Results

By type

          2021-07-13 00:44:29,940 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-07-13 00:44:33,344 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-07-13 00:44:36.128  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-07-13 00:44:46.644 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-07-13 00:44:47.856  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-07-13 00:44:48.542  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-07-13 00:45:00.242  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 32.385 seconds (JVM running for 38.583)
2021-07-13 00:52:54.343  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-13 00:52:54.430 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-13 00:52:54.531 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-07-13 00:52:54.536 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-13 00:52:54.627  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-07-13 00:52:54.631  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-13 00:52:54.636  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-13 00:52:54.637  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-13 00:52:54.638  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-13 00:52:54.646  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-13 00:52:54.650  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-13 00:52:54.828  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-13 00:52:54.835  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-13 00:52:54.835  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-13 00:52:54.927  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-13 00:52:56.231  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-13 00:52:56.234  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-13 00:52:56.234 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-13 00:52:56.240 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-13 00:52:56.327  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1994
2021-07-13 00:52:56.328  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-13 00:52:56.334  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-13 00:52:56.334  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-13 00:52:56.340  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-13 00:52:56.341  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-13 00:52:56.342 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-13 00:52:56.343 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-13 00:52:56.343 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-13 00:52:56.436 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-13 00:52:56.436 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-13 00:52:56.437 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-13 00:52:56.443 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-13 00:52:56.627 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 330409948310716237821971006166220034711470090059
             IssuerDN: UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jul 13 00:36:30 UTC 2021
           Final Date: Sun Jul 13 00:36:30 UTC 2031
            SubjectDN: UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f4:91:f3:0b:db:df:aa:5d:e0:af:3c:df:66:42:55:16:cd:ca:44:10]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b14d7ca7920d3a10d0a776a1e1d42a5439494703
                       5c075e901a4cca642ffc075f33ab53e156150592
                       d7124ab57fdc2c1972a39fe4e251e050a54035fb
                       474859253885b44aeb9412951628160cdb912c2e
                       0614da809e3c076f0616fcce70d23b4d4577320a
                       ad4b4b1b709e27f976188d1d282670eee34ac214
                       27901a87292040d565d37235617e5d66f7d6fcc9
                       517fd60accc5d2f229b9f75864a641a28d36793a
                       4fc23785f5245db4bce7128f474f9dbb232e2ddb
                       38a7d5b519350df216936f6ae1d0cf1748b62a65
                       0a29518cc2424379e9a3e2bc33da7c43cec5b044
                       21f46f16510603ec43d892d8cace3c627720a666
                       08e935b800d0b3de46557ac31392d70f41fc4855
                       333f7955d5c82ae2309c4ea64dbe2b67a2374f6d
                       838533e2a5bdc28231cf79ed6c4d3edfc19deb02
                       a06f412c6886df096e0ef83088f78acf209f3223
                       ee3652ccaf4a3aac57579e767507e2ad96c4fed1
                       023e746f00406d1dda9a6d0514a9d9f2a213c7f0
                       fce844bcbd390c87aec81271f64a779ad87aa162
                       06c754db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7a:6b:85:39:d0:6f:ca:2a:f6:ae:da:ec:09:29:e8:4d:ae:3b:73:6c]
            modulus: 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
    public exponent: 10001

] 
2021-07-13 02:23:37.811  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-13 02:23:37.814 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-13 02:23:37.815 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-07-13 02:23:37.817 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-13 02:23:37.818  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-07-13 02:23:37.819  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-13 02:23:37.819  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-13 02:23:37.820  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-13 02:23:37.821  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-13 02:23:37.831  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-13 02:23:37.832  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-13 02:23:37.832  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-13 02:23:37.836  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-13 02:23:38.022  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-13 02:23:38.026  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-13 02:23:38.026 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-13 02:23:38.030 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-13 02:23:38.030  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1994
