805 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-28 01:31:02.806  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1089 2021-05-28 01:31:02.806  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-28 01:31:02.808  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-28 01:31:02.809  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-28 01:31:02.809  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-28 01:31:02.810  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-28 01:31:02.810 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 01:31:02.810 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 01:31:02.810 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 01:31:02.810 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 01:31:02.811 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 01:31:02.811 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 01:31:02.811 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-28 01:31:02.814 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 187184206351421476390261190492235198478949669861 IssuerDN: UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 27 23:44:31 UTC 2021 Final Date: Tue May 27 23:44:31 UTC 2031 SubjectDN: UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [34:65:17:d9:4c:93:16:1c:58:fa:55:4b:e6:2f:1c:f5:0e:32:eb:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 393794b8fdd92fbd1ca7373d2bee0ffe57217bc3 bb3cbe5dc74a3c238b9de32af0248be66f27f705 f04d5f0e4e49f9ae0a875dea91e6516a9e1982fc b9e335fee8cd39575ed2847a9dc1bde6c5bb7378 323ffec4051eb3e9e6e75692b485f8e08c7180b5 a305f2d21572105f609afcc4af592943b5681c42 4beca84f7c8e5456652f2eec3ddb5f283d846268 58fa98ce9b6c1b1d16cbecde6184984ef9c82f48 00183e0d310d219807447db13897fb0606ddb065 29bb80ed54a076b354ae55d78445489662afe8eb fa42edee76176da680b6f4d4c52c2caea593b5cd ed23b7b41487ded45041784ec1908ba78918511b 1a6b275702c00b49928084f2a1768b1028c5d4a1 cfdb5a17ebe797b17dc1c87b20e6e83829d2d08c f06e77bb3c0147c4e5fbc40066598aa08060106c 1aa93de62f8aa69f0b2c1d9c1c89f7e3a4d2edf4 cb58c8ae55aeb3c39566cf0ae290bfefecce53cc 52fbe2c36a8af18827b38e31c014a4e84c0db647 5f60ec8029bb9c04e6d8347b9685a9ebf3ad2b9b 243d1397 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [20:ae:27:b6:84:9e:9e:73:14:81:71:42:92:05:19:9f:df:c0:bf:38] modulus: b35ea87b9449d5aa322249388a59d8f39de907dfaf15fbd30b85b8c2aa3e3853306fa3c0cce7bf62c78a209404d87645aff9a4ab5117161d877a4205521c5c855fa871cd934d417cc46e39303254b105d51e84d97d29109910fb3b170954a6df28f76ebba7774c3603622142b8bf824f5cf0c7a81ffd0df80cb34eada9c1fbe22735d3e30d96fa7a07454b92b2718747d2f59aa77c0cebd0558d64b739f9b3eef12949ee0f338a1bc13ef600c915f602b452988f95638f11497792a9efd2fd17d46a8834e42a0484891b45a1d2845bd466643864b26dceeeb5bfd71db2860625ce1414a913dc1e275422da8c15868d79d625d563a17970be2684398eaabada2b public exponent: 10001 ] 2021-05-28 01:32:50.055  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-28 01:32:50.056 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-28 01:32:50.058 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-05-28 01:32:50.058 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-28 01:32:50.059  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-05-28 01:32:50.060  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-28 01:32:50.060  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-28 01:32:50.060  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-28 01:32:50.060  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-28 01:32:50.064  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-28 01:32:50.064  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 01:32:50.065  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 01:32:50.065  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-28 01:32:50.187  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-28 01:32:50.187  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-28 01:32:50.188 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-28 01:32:50.190 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-28 01:32:50.191  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1089 2021-05-28 01:32:50.191  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-28 01:32:50.193  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-28 01:32:50.194  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-28 01:32:50.195  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-28 01:32:50.195  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-28 01:32:50.196 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 01:32:50.196 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 01:32:50.196 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 01:32:50.197 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 01:32:50.197 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 01:32:50.198 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 01:32:50.199 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-28 01:32:50.201 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 187184206351421476390261190492235198478949669861 IssuerDN: UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 27 