Results

By type

          2021-06-03 00:43:28,045 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-06-03 00:43:32,341 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-06-03 00:43:35.644  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-06-03 00:43:49.138 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-06-03 00:43:50.525  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-06-03 00:43:51.226  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-06-03 00:44:04.938  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 39.896 seconds (JVM running for 47.781)
2021-06-03 00:44:55.839  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-03 00:44:55.936 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-03 00:44:56.054 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-06-03 00:44:56.058 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-03 00:44:56.133  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-06-03 00:44:56.221  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-03 00:44:56.229  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-03 00:44:56.230  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-03 00:44:56.231  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-03 00:44:56.321  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-03 00:44:56.326  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-03 00:44:56.523  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-03 00:44:56.529  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-03 00:44:56.530  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-03 00:44:56.625  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-03 00:44:58.456  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-03 00:44:58.461  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-03 00:44:58.462 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-03 00:44:58.469 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-03 00:44:58.471  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1941
2021-06-03 00:44:58.472  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-03 00:44:58.524  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-03 00:44:58.525  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-03 00:44:58.535  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-03 00:44:58.537  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-03 00:44:58.538 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-03 00:44:58.539 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-03 00:44:58.540 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-03 00:44:58.634 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-03 00:44:58.635 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-03 00:44:58.636 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-03 00:44:58.650 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-03 00:44:58.837 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 602187995087585418255310952809792680847102354940
             IssuerDN: UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 03 00:37:12 UTC 2021
           Final Date: Tue Jun 03 00:37:12 UTC 2031
            SubjectDN: UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [dd:d9:a4:2c:fe:f6:8a:92:77:46:e3:28:f1:9b:f4:3f:b0:20:e3:cb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6f9d0424bbd5aacc99410615ee7d7736f511fc5b
                       412b447b87ecd0b6997e6c170181718ee875889e
                       733cf34f486015d4083ae849d8820f99dd511cfc
                       e3791eb29a34db78960aa11949aa8949b1d56d4b
                       9ee61ec0f08fd1a28cfe0b20da90bec37d088b1e
                       93c21a291f1e877ae5364771af92d08fd2edee80
                       de15aaf7a198263dcb511e3def31ace940e62716
                       05fda2b152b6619a55eff36da3eace5893506d26
                       be1504660cdf3754af43f35bb4aa424675eb6259
                       bdd325b7b629e2bacbe552e9013e8659ed93fcb7
                       4b2d4341c56ffcc68ed6cfa6a649cefa257dc2da
                       edc51abefe8f4d9832e527ec76ff401bd5734321
                       d557b234eacab5cd0f74e4cb611b6c6215a40046
                       ca1b4b6923cfdb46e2040ec98bc760854da477dd
                       3181b9c02181a3b18e05039ab3eaaf6fddbfdb40
                       1ab234864ac605729ebf18a05a3f958c71878da4
                       f5140476c3c41551367781980bb59055ab98b27d
                       949f0215647e4b4441b2d56e2fd03daca70736d5
                       6132305941c40d645ee76ecbcbfcdf5c40d03d76
                       cf0cb806
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [66:ed:ac:0b:e2:a9:37:7b:7f:6e:1d:ce:d6:ea:fa:9c:b2:8c:ed:6e]
            modulus: 9cad45747dfb698803ee877d253c7cd839db5b1a5f9aa1657760cac5a3412eabc7496048ebda0a24b015899ced2b70d7eae0b2d92c3f4dc07faef592e31761f3b83ffd64aca633631b554bd438c9313a8caba489a35f0a261b4833069cce79f8f239349e65f1ee735a0570813032f24cf49a0550bc8fd83fff779be552142e8011aa03d02ec983a7f14ab85424f0fbf95c4b2798743b0b7dd17796bef481da6110a6abadb67af57406a07b5f219ade40082959842dea2dcbfaa51570a3d032bc00a4672deb055971ed38619373741ea532d7e515deef3848d51151957a0cc806ab581016e796cfa0b9862cb9c73fc4137268e30c832fe8721a7413681225782b
    public exponent: 10001