2021-07-13 02:23:38.031  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-13 02:23:38.034  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-13 02:23:38.035  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-13 02:23:38.035  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-13 02:23:38.036  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-13 02:23:38.036 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-13 02:23:38.037 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-13 02:23:38.037 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-13 02:23:38.038 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-13 02:23:38.038 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-13 02:23:38.039 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-13 02:23:38.040 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-13 02:23:38.044 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 330409948310716237821971006166220034711470090059
             IssuerDN: UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jul 13 00:36:30 UTC 2021
           Final Date: Sun Jul 13 00:36:30 UTC 2031
            SubjectDN: UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f4:91:f3:0b:db:df:aa:5d:e0:af:3c:df:66:42:55:16:cd:ca:44:10]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b14d7ca7920d3a10d0a776a1e1d42a5439494703
                       5c075e901a4cca642ffc075f33ab53e156150592
                       d7124ab57fdc2c1972a39fe4e251e050a54035fb
                       474859253885b44aeb9412951628160cdb912c2e
                       0614da809e3c076f0616fcce70d23b4d4577320a
                       ad4b4b1b709e27f976188d1d282670eee34ac214
                       27901a87292040d565d37235617e5d66f7d6fcc9
                       517fd60accc5d2f229b9f75864a641a28d36793a
                       4fc23785f5245db4bce7128f474f9dbb232e2ddb
                       38a7d5b519350df216936f6ae1d0cf1748b62a65
                       0a29518cc2424379e9a3e2bc33da7c43cec5b044
                       21f46f16510603ec43d892d8cace3c627720a666
                       08e935b800d0b3de46557ac31392d70f41fc4855
                       333f7955d5c82ae2309c4ea64dbe2b67a2374f6d
                       838533e2a5bdc28231cf79ed6c4d3edfc19deb02
                       a06f412c6886df096e0ef83088f78acf209f3223
                       ee3652ccaf4a3aac57579e767507e2ad96c4fed1
                       023e746f00406d1dda9a6d0514a9d9f2a213c7f0
                       fce844bcbd390c87aec81271f64a779ad87aa162
                       06c754db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1e:31:77:c3:b5:cf:fb:98:1b:8d:e8:5f:e1:cb:b9:d8:ab:a1:cb:c0]
            modulus: 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
    public exponent: 10001

] 
2021-07-13 02:24:44.387  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-13 02:24:44.389 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-13 02:24:44.390 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-07-13 02:24:44.391 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-13 02:24:44.392  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-07-13 02:24:44.393  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-13 02:24:44.394  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-13 02:24:44.394  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-13 02:24:44.395  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-13 02:24:44.403  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-13 02:24:44.404  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-13 02:24:44.404  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-13 02:24:44.406  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-13 02:24:44.557  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-13 02:24:44.558  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-13 02:24:44.558 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-13 02:24:44.560 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-13 02:24:44.561  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1994
2021-07-13 02:24:44.562  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-13 02:24:44.564  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-13 02:24:44.564  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-13 02:24:44.565  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-13 02:24:44.565  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-13 02:24:44.566 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-13 02:24:44.566 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-13 02:24:44.566 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-13 02:24:44.567 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-13 02:24:44.567 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-13 02:24:44.568 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-13 02:24:44.569 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-13 02:24:44.571 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 330409948310716237821971006166220034711470090059
             IssuerDN: UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jul 13 00:36:30 UTC 2021
           Final Date: Sun Jul 13 00:36:30 UTC 2031
            SubjectDN: UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f4:91:f3:0b:db:df:aa:5d:e0:af:3c:df:66:42:55:16:cd:ca:44:10]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b14d7ca7920d3a10d0a776a1e1d42a5439494703
                       5c075e901a4cca642ffc075f33ab53e156150592
                       d7124ab57fdc2c1972a39fe4e251e050a54035fb
                       474859253885b44aeb9412951628160cdb912c2e