23:44:31 UTC 2021 Final Date: Tue May 27 23:44:31 UTC 2031 SubjectDN: UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [34:65:17:d9:4c:93:16:1c:58:fa:55:4b:e6:2f:1c:f5:0e:32:eb:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 393794b8fdd92fbd1ca7373d2bee0ffe57217bc3 bb3cbe5dc74a3c238b9de32af0248be66f27f705 f04d5f0e4e49f9ae0a875dea91e6516a9e1982fc b9e335fee8cd39575ed2847a9dc1bde6c5bb7378 323ffec4051eb3e9e6e75692b485f8e08c7180b5 a305f2d21572105f609afcc4af592943b5681c42 4beca84f7c8e5456652f2eec3ddb5f283d846268 58fa98ce9b6c1b1d16cbecde6184984ef9c82f48 00183e0d310d219807447db13897fb0606ddb065 29bb80ed54a076b354ae55d78445489662afe8eb fa42edee76176da680b6f4d4c52c2caea593b5cd ed23b7b41487ded45041784ec1908ba78918511b 1a6b275702c00b49928084f2a1768b1028c5d4a1 cfdb5a17ebe797b17dc1c87b20e6e83829d2d08c f06e77bb3c0147c4e5fbc40066598aa08060106c 1aa93de62f8aa69f0b2c1d9c1c89f7e3a4d2edf4 cb58c8ae55aeb3c39566cf0ae290bfefecce53cc 52fbe2c36a8af18827b38e31c014a4e84c0db647 5f60ec8029bb9c04e6d8347b9685a9ebf3ad2b9b 243d1397 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [95:a6:c9:7c:10:0d:0c:55:c2:e9:a2:52:2c:39:91:ad:d0:e2:51:07] modulus: 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 public exponent: 10001 ] 2021-05-28 01:34:07.290  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-28 01:34:07.292 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-28 01:34:07.294 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-05-28 01:34:07.295 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-28 01:34:07.295  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-05-28 01:34:07.296  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-28 01:34:07.297  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-28 01:34:07.297  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-28 01:34:07.298  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-28 01:34:07.302  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-28 01:34:07.303  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 01:34:07.303  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 01:34:07.304  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-28 01:34:07.446  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-28 01:34:07.447  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-28 01:34:07.447 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-28 01:34:07.449 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-28 01:34:07.449  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1089 2021-05-28 01:34:07.449  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-28 01:34:07.450  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-28 01:34:07.451  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-28 01:34:07.451  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-28 01:34:07.451  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-28 01:34:07.452 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 01:34:07.452 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 01:34:07.452 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 01:34:07.452 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 01:34:07.453 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 01:34:07.453 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 01:34:07.453 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-28 01:34:07.456 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 187184206351421476390261190492235198478949669861 IssuerDN: UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 27 23:44:31 UTC 2021 Final Date: Tue May 27 23:44:31 UTC 2031 SubjectDN: UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [34:65:17:d9:4c:93:16:1c:58:fa:55:4b:e6:2f:1c:f5:0e:32:eb:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 393794b8fdd92fbd1ca7373d2bee0ffe57217bc3 bb3cbe5dc74a3c238b9de32af0248be66f27f705 f04d5f0e4e49f9ae0a875dea91e6516a9e1982fc b9e335fee8cd39575ed2847a9dc1bde6c5bb7378 323ffec4051eb3e9e6e75692b485f8e08c7180b5 a305f2d21572105f609afcc4af592943b5681c42 4beca84f7c8e5456652f2eec3ddb5f283d846268 58fa98ce9b6c1b1d16cbecde6184984ef9c82f48 00183e0d310d219807447db13897fb0606ddb065 29bb80ed54a076b354ae55d78445489662afe8eb fa42edee76176da680b6f4d4c52c2caea593b5cd ed23b7b41487ded45041784ec1908ba78918511b 1a6b275702c00b49928084f2a1768b1028c5d4a1 cfdb5a17ebe797b17dc1c87b20e6e83829d2d08c f06e77bb3c0147c4e5fbc40066598aa08060106c 1aa93de62f8aa69f0b2c1d9c1c89f7e3a4d2edf4 cb58c8ae55aeb3c39566cf0ae290bfefecce53cc 52fbe2c36a8af18827b38e31c014a4e84c0db647 5f60ec8029bb9c04e6d8347b9685a9ebf3ad2b9b 243d1397 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c6:c5:13:9d:95:98:9e:6b:ff:a9:28:59:3b:f9:43:c4:65:cb:a0:8f] modulus: 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 public exponent: 10001 ] 2021-05-28 01:36:39.661  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-28 01:36:39.663 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-28 01:36:39.665 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-28 01:36:39.665 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-28 01:36:39.666  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-28 01:36:39.667  