] 
2021-06-03 02:07:52.434  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-03 02:07:52.435 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-03 02:07:52.437 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-03 02:07:52.438 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-03 02:07:52.438  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-03 02:07:52.439  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-03 02:07:52.440  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-03 02:07:52.440  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-03 02:07:52.441  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-03 02:07:52.528  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-03 02:07:52.529  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-03 02:07:52.534  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-03 02:07:52.622  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-03 02:07:52.746  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-03 02:07:52.747  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-03 02:07:52.747 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-03 02:07:52.751 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-03 02:07:52.752  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1941
2021-06-03 02:07:52.752  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-03 02:07:52.823  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-03 02:07:52.824  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-03 02:07:52.825  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-03 02:07:52.825  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-03 02:07:52.826 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-03 02:07:52.826 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-03 02:07:52.827 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-03 02:07:52.827 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-03 02:07:52.828 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-03 02:07:52.828 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-03 02:07:52.829 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-03 02:07:52.834 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 602187995087585418255310952809792680847102354940
             IssuerDN: UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 03 00:37:12 UTC 2021
           Final Date: Tue Jun 03 00:37:12 UTC 2031
            SubjectDN: UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [dd:d9:a4:2c:fe:f6:8a:92:77:46:e3:28:f1:9b:f4:3f:b0:20:e3:cb]
            modulus: c9555e5af1d1e530788f0d5a40e0674c06707b6353d695c6acbb769c50c748999db95ef1a5aea243b8116b0fa6f41cd77f75a16fcdada454f9780443d01635c89e132da8f8fff640a207b8e269b091eb2bd9d439eadd99a84bcb5904eed28fca1753c39e85690b8d934cbc0df91d1c2743d7e9669f4630f3d54834e6d09d0cf2c46a2495975393c0fa380b469c8c2f3f4cb14c797fd3dbde5545caf83f5ab99ae7cc9353068248a38c863d227f09107d18e115e8142a6b27e54a64fcca72077e8c9f9a13edae89968a06cecf0c0c825778e13072dd7b3f9a18602581bed20f074a4ec9cef07df8c6baf4eb83434e10ffc3ce3d1307cc600022050ce288c94284ad8e3433777006308795b318dd907a98592f74d46cb1eaac7a74c1a9e3032e232e08f642d5f4318331db37dc0aff81b324fa3768c0ecc7c58f4e1194a532bd60e4b1e6c7203c255f46d9e09a2fa5cc2cfd9e2daeaa7aab88ba02b9af54facb308a295dd9ecd0c1fd4578bc1bbb524b97aae4342fa3292340d0c3c1d30c3fbbf3
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6f9d0424bbd5aacc99410615ee7d7736f511fc5b
                       412b447b87ecd0b6997e6c170181718ee875889e
                       733cf34f486015d4083ae849d8820f99dd511cfc
                       e3791eb29a34db78960aa11949aa8949b1d56d4b
                       9ee61ec0f08fd1a28cfe0b20da90bec37d088b1e
                       93c21a291f1e877ae5364771af92d08fd2edee80
                       de15aaf7a198263dcb511e3def31ace940e62716
                       05fda2b152b6619a55eff36da3eace5893506d26
                       be1504660cdf3754af43f35bb4aa424675eb6259
                       bdd325b7b629e2bacbe552e9013e8659ed93fcb7
                       4b2d4341c56ffcc68ed6cfa6a649cefa257dc2da
                       edc51abefe8f4d9832e527ec76ff401bd5734321
                       d557b234eacab5cd0f74e4cb611b6c6215a40046
                       ca1b4b6923cfdb46e2040ec98bc760854da477dd
                       3181b9c02181a3b18e05039ab3eaaf6fddbfdb40
                       1ab234864ac605729ebf18a05a3f958c71878da4
                       f5140476c3c41551367781980bb59055ab98b27d
                       949f0215647e4b4441b2d56e2fd03daca70736d5
                       6132305941c40d645ee76ecbcbfcdf5c40d03d76
                       cf0cb806
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8c:fc:ab:1d:4f:0f:9f:f7:ea:84:65:46:9b:b3:45:e3:35:c1:80:f1]
            modulus: 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
    public exponent: 10001

] 
2021-06-03 02:08:54.996  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-03 02:08:54.997 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-03 02:08:54.998 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-06-03 02:08:54.999 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-03 02:08:55.000  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-06-03 02:08:55.001  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-03 02:08:55.001  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-03 02:08:55.002  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-03 02:08:55.007  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-03 02:08:55.024  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-03 02:08:55.025  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-03 02:08:55.026  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-03 02:08:55.028  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-03 02:08:55.221  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-03 02:08:55.221  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-03 02:08:55.222 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-03 02:08:55.225 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-03 02:08:55.225  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1941
2021-06-03 02:08:55.226  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-03 02:08:55.228  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-03 02:08:55.229  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-03 02:08:55.230  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-03 02:08:55.230  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-03 02:08:55.231 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-03 02:08:55.231 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-03 02:08:55.232 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-03 02:08:55.233 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-03 02:08:55.233 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-03 02:08:55.233 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-03 02:08:55.235 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-03 02:08:55.238 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 602187995087585418255310952809792680847102354940
             IssuerDN: UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 03 00:37:12 UTC 2021
           Final Date: Tue Jun 03 00:37:12 UTC 2031
            SubjectDN: UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [dd:d9:a4:2c:fe:f6:8a:92:77:46:e3:28:f1:9b:f4:3f:b0:20:e3:cb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6f9d0424bbd5aacc99410615ee7d7736f511fc5b
                       412b447b87ecd0b6997e6c170181718ee875889e
                       733cf34f486015d4083ae849d8820f99dd511cfc
                       e3791eb29a34db78960aa11949aa8949b1d56d4b
                       9ee61ec0f08fd1a28cfe0b20da90bec37d088b1e
                       93c21a291f1e877ae5364771af92d08fd2edee80
                       de15aaf7a198263dcb511e3def31ace940e62716
                       05fda2b152b6619a55eff36da3eace5893506d26
                       be1504660cdf3754af43f35bb4aa424675eb6259
                       bdd325b7b629e2bacbe552e9013e8659ed93fcb7
                       4b2d4341c56ffcc68ed6cfa6a649cefa257dc2da
                       edc51abefe8f4d9832e527ec76ff401bd5734321
                       d557b234eacab5cd0f74e4cb611b6c6215a40046
                       ca1b4b6923cfdb46e2040ec98bc760854da477dd
                       3181b9c02181a3b18e05039ab3eaaf6fddbfdb40
                       1ab234864ac605729ebf18a05a3f958c71878da4
                       f5140476c3c41551367781980bb59055ab98b27d
                       949f0215647e4b4441b2d56e2fd03daca70736d5
                       6132305941c40d645ee76ecbcbfcdf5c40d03d76
                       cf0cb806
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [65:fe:29:90:90:7e:33:4d:8e:ca:66:f9:93:a2:4f:b4:69:80:5f:4e]
            modulus: 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
    public exponent: 10001