                       0614da809e3c076f0616fcce70d23b4d4577320a
                       ad4b4b1b709e27f976188d1d282670eee34ac214
                       27901a87292040d565d37235617e5d66f7d6fcc9
                       517fd60accc5d2f229b9f75864a641a28d36793a
                       4fc23785f5245db4bce7128f474f9dbb232e2ddb
                       38a7d5b519350df216936f6ae1d0cf1748b62a65
                       0a29518cc2424379e9a3e2bc33da7c43cec5b044
                       21f46f16510603ec43d892d8cace3c627720a666
                       08e935b800d0b3de46557ac31392d70f41fc4855
                       333f7955d5c82ae2309c4ea64dbe2b67a2374f6d
                       838533e2a5bdc28231cf79ed6c4d3edfc19deb02
                       a06f412c6886df096e0ef83088f78acf209f3223
                       ee3652ccaf4a3aac57579e767507e2ad96c4fed1
                       023e746f00406d1dda9a6d0514a9d9f2a213c7f0
                       fce844bcbd390c87aec81271f64a779ad87aa162
                       06c754db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6e:3e:92:ae:49:6a:18:6a:5f:17:d9:f6:42:cb:2b:f1:f1:3d:24:c5]
            modulus: 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
    public exponent: 10001

] 
2021-07-13 02:27:46.550  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-13 02:27:46.551 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-13 02:27:46.553 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-07-13 02:27:46.553 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-13 02:27:46.554  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-07-13 02:27:46.554  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-13 02:27:46.555  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-13 02:27:46.555  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-13 02:27:46.555  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-13 02:27:46.560  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-13 02:27:46.560  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-13 02:27:46.561  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-13 02:27:46.562  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-13 02:27:46.726  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-13 02:27:46.727  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-13 02:27:46.728 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-13 02:27:46.730 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-13 02:27:46.730  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1994
2021-07-13 02:27:46.731  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-13 02:27:46.733  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-13 02:27:46.734  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-13 02:27:46.734  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-13 02:27:46.735  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-13 02:27:46.735 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-13 02:27:46.736 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-13 02:27:46.736 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-13 02:27:46.737 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-13 02:27:46.737 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-13 02:27:46.738 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-13 02:27:46.739 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-13 02:27:46.743 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 330409948310716237821971006166220034711470090059
             IssuerDN: UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jul 13 00:36:30 UTC 2021
           Final Date: Sun Jul 13 00:36:30 UTC 2031
            SubjectDN: UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f4:91:f3:0b:db:df:aa:5d:e0:af:3c:df:66:42:55:16:cd:ca:44:10]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b14d7ca7920d3a10d0a776a1e1d42a5439494703
                       5c075e901a4cca642ffc075f33ab53e156150592
                       d7124ab57fdc2c1972a39fe4e251e050a54035fb
                       474859253885b44aeb9412951628160cdb912c2e
                       0614da809e3c076f0616fcce70d23b4d4577320a
                       ad4b4b1b709e27f976188d1d282670eee34ac214
                       27901a87292040d565d37235617e5d66f7d6fcc9
                       517fd60accc5d2f229b9f75864a641a28d36793a
                       4fc23785f5245db4bce7128f474f9dbb232e2ddb
                       38a7d5b519350df216936f6ae1d0cf1748b62a65
                       0a29518cc2424379e9a3e2bc33da7c43cec5b044
                       21f46f16510603ec43d892d8cace3c627720a666
                       08e935b800d0b3de46557ac31392d70f41fc4855
                       333f7955d5c82ae2309c4ea64dbe2b67a2374f6d
                       838533e2a5bdc28231cf79ed6c4d3edfc19deb02
                       a06f412c6886df096e0ef83088f78acf209f3223
                       ee3652ccaf4a3aac57579e767507e2ad96c4fed1
                       023e746f00406d1dda9a6d0514a9d9f2a213c7f0
                       fce844bcbd390c87aec81271f64a779ad87aa162
                       06c754db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [56:2f:f9:53:f6:f6:12:bb:b0:e4:28:06:ee:38:20:86:dc:9b:45:d3]
            modulus: 92df25c0168402f0b01f77c8a6658acbb8ada98393492c1add8f2b18049907ca09cd64865e31981209c64d90aa3802ae5abd7bf35ec1a69974e864358c4d73f5dab8e69aa6e4d3ffc3ced52fc302ee93aab43fe6ad24205a95ad9f2dc14412e3611862afb79c32fa824a79a20c5e61ca3979da631057ced7563e5b0c89858fbfce74ddd5ea06a0241b823af73ced56df014d178e08b89ba387366334ba69590094bf2e4e132fa5184fb614588f9187a067a8c7bf956c8656ac3bd25b910537dc5f75aa647b7d1c16adeae63e2abdb77ab4e1c680542512c9a5c5904c36b0137fe127872519adc00ca3cc54066a05ea2dcd8487a1e817d91ffdfa9c99aca5a285
    public exponent: 10001

] 