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-28 01:36:39.667  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-28 01:36:39.668  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-28 01:36:39.668  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-28 01:36:39.672  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-28 01:36:39.673  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 01:36:39.673  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 01:36:39.674  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-28 01:36:39.781  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-28 01:36:39.782  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-28 01:36:39.782 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-28 01:36:39.784 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-28 01:36:39.785  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1089 2021-05-28 01:36:39.785  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-28 01:36:39.786  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-28 01:36:39.787  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-28 01:36:39.787  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-28 01:36:39.788  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-28 01:36:39.788 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 01:36:39.789 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 01:36:39.789 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 01:36:39.790 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 01:36:39.790 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 01:36:39.790 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 01:36:39.791 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-28 01:36:39.793 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 187184206351421476390261190492235198478949669861 IssuerDN: UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 27 23:44:31 UTC 2021 Final Date: Tue May 27 23:44:31 UTC 2031 SubjectDN: UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [34:65:17:d9:4c:93:16:1c:58:fa:55:4b:e6:2f:1c:f5:0e:32:eb:4b] modulus: a677a83ce5232057ca7947902e7c78d2cf008a6542121c67cb8c77e1c7e882c19ecca11ebf1cfc152bfac03f0fb8f1c2aaebc935844454736161d12879cef8cf2bebfb621b281e2bf942dcba16b59d7bb9d669190c72a3bc0b792204a72fd7cd01ab03e0b36530c4f0e2608254cc43620ac6af17c13a76a044509c084991607add9626a3a07a65378dc2a1837a16a0a327c9eba293f3da489d65f17c79b6e885358ad912d9ac2ec0ee96e6e54b304a57a48167dce01acd00cf638ceaca4bc440c67ebf5e97a89173583572814a5f9e456e91dae9f04a330571068bbdee9071f602460fc2bf8626c6fd912a7ab0296278ff42c9100a0c3437fa90dd3d37148ed339413a68297bf3beb7dfc515a24adf6a8c8b33b7bd9e3847d18bda8dbf3297da867c23824954f94691194bc94c559818b5717475df870b5a4c0ced5009a571742aa9da7555bb01204672559c8a031d21e632f775d670e343420ad8d0c17c8131fd70d6a51ae2918bbe133d25c8eb385340f7e31bb46c31379e7409d2da9f43b9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 393794b8fdd92fbd1ca7373d2bee0ffe57217bc3 bb3cbe5dc74a3c238b9de32af0248be66f27f705 f04d5f0e4e49f9ae0a875dea91e6516a9e1982fc b9e335fee8cd39575ed2847a9dc1bde6c5bb7378 323ffec4051eb3e9e6e75692b485f8e08c7180b5 a305f2d21572105f609afcc4af592943b5681c42 4beca84f7c8e5456652f2eec3ddb5f283d846268 58fa98ce9b6c1b1d16cbecde6184984ef9c82f48 00183e0d310d219807447db13897fb0606ddb065 29bb80ed54a076b354ae55d78445489662afe8eb fa42edee76176da680b6f4d4c52c2caea593b5cd ed23b7b41487ded45041784ec1908ba78918511b 1a6b275702c00b49928084f2a1768b1028c5d4a1 cfdb5a17ebe797b17dc1c87b20e6e83829d2d08c f06e77bb3c0147c4e5fbc40066598aa08060106c 1aa93de62f8aa69f0b2c1d9c1c89f7e3a4d2edf4 cb58c8ae55aeb3c39566cf0ae290bfefecce53cc 52fbe2c36a8af18827b38e31c014a4e84c0db647 5f60ec8029bb9c04e6d8347b9685a9ebf3ad2b9b 243d1397 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d8:79:65:c9:ec:96:32:ed:64:02:a2:f1:bb:a4:f3:4a:35:eb:bf:7c] modulus: 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 public exponent: 10001 ] 2021-05-28 01:40:06.364  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-28 01:40:06.366 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-28 01:40:06.370 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-28 01:40:06.371 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-28 01:40:06.371  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-28 01:40:06.371  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-28 01:40:06.372  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-28 01:40:06.372  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-28 01:40:06.372  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-28 01:40:06.375  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-28 01:40:06.376  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 01:40:06.376  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 01:40:06.377  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-28 01:40:06.499  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-28 01:40:06.500  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-28 01:40:06.501 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-28 01:40:06.503 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-28 01:40:06.505  