] 
2021-06-03 02:12:53.180  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-03 02:12:53.181 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-03 02:12:53.182 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-03 02:12:53.183 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-03 02:12:53.184  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-03 02:12:53.185  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-03 02:12:53.185  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-03 02:12:53.186  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-03 02:12:53.186  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-03 02:12:53.193  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-03 02:12:53.194  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-03 02:12:53.194  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-03 02:12:53.196  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-03 02:12:53.343  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-03 02:12:53.344  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-03 02:12:53.344 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-03 02:12:53.349 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-03 02:12:53.350  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1941
2021-06-03 02:12:53.350  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-03 02:12:53.353  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-03 02:12:53.353  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-03 02:12:53.354  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-03 02:12:53.354  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-03 02:12:53.355 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-03 02:12:53.355 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-03 02:12:53.420 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-03 02:12:53.422 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-03 02:12:53.422 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-03 02:12:53.422 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-03 02:12:53.424 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-03 02:12:53.427 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 602187995087585418255310952809792680847102354940
             IssuerDN: UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 03 00:37:12 UTC 2021
           Final Date: Tue Jun 03 00:37:12 UTC 2031
            SubjectDN: UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [dd:d9:a4:2c:fe:f6:8a:92:77:46:e3:28:f1:9b:f4:3f:b0:20:e3:cb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6f9d0424bbd5aacc99410615ee7d7736f511fc5b
                       412b447b87ecd0b6997e6c170181718ee875889e
                       733cf34f486015d4083ae849d8820f99dd511cfc
                       e3791eb29a34db78960aa11949aa8949b1d56d4b
                       9ee61ec0f08fd1a28cfe0b20da90bec37d088b1e
                       93c21a291f1e877ae5364771af92d08fd2edee80
                       de15aaf7a198263dcb511e3def31ace940e62716
                       05fda2b152b6619a55eff36da3eace5893506d26
                       be1504660cdf3754af43f35bb4aa424675eb6259
                       bdd325b7b629e2bacbe552e9013e8659ed93fcb7
                       4b2d4341c56ffcc68ed6cfa6a649cefa257dc2da
                       edc51abefe8f4d9832e527ec76ff401bd5734321
                       d557b234eacab5cd0f74e4cb611b6c6215a40046
                       ca1b4b6923cfdb46e2040ec98bc760854da477dd
                       3181b9c02181a3b18e05039ab3eaaf6fddbfdb40
                       1ab234864ac605729ebf18a05a3f958c71878da4
                       f5140476c3c41551367781980bb59055ab98b27d
                       949f0215647e4b4441b2d56e2fd03daca70736d5
                       6132305941c40d645ee76ecbcbfcdf5c40d03d76
                       cf0cb806
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8b:db:22:10:cc:d7:b1:72:f8:92:90:99:08:a8:83:a6:0c:ab:17:05]
            modulus: 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
    public exponent: 10001

] 
2021-06-03 02:12:55.654  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-03 02:12:55.655 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-03 02:12:55.657 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-03 02:12:55.658 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-03 02:12:55.658  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-03 02:12:55.660  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-03 02:12:55.660  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-03 02:12:55.661  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-03 02:12:55.661  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-03 02:12:55.666  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-03 02:12:55.666  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-03 02:12:55.667  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-03 02:12:55.668  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-03 02:12:55.776  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-03 02:12:55.777  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-03 02:12:55.777 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-03 02:12:55.822 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-03 02:12:55.823  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1941
2021-06-03 02:12:55.824  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-03 02:12:55.826  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-03 02:12:55.827  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-03 02:12:55.827  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-03 02:12:55.828  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-03 02:12:55.828 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-03 02:12:55.828 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-03 02:12:55.829 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-03 02:12:55.830 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-03 02:12:55.830 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-03 02:12:55.830 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-03 02:12:55.831 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-03 02:12:55.835 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 602187995087585418255310952809792680847102354940
             IssuerDN: UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 03 00:37:12 UTC 2021
           Final Date: Tue Jun 03 00:37:12 UTC 2031
            SubjectDN: UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [dd:d9:a4:2c:fe:f6:8a:92:77:46:e3:28:f1:9b:f4:3f:b0:20:e3:cb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6f9d0424bbd5aacc99410615ee7d7736f511fc5b
                       412b447b87ecd0b6997e6c170181718ee875889e
                       733cf34f486015d4083ae849d8820f99dd511cfc
                       e3791eb29a34db78960aa11949aa8949b1d56d4b
                       9ee61ec0f08fd1a28cfe0b20da90bec37d088b1e
                       93c21a291f1e877ae5364771af92d08fd2edee80
                       de15aaf7a198263dcb511e3def31ace940e62716
                       05fda2b152b6619a55eff36da3eace5893506d26
                       be1504660cdf3754af43f35bb4aa424675eb6259
                       bdd325b7b629e2bacbe552e9013e8659ed93fcb7
                       4b2d4341c56ffcc68ed6cfa6a649cefa257dc2da
                       edc51abefe8f4d9832e527ec76ff401bd5734321
                       d557b234eacab5cd0f74e4cb611b6c6215a40046
                       ca1b4b6923cfdb46e2040ec98bc760854da477dd
                       3181b9c02181a3b18e05039ab3eaaf6fddbfdb40
                       1ab234864ac605729ebf18a05a3f958c71878da4
                       f5140476c3c41551367781980bb59055ab98b27d
                       949f0215647e4b4441b2d56e2fd03daca70736d5
                       6132305941c40d645ee76ecbcbfcdf5c40d03d76
                       cf0cb806
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6a:3b:bd:b4:2a:f9:77:05:56:29:98:2a:71:69:e2:25:ec:60:2d:c0]
            modulus: 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
    public exponent: 10001