2021-07-13 02:28:52.951  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-13 02:28:52.952 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-13 02:28:52.953 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-07-13 02:28:52.954 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-13 02:28:52.954  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-07-13 02:28:52.955  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-13 02:28:52.955  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-13 02:28:52.956  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-13 02:28:52.956  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-13 02:28:52.961  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-13 02:28:52.961  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-13 02:28:52.961  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-13 02:28:52.963  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-13 02:28:53.037  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-13 02:28:53.038  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-13 02:28:53.038 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-13 02:28:53.039 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-13 02:28:53.040  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1994
2021-07-13 02:28:53.040  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-13 02:28:53.042  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-13 02:28:53.042  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-13 02:28:53.042  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-13 02:28:53.043  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-13 02:28:53.043 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-13 02:28:53.043 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-13 02:28:53.044 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-13 02:28:53.044 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-13 02:28:53.045 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-13 02:28:53.045 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-13 02:28:53.046 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-13 02:28:53.049 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 330409948310716237821971006166220034711470090059
             IssuerDN: UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jul 13 00:36:30 UTC 2021
           Final Date: Sun Jul 13 00:36:30 UTC 2031
            SubjectDN: UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f4:91:f3:0b:db:df:aa:5d:e0:af:3c:df:66:42:55:16:cd:ca:44:10]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b14d7ca7920d3a10d0a776a1e1d42a5439494703
                       5c075e901a4cca642ffc075f33ab53e156150592
                       d7124ab57fdc2c1972a39fe4e251e050a54035fb
                       474859253885b44aeb9412951628160cdb912c2e
                       0614da809e3c076f0616fcce70d23b4d4577320a
                       ad4b4b1b709e27f976188d1d282670eee34ac214
                       27901a87292040d565d37235617e5d66f7d6fcc9
                       517fd60accc5d2f229b9f75864a641a28d36793a
                       4fc23785f5245db4bce7128f474f9dbb232e2ddb
                       38a7d5b519350df216936f6ae1d0cf1748b62a65
                       0a29518cc2424379e9a3e2bc33da7c43cec5b044
                       21f46f16510603ec43d892d8cace3c627720a666
                       08e935b800d0b3de46557ac31392d70f41fc4855
                       333f7955d5c82ae2309c4ea64dbe2b67a2374f6d
                       838533e2a5bdc28231cf79ed6c4d3edfc19deb02
                       a06f412c6886df096e0ef83088f78acf209f3223
                       ee3652ccaf4a3aac57579e767507e2ad96c4fed1
                       023e746f00406d1dda9a6d0514a9d9f2a213c7f0
                       fce844bcbd390c87aec81271f64a779ad87aa162
                       06c754db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7e:14:da:df:ea:a2:9e:25:01:cd:a5:47:2d:47:e4:72:17:81:f8:01]
            modulus: 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
    public exponent: 10001

] 
2021-07-13 02:29:16.213  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-13 02:29:16.214 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-13 02:29:16.216 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-07-13 02:29:16.216 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-13 02:29:16.217  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-07-13 02:29:16.217  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-13 02:29:16.217  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-13 02:29:16.218  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-13 02:29:16.218  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-13 02:29:16.223  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-13 02:29:16.223  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-13 02:29:16.223  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-13 02:29:16.225  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-13 02:29:16.307  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-13 02:29:16.307  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-13 02:29:16.308 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-13 02:29:16.309 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-13 02:29:16.326  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1994
2021-07-13 02:29:16.327  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-13 02:29:16.328  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-13 02:29:16.328  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-13 02:29:16.329  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-13 02:29:16.329  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-13 02:29:16.329 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-13 02:29:16.330 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-13 02:29:16.330 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-13 02:29:16.330 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-13 02:29:16.331 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-13 02:29:16.331 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-13 02:29:16.331 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-13 02:29:16.334 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 330409948310716237821971006166220034711470090059