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1089 2021-05-28 01:40:06.505  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-28 01:40:06.508  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-28 01:40:06.508  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-28 01:40:06.509  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-28 01:40:06.509  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-28 01:40:06.510 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 01:40:06.510 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 01:40:06.511 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 01:40:06.512 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 01:40:06.512 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 01:40:06.513 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 01:40:06.513 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-28 01:40:06.601 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 187184206351421476390261190492235198478949669861 IssuerDN: UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 27 23:44:31 UTC 2021 Final Date: Tue May 27 23:44:31 UTC 2031 SubjectDN: UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [34:65:17:d9:4c:93:16:1c:58:fa:55:4b:e6:2f:1c:f5:0e:32:eb:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 393794b8fdd92fbd1ca7373d2bee0ffe57217bc3 bb3cbe5dc74a3c238b9de32af0248be66f27f705 f04d5f0e4e49f9ae0a875dea91e6516a9e1982fc b9e335fee8cd39575ed2847a9dc1bde6c5bb7378 323ffec4051eb3e9e6e75692b485f8e08c7180b5 a305f2d21572105f609afcc4af592943b5681c42 4beca84f7c8e5456652f2eec3ddb5f283d846268 58fa98ce9b6c1b1d16cbecde6184984ef9c82f48 00183e0d310d219807447db13897fb0606ddb065 29bb80ed54a076b354ae55d78445489662afe8eb fa42edee76176da680b6f4d4c52c2caea593b5cd ed23b7b41487ded45041784ec1908ba78918511b 1a6b275702c00b49928084f2a1768b1028c5d4a1 cfdb5a17ebe797b17dc1c87b20e6e83829d2d08c f06e77bb3c0147c4e5fbc40066598aa08060106c 1aa93de62f8aa69f0b2c1d9c1c89f7e3a4d2edf4 cb58c8ae55aeb3c39566cf0ae290bfefecce53cc 52fbe2c36a8af18827b38e31c014a4e84c0db647 5f60ec8029bb9c04e6d8347b9685a9ebf3ad2b9b 243d1397 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fa:34:70:7b:0c:c3:bd:bd:3d:c2:f0:ab:04:e1:70:14:8e:61:3c:3b] modulus: 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 public exponent: 10001 ] 2021-05-28 01:42:06.678  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-28 01:42:06.679 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-28 01:42:06.680 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-28 01:42:06.680 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-28 01:42:06.680  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-28 01:42:06.681  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-28 01:42:06.681  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-28 01:42:06.681  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-28 01:42:06.681  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-28 01:42:06.686  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-28 01:42:06.686  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 01:42:06.686  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 01:42:06.687  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-28 01:42:06.788  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-28 01:42:06.789  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-28 01:42:06.790 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-28 01:42:06.792 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-28 01:42:06.793  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1089 2021-05-28 01:42:06.793  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-28 01:42:06.795  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-28 01:42:06.795  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-28 01:42:06.795  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-28 01:42:06.795  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-28 01:42:06.796 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 01:42:06.796 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 01:42:06.796 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 01:42:06.801 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 01:42:06.801 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 01:42:06.801 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 01:42:06.802 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-28 01:42:06.805 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 187184206351421476390261190492235198478949669861 IssuerDN: UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 27 23:44:31 UTC 2021 Final Date: Tue May 27 23:44:31 UTC 2031 SubjectDN: UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [34:65:17:d9:4c:93:16:1c:58:fa:55:4b:e6:2f:1c:f5:0e:32:eb:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 393794b8fdd92fbd1ca7373d2bee0ffe57217bc3 bb3cbe5dc74a3c238b9de32af0248be66f27f705 f04d5f0e4e49f9ae0a875dea91e6516a9e1982fc b9e335fee8cd39575ed2847a9dc1bde6c5bb7378 323ffec4051eb3e9e6e75692b485f8e08c7180b5 a305f2d21572105f609afcc4af592943b5681c42 4beca84f7c8e5456652f2eec3ddb5f283d846268 58fa98ce9b6c1b1d16cbecde6184984ef9c82f48 