] 
2021-06-03 02:13:47.437  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-03 02:13:47.439 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-03 02:13:47.440 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-06-03 02:13:47.441 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-03 02:13:47.441  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-06-03 02:13:47.442  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-03 02:13:47.442  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-03 02:13:47.443  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-03 02:13:47.443  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-03 02:13:47.448  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-03 02:13:47.449  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-03 02:13:47.449  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-03 02:13:47.521  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-03 02:13:47.633  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-03 02:13:47.634  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-03 02:13:47.634 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-03 02:13:47.635 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-03 02:13:47.636  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1941
2021-06-03 02:13:47.636  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-03 02:13:47.638  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-03 02:13:47.638  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-03 02:13:47.638  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-03 02:13:47.639  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-03 02:13:47.639 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-03 02:13:47.639 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-03 02:13:47.639 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-03 02:13:47.640 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-03 02:13:47.641 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-03 02:13:47.641 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-03 02:13:47.642 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-03 02:13:47.645 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 602187995087585418255310952809792680847102354940
             IssuerDN: UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 03 00:37:12 UTC 2021
           Final Date: Tue Jun 03 00:37:12 UTC 2031
            SubjectDN: UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [dd:d9:a4:2c:fe:f6:8a:92:77:46:e3:28:f1:9b:f4:3f:b0:20:e3:cb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6f9d0424bbd5aacc99410615ee7d7736f511fc5b
                       412b447b87ecd0b6997e6c170181718ee875889e
                       733cf34f486015d4083ae849d8820f99dd511cfc
                       e3791eb29a34db78960aa11949aa8949b1d56d4b
                       9ee61ec0f08fd1a28cfe0b20da90bec37d088b1e
                       93c21a291f1e877ae5364771af92d08fd2edee80
                       de15aaf7a198263dcb511e3def31ace940e62716
                       05fda2b152b6619a55eff36da3eace5893506d26
                       be1504660cdf3754af43f35bb4aa424675eb6259
                       bdd325b7b629e2bacbe552e9013e8659ed93fcb7
                       4b2d4341c56ffcc68ed6cfa6a649cefa257dc2da
                       edc51abefe8f4d9832e527ec76ff401bd5734321
                       d557b234eacab5cd0f74e4cb611b6c6215a40046
                       ca1b4b6923cfdb46e2040ec98bc760854da477dd
                       3181b9c02181a3b18e05039ab3eaaf6fddbfdb40
                       1ab234864ac605729ebf18a05a3f958c71878da4
                       f5140476c3c41551367781980bb59055ab98b27d
                       949f0215647e4b4441b2d56e2fd03daca70736d5
                       6132305941c40d645ee76ecbcbfcdf5c40d03d76
                       cf0cb806
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ed:0d:a0:d7:8d:1d:4f:54:19:20:a4:fe:6b:b2:1f:68:dd:21:2b:2a]
            modulus: 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
    public exponent: 10001

] 
2021-06-03 02:13:49.033  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-03 02:13:49.035 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-03 02:13:49.037 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-06-03 02:13:49.037 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-03 02:13:49.038  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-06-03 02:13:49.038  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-03 02:13:49.039  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-03 02:13:49.039  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-03 02:13:49.040  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-03 02:13:49.120  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-03 02:13:49.122  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-03 02:13:49.122  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-03 02:13:49.123  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-03 02:13:49.221  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-03 02:13:49.222  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-03 02:13:49.223 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-03 02:13:49.224 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-03 02:13:49.225  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1941
2021-06-03 02:13:49.226  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-03 02:13:49.227  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-03 02:13:49.228  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-03 02:13:49.228  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-03 02:13:49.228  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-03 02:13:49.229 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-03 02:13:49.229 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-03 02:13:49.229 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-03 02:13:49.230 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-03 02:13:49.231 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-03 02:13:49.231 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-03 02:13:49.232 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-03 02:13:49.234 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 602187995087585418255310952809792680847102354940
             IssuerDN: UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 03 00:37:12 UTC 2021
           Final Date: Tue Jun 03 00:37:12 UTC 2031
            SubjectDN: UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [dd:d9:a4:2c:fe:f6:8a:92:77:46:e3:28:f1:9b:f4:3f:b0:20:e3:cb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6f9d0424bbd5aacc99410615ee7d7736f511fc5b
                       412b447b87ecd0b6997e6c170181718ee875889e
                       733cf34f486015d4083ae849d8820f99dd511cfc
                       e3791eb29a34db78960aa11949aa8949b1d56d4b
                       9ee61ec0f08fd1a28cfe0b20da90bec37d088b1e
                       93c21a291f1e877ae5364771af92d08fd2edee80
                       de15aaf7a198263dcb511e3def31ace940e62716
                       05fda2b152b6619a55eff36da3eace5893506d26
                       be1504660cdf3754af43f35bb4aa424675eb6259
                       bdd325b7b629e2bacbe552e9013e8659ed93fcb7
                       4b2d4341c56ffcc68ed6cfa6a649cefa257dc2da
                       edc51abefe8f4d9832e527ec76ff401bd5734321
                       d557b234eacab5cd0f74e4cb611b6c6215a40046
                       ca1b4b6923cfdb46e2040ec98bc760854da477dd
                       3181b9c02181a3b18e05039ab3eaaf6fddbfdb40
                       1ab234864ac605729ebf18a05a3f958c71878da4
                       f5140476c3c41551367781980bb59055ab98b27d
                       949f0215647e4b4441b2d56e2fd03daca70736d5
                       6132305941c40d645ee76ecbcbfcdf5c40d03d76
                       cf0cb806
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6c:cb:73:ce:a7:39:94:60:54:65:cc:5c:e2:e6:ec:f1:6f:5d:8d:aa]
            modulus: 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
    public exponent: 10001