             IssuerDN: UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jul 13 00:36:30 UTC 2021
           Final Date: Sun Jul 13 00:36:30 UTC 2031
            SubjectDN: UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f4:91:f3:0b:db:df:aa:5d:e0:af:3c:df:66:42:55:16:cd:ca:44:10]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b14d7ca7920d3a10d0a776a1e1d42a5439494703
                       5c075e901a4cca642ffc075f33ab53e156150592
                       d7124ab57fdc2c1972a39fe4e251e050a54035fb
                       474859253885b44aeb9412951628160cdb912c2e
                       0614da809e3c076f0616fcce70d23b4d4577320a
                       ad4b4b1b709e27f976188d1d282670eee34ac214
                       27901a87292040d565d37235617e5d66f7d6fcc9
                       517fd60accc5d2f229b9f75864a641a28d36793a
                       4fc23785f5245db4bce7128f474f9dbb232e2ddb
                       38a7d5b519350df216936f6ae1d0cf1748b62a65
                       0a29518cc2424379e9a3e2bc33da7c43cec5b044
                       21f46f16510603ec43d892d8cace3c627720a666
                       08e935b800d0b3de46557ac31392d70f41fc4855
                       333f7955d5c82ae2309c4ea64dbe2b67a2374f6d
                       838533e2a5bdc28231cf79ed6c4d3edfc19deb02
                       a06f412c6886df096e0ef83088f78acf209f3223
                       ee3652ccaf4a3aac57579e767507e2ad96c4fed1
                       023e746f00406d1dda9a6d0514a9d9f2a213c7f0
                       fce844bcbd390c87aec81271f64a779ad87aa162
                       06c754db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b5:28:36:e4:09:8f:ca:50:42:42:f6:93:21:9f:c0:41:8c:e2:a6:b8]
            modulus: 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
    public exponent: 10001

] 
2021-07-13 02:29:40.342  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-13 02:29:40.344 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-13 02:29:40.345 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-07-13 02:29:40.346 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-13 02:29:40.347  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-07-13 02:29:40.349  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-13 02:29:40.350  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-13 02:29:40.350  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-13 02:29:40.350  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-13 02:29:40.355  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-13 02:29:40.355  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-13 02:29:40.355  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-13 02:29:40.357  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-13 02:29:40.439  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-13 02:29:40.439  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-13 02:29:40.439 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-13 02:29:40.444 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-13 02:29:40.445  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1994
2021-07-13 02:29:40.445  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-13 02:29:40.446  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-13 02:29:40.447  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-13 02:29:40.447  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-13 02:29:40.447  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-13 02:29:40.448 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-13 02:29:40.448 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-13 02:29:40.448 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-13 02:29:40.449 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-13 02:29:40.450 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-13 02:29:40.450 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-13 02:29:40.450 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-13 02:29:40.453 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 330409948310716237821971006166220034711470090059
             IssuerDN: UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jul 13 00:36:30 UTC 2021
           Final Date: Sun Jul 13 00:36:30 UTC 2031
            SubjectDN: UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f4:91:f3:0b:db:df:aa:5d:e0:af:3c:df:66:42:55:16:cd:ca:44:10]
            modulus: d21a2980b49068f3c41f4abf9531e6caa4ee4b19b16fa76de877b01d37d663fe81259513c542a24fa74f6e1d16f87b5318314f3134a5df1ab2380ea8cf9c591454f7964fbc46eb9c2cc53027ec0b758746d2a8304c7e89781b526f058a24ee45c10c924ba260595dbcf47e4da35ba9e0d1f96b3cfa9bce7f422fb589cd7655d35d1207d7296416d23789aa56bdbfb0f4224d7b2a8a21cef5b1f8b76143626e7ecb84932e15575a04e303f3c550667262547c9f11ef338f3a9e750dfcb9701645344ad6222f070ad575816667d4240b7e9a760716c3810b27f242b8d6b3c6a33e9e83d39b98f9705321e637eff2dc480020481545cacf2252955f6cad24000fda1b8a286d96243c00e10299b878c58bb2a97e1079b992f6d46f4a58d518aeac1dc5ad6ad0c8f5ac69e6883cf709930378b1a8fc1a6be9c6dc20397b6a240524307ab28a34eb83f20063f3a9ba0c57d750955e6c69a94655defdb43a27517e55896e6cf9ba59a91e6d6f483db377e606735b9ed27214520d835dac7cbf03cc463f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b14d7ca7920d3a10d0a776a1e1d42a5439494703
                       5c075e901a4cca642ffc075f33ab53e156150592
                       d7124ab57fdc2c1972a39fe4e251e050a54035fb
                       474859253885b44aeb9412951628160cdb912c2e