00183e0d310d219807447db13897fb0606ddb065 29bb80ed54a076b354ae55d78445489662afe8eb fa42edee76176da680b6f4d4c52c2caea593b5cd ed23b7b41487ded45041784ec1908ba78918511b 1a6b275702c00b49928084f2a1768b1028c5d4a1 cfdb5a17ebe797b17dc1c87b20e6e83829d2d08c f06e77bb3c0147c4e5fbc40066598aa08060106c 1aa93de62f8aa69f0b2c1d9c1c89f7e3a4d2edf4 cb58c8ae55aeb3c39566cf0ae290bfefecce53cc 52fbe2c36a8af18827b38e31c014a4e84c0db647 5f60ec8029bb9c04e6d8347b9685a9ebf3ad2b9b 243d1397 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c5:b4:47:5d:7d:a7:59:a1:3d:ee:55:4d:70:c8:2f:a9:4f:8e:ef:c8] modulus: adf1f6dd1918a15f6043745cf06fb347e3dd8c9d763e01295f8e26245bd9dbbb5fac2454ff9f251a9144110e583e71d20369e5263dbcc7a404f9fdc95940bb2cfc8b0d7c3b80923242de53fc4c727eb45c009c876e0cbe572af994c7d43b88bc101e190aafb844bd93025e2fd294d5f43ac0b4313e79263a8dc4abeeb39b48ff2c1dab9d1b444d707c6d1f4654fd85ba63cfbaa9bae26281fa60b7aee19596630e52d173f85d0638cb59eac4ddf68334540e6a5f1f2137fa79555be78d57543d9cfe8ef72ba24af42ab08cc10bcac8a602bdef4207dd0a24920347b282d2a8437902a5a5252fb8b7b352c16e165fd97c1a5b6cf4fdd821b3df3f3908812005a9 public exponent: 10001 ] 2021-05-28 01:43:56.133  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-28 01:43:56.134 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-28 01:43:56.136 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-28 01:43:56.136 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-28 01:43:56.136  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-28 01:43:56.137  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-28 01:43:56.137  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-28 01:43:56.137  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-28 01:43:56.137  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-28 01:43:56.141  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-28 01:43:56.142  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 01:43:56.142  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 01:43:56.142  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-28 01:43:56.245  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-28 01:43:56.245  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-28 01:43:56.246 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-28 01:43:56.248 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-28 01:43:56.249  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1089 2021-05-28 01:43:56.249  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-28 01:43:56.251  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-28 01:43:56.252  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-28 01:43:56.252  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-28 01:43:56.253  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-28 01:43:56.253 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 01:43:56.253 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 01:43:56.254 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 01:43:56.254 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 01:43:56.255 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 01:43:56.255 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 01:43:56.256 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-28 01:43:56.258 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 187184206351421476390261190492235198478949669861 IssuerDN: UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 27 23:44:31 UTC 2021 Final Date: Tue May 27 23:44:31 UTC 2031 SubjectDN: UID=c-0dfd71b6d16d8b88c,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [34:65:17:d9:4c:93:16:1c:58:fa:55:4b:e6:2f:1c:f5:0e:32:eb:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 393794b8fdd92fbd1ca7373d2bee0ffe57217bc3 bb3cbe5dc74a3c238b9de32af0248be66f27f705 f04d5f0e4e49f9ae0a875dea91e6516a9e1982fc b9e335fee8cd39575ed2847a9dc1bde6c5bb7378 323ffec4051eb3e9e6e75692b485f8e08c7180b5 a305f2d21572105f609afcc4af592943b5681c42 4beca84f7c8e5456652f2eec3ddb5f283d846268 58fa98ce9b6c1b1d16cbecde6184984ef9c82f48 00183e0d310d219807447db13897fb0606ddb065 29bb80ed54a076b354ae55d78445489662afe8eb fa42edee76176da680b6f4d4c52c2caea593b5cd ed23b7b41487ded45041784ec1908ba78918511b 1a6b275702c00b49928084f2a1768b1028c5d4a1 cfdb5a17ebe797b17dc1c87b20e6e83829d2d08c f06e77bb3c0147c4e5fbc40066598aa08060106c 1aa93de62f8aa69f0b2c1d9c1c89f7e3a4d2edf4 cb58c8ae55aeb3c39566cf0ae290bfefecce53cc 52fbe2c36a8af18827b38e31c014a4e84c0db647 5f60ec8029bb9c04e6d8347b9685a9ebf3ad2b9b 243d1397 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [23:73:52:c7:c9:bf:ee:50:ab:11:8f:ed:7e:fa:aa:80:75:52:2c:72] modulus: a114ce24184be4e3adbd126e1f890bfee860f04820886fffaa61251e506ebbcf51121e45300ebdba35832cd55156fe06d4e03235ea1cee2455c6c7a4686a02d57ab0e707985e78b26f1ace556abe298f13afb0b94aea4d79ea0e675fdb88cb64bb86e44e06ca9e65610885e1cef89b64781205c92d6e451fcc4c7137e93d9b31c99a8c6aa391330ee60788e95814ae4e732073fa7e9ffca685fb03c3d474bb4e5c8552261cfb3d0c52b2a6b69a9ef766f642c9526ef2491d8d2f25d46d57ede31e81749b3f2670d3d37ec779647fa0db2fc2fb987d57566fc004c2eb334055d1281109e42adac29fdcdbc74505b61ba4a05c65ba410748c93005215c1f5caf85 public exponent: 10001 ]