] 
2021-06-03 02:14:43.102  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-03 02:14:43.103 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-03 02:14:43.104 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-06-03 02:14:43.105 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-03 02:14:43.105  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-06-03 02:14:43.106  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-03 02:14:43.106  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-03 02:14:43.107  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-03 02:14:43.107  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-03 02:14:43.112  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-03 02:14:43.121  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-03 02:14:43.121  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-03 02:14:43.124  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-03 02:14:43.216  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-03 02:14:43.217  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-03 02:14:43.217 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-03 02:14:43.219 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-03 02:14:43.220  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1941
2021-06-03 02:14:43.220  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-03 02:14:43.222  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-03 02:14:43.223  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-03 02:14:43.224  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-03 02:14:43.224  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-03 02:14:43.225 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-03 02:14:43.225 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-03 02:14:43.225 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-03 02:14:43.227 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-03 02:14:43.227 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-03 02:14:43.228 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-03 02:14:43.229 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-03 02:14:43.233 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 602187995087585418255310952809792680847102354940
             IssuerDN: UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 03 00:37:12 UTC 2021
           Final Date: Tue Jun 03 00:37:12 UTC 2031
            SubjectDN: UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [dd:d9:a4:2c:fe:f6:8a:92:77:46:e3:28:f1:9b:f4:3f:b0:20:e3:cb]
            modulus: c9555e5af1d1e530788f0d5a40e0674c06707b6353d695c6acbb769c50c748999db95ef1a5aea243b8116b0fa6f41cd77f75a16fcdada454f9780443d01635c89e132da8f8fff640a207b8e269b091eb2bd9d439eadd99a84bcb5904eed28fca1753c39e85690b8d934cbc0df91d1c2743d7e9669f4630f3d54834e6d09d0cf2c46a2495975393c0fa380b469c8c2f3f4cb14c797fd3dbde5545caf83f5ab99ae7cc9353068248a38c863d227f09107d18e115e8142a6b27e54a64fcca72077e8c9f9a13edae89968a06cecf0c0c825778e13072dd7b3f9a18602581bed20f074a4ec9cef07df8c6baf4eb83434e10ffc3ce3d1307cc600022050ce288c94284ad8e3433777006308795b318dd907a98592f74d46cb1eaac7a74c1a9e3032e232e08f642d5f4318331db37dc0aff81b324fa3768c0ecc7c58f4e1194a532bd60e4b1e6c7203c255f46d9e09a2fa5cc2cfd9e2daeaa7aab88ba02b9af54facb308a295dd9ecd0c1fd4578bc1bbb524b97aae4342fa3292340d0c3c1d30c3fbbf3
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6f9d0424bbd5aacc99410615ee7d7736f511fc5b
                       412b447b87ecd0b6997e6c170181718ee875889e
                       733cf34f486015d4083ae849d8820f99dd511cfc
                       e3791eb29a34db78960aa11949aa8949b1d56d4b
                       9ee61ec0f08fd1a28cfe0b20da90bec37d088b1e
                       93c21a291f1e877ae5364771af92d08fd2edee80
                       de15aaf7a198263dcb511e3def31ace940e62716
                       05fda2b152b6619a55eff36da3eace5893506d26
                       be1504660cdf3754af43f35bb4aa424675eb6259
                       bdd325b7b629e2bacbe552e9013e8659ed93fcb7
                       4b2d4341c56ffcc68ed6cfa6a649cefa257dc2da
                       edc51abefe8f4d9832e527ec76ff401bd5734321
                       d557b234eacab5cd0f74e4cb611b6c6215a40046
                       ca1b4b6923cfdb46e2040ec98bc760854da477dd
                       3181b9c02181a3b18e05039ab3eaaf6fddbfdb40
                       1ab234864ac605729ebf18a05a3f958c71878da4
                       f5140476c3c41551367781980bb59055ab98b27d
                       949f0215647e4b4441b2d56e2fd03daca70736d5
                       6132305941c40d645ee76ecbcbfcdf5c40d03d76
                       cf0cb806
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [27:3d:a5:08:ea:e1:5b:4a:8b:d5:dc:c9:6b:2e:9e:0b:c8:aa:f6:fd]
            modulus: ab6762b5afd6185be787ea3decdd43e4510d8fac8cdc0b298477fca07c89111885aa1cabc85d7d1d790c7fa6e665c3909b1915195696bc23f57c53d98fe7ac636bc8100c87f3e8b6e0330dec2a25f9823cc10cd59eaaf778353d975df8599444020d1ddfab109a27210e0891d4b500ac4add67cd84c49dd68df094bd02c46e47aa97d9ee41eff048753bbf2106e283634cbb2575b9ee1e39653c5db97a1b013f7b833910d11c8652660883d860320c2c39f9a2bc2351f3516cd90d27f88234dba55c691a0df82f3a331a2b80c278efb5ebf9a30e2058f862b3e82b88f971eefb943f8043ea497e703d23dc991b370d11c6034a7fe30f4a58577a3f00820a1095
    public exponent: 10001

] 
2021-06-03 02:15:35.391  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-03 02:15:35.393 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-03 02:15:35.394 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-06-03 02:15:35.394 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-03 02:15:35.395  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-06-03 02:15:35.395  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-03 02:15:35.395  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-03 02:15:35.396  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-03 02:15:35.396  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-03 02:15:35.400  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-03 02:15:35.401  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-03 02:15:35.401  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-03 02:15:35.402  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-03 02:15:35.482  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-03 02:15:35.483  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-03 02:15:35.483 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-03 02:15:35.484 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-03 02:15:35.485  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1941
2021-06-03 02:15:35.485  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-03 02:15:35.487  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-03 02:15:35.488  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-03 02:15:35.488  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-03 02:15:35.489  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-03 02:15:35.489 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-03 02:15:35.489 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-03 02:15:35.490 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-03 02:15:35.490 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-03 02:15:35.491 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-03 02:15:35.491 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-03 02:15:35.492 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-03 02:15:35.496 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 602187995087585418255310952809792680847102354940
             IssuerDN: UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 03 00:37:12 UTC 2021
           Final Date: Tue Jun 03 00:37:12 UTC 2031
            SubjectDN: UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [dd:d9:a4:2c:fe:f6:8a:92:77:46:e3:28:f1:9b:f4:3f:b0:20:e3:cb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6f9d0424bbd5aacc99410615ee7d7736f511fc5b
                       412b447b87ecd0b6997e6c170181718ee875889e
                       733cf34f486015d4083ae849d8820f99dd511cfc
                       e3791eb29a34db78960aa11949aa8949b1d56d4b
                       9ee61ec0f08fd1a28cfe0b20da90bec37d088b1e
                       93c21a291f1e877ae5364771af92d08fd2edee80
                       de15aaf7a198263dcb511e3def31ace940e62716
                       05fda2b152b6619a55eff36da3eace5893506d26
                       be1504660cdf3754af43f35bb4aa424675eb6259
                       bdd325b7b629e2bacbe552e9013e8659ed93fcb7
                       4b2d4341c56ffcc68ed6cfa6a649cefa257dc2da
                       edc51abefe8f4d9832e527ec76ff401bd5734321
                       d557b234eacab5cd0f74e4cb611b6c6215a40046
                       ca1b4b6923cfdb46e2040ec98bc760854da477dd
                       3181b9c02181a3b18e05039ab3eaaf6fddbfdb40
                       1ab234864ac605729ebf18a05a3f958c71878da4
                       f5140476c3c41551367781980bb59055ab98b27d
                       949f0215647e4b4441b2d56e2fd03daca70736d5
                       6132305941c40d645ee76ecbcbfcdf5c40d03d76
                       cf0cb806
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [22:ea:51:b1:dc:f4:07:b3:04:ed:37:33:45:fc:6f:80:28:33:05:f3]
            modulus: 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
    public exponent: 10001

] 
2021-06-03 02:19:50.342  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-03 02:19:50.344 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-03 02:19:50.346 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-03 02:19:50.347 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-03 02:19:50.347  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-03 02:19:50.348  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-03 02:19:50.348  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-03 02:19:50.349  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-03 02:19:50.349  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-03 02:19:50.355  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-03 02:19:50.355  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-03 02:19:50.356  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-03 02:19:50.358  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-03 02:19:50.522  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-03 02:19:50.523  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-03 02:19:50.523 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-03 02:19:50.524 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-03 02:19:50.525  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1941
2021-06-03 02:19:50.525  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-03 02:19:50.526  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-03 02:19:50.527  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-03 02:19:50.527  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-03 02:19:50.527  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-03 02:19:50.528 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-03 02:19:50.528 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-03 02:19:50.528 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-03 02:19:50.529 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-03 02:19:50.529 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-03 02:19:50.529 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-03 02:19:50.530 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-03 02:19:50.533 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 602187995087585418255310952809792680847102354940
             IssuerDN: UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 03 00:37:12 UTC 2021
           Final Date: Tue Jun 03 00:37:12 UTC 2031
            SubjectDN: UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [dd:d9:a4:2c:fe:f6:8a:92:77:46:e3:28:f1:9b:f4:3f:b0:20:e3:cb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6f9d0424bbd5aacc99410615ee7d7736f511fc5b
                       412b447b87ecd0b6997e6c170181718ee875889e
                       733cf34f486015d4083ae849d8820f99dd511cfc
                       e3791eb29a34db78960aa11949aa8949b1d56d4b
                       9ee61ec0f08fd1a28cfe0b20da90bec37d088b1e
                       93c21a291f1e877ae5364771af92d08fd2edee80
                       de15aaf7a198263dcb511e3def31ace940e62716
                       05fda2b152b6619a55eff36da3eace5893506d26
                       be1504660cdf3754af43f35bb4aa424675eb6259
                       bdd325b7b629e2bacbe552e9013e8659ed93fcb7
                       4b2d4341c56ffcc68ed6cfa6a649cefa257dc2da
                       edc51abefe8f4d9832e527ec76ff401bd5734321
                       d557b234eacab5cd0f74e4cb611b6c6215a40046
                       ca1b4b6923cfdb46e2040ec98bc760854da477dd
                       3181b9c02181a3b18e05039ab3eaaf6fddbfdb40
                       1ab234864ac605729ebf18a05a3f958c71878da4
                       f5140476c3c41551367781980bb59055ab98b27d
                       949f0215647e4b4441b2d56e2fd03daca70736d5
                       6132305941c40d645ee76ecbcbfcdf5c40d03d76
                       cf0cb806
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6c:c5:cd:e2:ca:c4:56:66:4b:30:a8:64:b2:ba:90:1c:e5:3d:71:de]
            modulus: 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
    public exponent: 10001

] 
2021-06-03 02:22:27.082  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-03 02:22:27.084 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-03 02:22:27.085 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-03 02:22:27.085 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-03 02:22:27.086  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-03 02:22:27.086  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-03 02:22:27.086  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-03 02:22:27.087  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-03 02:22:27.087  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-03 02:22:27.092  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-03 02:22:27.092  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-03 02:22:27.092  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-03 02:22:27.094  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-03 02:22:27.221  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-03 02:22:27.222  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-03 02:22:27.222 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-03 02:22:27.223 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-03 02:22:27.224  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1941
2021-06-03 02:22:27.224  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-03 02:22:27.225  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-03 02:22:27.226  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-03 02:22:27.226  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-03 02:22:27.226  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-03 02:22:27.227 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-03 02:22:27.227 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-03 02:22:27.227 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-03 02:22:27.228 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-03 02:22:27.228 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-03 02:22:27.228 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-03 02:22:27.229 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-03 02:22:27.232 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 602187995087585418255310952809792680847102354940
             IssuerDN: UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 03 00:37:12 UTC 2021
           Final Date: Tue Jun 03 00:37:12 UTC 2031
            SubjectDN: UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [dd:d9:a4:2c:fe:f6:8a:92:77:46:e3:28:f1:9b:f4:3f:b0:20:e3:cb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6f9d0424bbd5aacc99410615ee7d7736f511fc5b
                       412b447b87ecd0b6997e6c170181718ee875889e
                       733cf34f486015d4083ae849d8820f99dd511cfc
                       e3791eb29a34db78960aa11949aa8949b1d56d4b
                       9ee61ec0f08fd1a28cfe0b20da90bec37d088b1e
                       93c21a291f1e877ae5364771af92d08fd2edee80
                       de15aaf7a198263dcb511e3def31ace940e62716
                       05fda2b152b6619a55eff36da3eace5893506d26
                       be1504660cdf3754af43f35bb4aa424675eb6259
                       bdd325b7b629e2bacbe552e9013e8659ed93fcb7
                       4b2d4341c56ffcc68ed6cfa6a649cefa257dc2da
                       edc51abefe8f4d9832e527ec76ff401bd5734321
                       d557b234eacab5cd0f74e4cb611b6c6215a40046
                       ca1b4b6923cfdb46e2040ec98bc760854da477dd
                       3181b9c02181a3b18e05039ab3eaaf6fddbfdb40
                       1ab234864ac605729ebf18a05a3f958c71878da4
                       f5140476c3c41551367781980bb59055ab98b27d
                       949f0215647e4b4441b2d56e2fd03daca70736d5
                       6132305941c40d645ee76ecbcbfcdf5c40d03d76
                       cf0cb806
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [17:f3:d2:cf:ce:05:02:5d:b0:de:81:01:44:5c:6c:8a:d0:e5:0a:c3]
            modulus: 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
    public exponent: 10001

] 
2021-06-03 02:24:19.472  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-03 02:24:19.473 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-03 02:24:19.474 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-03 02:24:19.475 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-03 02:24:19.475  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-03 02:24:19.475  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-03 02:24:19.476  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-03 02:24:19.476  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-03 02:24:19.476  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-03 02:24:19.481  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-03 02:24:19.482  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-03 02:24:19.482  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-03 02:24:19.483  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-03 02:24:19.620  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-03 02:24:19.621  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-03 02:24:19.621 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-03 02:24:19.622 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-03 02:24:19.622  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1941
2021-06-03 02:24:19.623  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-03 02:24:19.624  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-03 02:24:19.624  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-03 02:24:19.624  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-03 02:24:19.625  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-03 02:24:19.625 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-03 02:24:19.626 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-03 02:24:19.626 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-03 02:24:19.627 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-03 02:24:19.627 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-03 02:24:19.627 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-03 02:24:19.628 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-03 02:24:19.631 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 602187995087585418255310952809792680847102354940
             IssuerDN: UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 03 00:37:12 UTC 2021
           Final Date: Tue Jun 03 00:37:12 UTC 2031
            SubjectDN: UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [dd:d9:a4:2c:fe:f6:8a:92:77:46:e3:28:f1:9b:f4:3f:b0:20:e3:cb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6f9d0424bbd5aacc99410615ee7d7736f511fc5b
                       412b447b87ecd0b6997e6c170181718ee875889e
                       733cf34f486015d4083ae849d8820f99dd511cfc
                       e3791eb29a34db78960aa11949aa8949b1d56d4b
                       9ee61ec0f08fd1a28cfe0b20da90bec37d088b1e
                       93c21a291f1e877ae5364771af92d08fd2edee80
                       de15aaf7a198263dcb511e3def31ace940e62716
                       05fda2b152b6619a55eff36da3eace5893506d26
                       be1504660cdf3754af43f35bb4aa424675eb6259
                       bdd325b7b629e2bacbe552e9013e8659ed93fcb7
                       4b2d4341c56ffcc68ed6cfa6a649cefa257dc2da
                       edc51abefe8f4d9832e527ec76ff401bd5734321
                       d557b234eacab5cd0f74e4cb611b6c6215a40046
                       ca1b4b6923cfdb46e2040ec98bc760854da477dd
                       3181b9c02181a3b18e05039ab3eaaf6fddbfdb40
                       1ab234864ac605729ebf18a05a3f958c71878da4
                       f5140476c3c41551367781980bb59055ab98b27d
                       949f0215647e4b4441b2d56e2fd03daca70736d5
                       6132305941c40d645ee76ecbcbfcdf5c40d03d76
                       cf0cb806
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7f:cd:79:c1:ce:df:fb:d3:dd:1c:86:6d:be:1b:09:55:7c:ec:5c:19]
            modulus: 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
    public exponent: 10001

] 
2021-06-03 02:26:15.082  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-03 02:26:15.084 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-03 02:26:15.085 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-03 02:26:15.085 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-03 02:26:15.086  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-03 02:26:15.086  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-03 02:26:15.086  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-03 02:26:15.087  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-03 02:26:15.087  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-03 02:26:15.092  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-03 02:26:15.092  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-03 02:26:15.092  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-03 02:26:15.094  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-03 02:26:15.220  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-03 02:26:15.221  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-03 02:26:15.221 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-03 02:26:15.223 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-03 02:26:15.223  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1941
2021-06-03 02:26:15.223  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-03 02:26:15.225  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-03 02:26:15.225  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-03 02:26:15.225  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-03 02:26:15.225  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-03 02:26:15.226 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-03 02:26:15.226 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-03 02:26:15.226 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-03 02:26:15.227 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-03 02:26:15.227 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-03 02:26:15.227 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-03 02:26:15.228 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-03 02:26:15.230 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 602187995087585418255310952809792680847102354940
             IssuerDN: UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 03 00:37:12 UTC 2021
           Final Date: Tue Jun 03 00:37:12 UTC 2031
            SubjectDN: UID=c-0c8b6def97f6e76dc,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [dd:d9:a4:2c:fe:f6:8a:92:77:46:e3:28:f1:9b:f4:3f:b0:20:e3:cb]
            modulus: c9555e5af1d1e530788f0d5a40e0674c06707b6353d695c6acbb769c50c748999db95ef1a5aea243b8116b0fa6f41cd77f75a16fcdada454f9780443d01635c89e132da8f8fff640a207b8e269b091eb2bd9d439eadd99a84bcb5904eed28fca1753c39e85690b8d934cbc0df91d1c2743d7e9669f4630f3d54834e6d09d0cf2c46a2495975393c0fa380b469c8c2f3f4cb14c797fd3dbde5545caf83f5ab99ae7cc9353068248a38c863d227f09107d18e115e8142a6b27e54a64fcca72077e8c9f9a13edae89968a06cecf0c0c825778e13072dd7b3f9a18602581bed20f074a4ec9cef07df8c6baf4eb83434e10ffc3ce3d1307cc600022050ce288c94284ad8e3433777006308795b318dd907a98592f74d46cb1eaac7a74c1a9e3032e232e08f642d5f4318331db37dc0aff81b324fa3768c0ecc7c58f4e1194a532bd60e4b1e6c7203c255f46d9e09a2fa5cc2cfd9e2daeaa7aab88ba02b9af54facb308a295dd9ecd0c1fd4578bc1bbb524b97aae4342fa3292340d0c3c1d30c3fbbf3
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6f9d0424bbd5aacc99410615ee7d7736f511fc5b
                       412b447b87ecd0b6997e6c170181718ee875889e
                       733cf34f486015d4083ae849d8820f99dd511cfc
                       e3791eb29a34db78960aa11949aa8949b1d56d4b
                       9ee61ec0f08fd1a28cfe0b20da90bec37d088b1e
                       93c21a291f1e877ae5364771af92d08fd2edee80
                       de15aaf7a198263dcb511e3def31ace940e62716
                       05fda2b152b6619a55eff36da3eace5893506d26
                       be1504660cdf3754af43f35bb4aa424675eb6259
                       bdd325b7b629e2bacbe552e9013e8659ed93fcb7
                       4b2d4341c56ffcc68ed6cfa6a649cefa257dc2da
                       edc51abefe8f4d9832e527ec76ff401bd5734321
                       d557b234eacab5cd0f74e4cb611b6c6215a40046
                       ca1b4b6923cfdb46e2040ec98bc760854da477dd
                       3181b9c02181a3b18e05039ab3eaaf6fddbfdb40
                       1ab234864ac605729ebf18a05a3f958c71878da4
                       f5140476c3c41551367781980bb59055ab98b27d
                       949f0215647e4b4441b2d56e2fd03daca70736d5
                       6132305941c40d645ee76ecbcbfcdf5c40d03d76
                       cf0cb806
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [67:d2:c9:d4:ae:ee:a9:08:3f:8f:30:2f:d3:d3:5d:04:f0:9e:cb:4f]
            modulus: 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
    public exponent: 10001

]