                       0614da809e3c076f0616fcce70d23b4d4577320a
                       ad4b4b1b709e27f976188d1d282670eee34ac214
                       27901a87292040d565d37235617e5d66f7d6fcc9
                       517fd60accc5d2f229b9f75864a641a28d36793a
                       4fc23785f5245db4bce7128f474f9dbb232e2ddb
                       38a7d5b519350df216936f6ae1d0cf1748b62a65
                       0a29518cc2424379e9a3e2bc33da7c43cec5b044
                       21f46f16510603ec43d892d8cace3c627720a666
                       08e935b800d0b3de46557ac31392d70f41fc4855
                       333f7955d5c82ae2309c4ea64dbe2b67a2374f6d
                       838533e2a5bdc28231cf79ed6c4d3edfc19deb02
                       a06f412c6886df096e0ef83088f78acf209f3223
                       ee3652ccaf4a3aac57579e767507e2ad96c4fed1
                       023e746f00406d1dda9a6d0514a9d9f2a213c7f0
                       fce844bcbd390c87aec81271f64a779ad87aa162
                       06c754db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [64:70:eb:2b:a9:f2:99:e2:51:c8:da:77:56:e7:e5:35:a8:a8:39:32]
            modulus: bae02ae2cf327fb061dbe5423c5537df9399419618d0dff3c3275615839f43df4e3c78ab37fcf7b6c5f3ce8b0fe8af025e372af70432e80bafa67595b9d8bc112f98867ea92b59659837dd1c6f304188753bd83f5944fca086110b16e102921f58f0013c7b5e258f67e692d0fffcb9092cfbef801f13396570eee5f37f72b012ac55f840c34fd92e2a294340bb085db0ecb81787a0674a3151ffb59dbb5f4a3725dcb30f2bafa1a0836e7f06a95ccda0bb95860e3d052efc394be78f71dfcb4a0607d7b01ab4859adf0d56a975169d4885c184bf2511ef8f613485d70ecae60e84203bb91f64753336abe2db03047cc776bd7ef874ecd09ef54b363ebfeebddd
    public exponent: 10001

] 
2021-07-13 02:29:52.348  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-13 02:29:52.349 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-13 02:29:52.350 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-07-13 02:29:52.351 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-13 02:29:52.351  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-07-13 02:29:52.352  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-13 02:29:52.352  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-13 02:29:52.352  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-13 02:29:52.353  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-13 02:29:52.427  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-13 02:29:52.428  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-13 02:29:52.428  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-13 02:29:52.430  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-13 02:29:52.491  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-13 02:29:52.491  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-13 02:29:52.492 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-13 02:29:52.526 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-13 02:29:52.527  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1994
2021-07-13 02:29:52.527  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-13 02:29:52.529  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-13 02:29:52.530  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-13 02:29:52.530  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-13 02:29:52.531  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-13 02:29:52.531 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-13 02:29:52.531 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-13 02:29:52.532 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-13 02:29:52.532 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-13 02:29:52.532 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-13 02:29:52.533 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-13 02:29:52.533 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-13 02:29:52.536 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 330409948310716237821971006166220034711470090059
             IssuerDN: UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jul 13 00:36:30 UTC 2021
           Final Date: Sun Jul 13 00:36:30 UTC 2031
            SubjectDN: UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f4:91:f3:0b:db:df:aa:5d:e0:af:3c:df:66:42:55:16:cd:ca:44:10]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b14d7ca7920d3a10d0a776a1e1d42a5439494703
                       5c075e901a4cca642ffc075f33ab53e156150592
                       d7124ab57fdc2c1972a39fe4e251e050a54035fb
                       474859253885b44aeb9412951628160cdb912c2e
                       0614da809e3c076f0616fcce70d23b4d4577320a
                       ad4b4b1b709e27f976188d1d282670eee34ac214
                       27901a87292040d565d37235617e5d66f7d6fcc9
                       517fd60accc5d2f229b9f75864a641a28d36793a
                       4fc23785f5245db4bce7128f474f9dbb232e2ddb
                       38a7d5b519350df216936f6ae1d0cf1748b62a65
                       0a29518cc2424379e9a3e2bc33da7c43cec5b044
                       21f46f16510603ec43d892d8cace3c627720a666
                       08e935b800d0b3de46557ac31392d70f41fc4855
                       333f7955d5c82ae2309c4ea64dbe2b67a2374f6d
                       838533e2a5bdc28231cf79ed6c4d3edfc19deb02
                       a06f412c6886df096e0ef83088f78acf209f3223
                       ee3652ccaf4a3aac57579e767507e2ad96c4fed1
                       023e746f00406d1dda9a6d0514a9d9f2a213c7f0
                       fce844bcbd390c87aec81271f64a779ad87aa162
                       06c754db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3f:1a:e0:30:af:42:78:47:c1:a4:64:40:de:9a:99:17:21:75:8e:e3]
            modulus: a9dc4c97027291f860252404b65caea39e8b72109ae39b893bf13b9b875996167cd20160133b1d931313757f8ede5fd594cd9ae9fae6e2052fcc4062738a5869ed061d15143b356515722c8bec6c0019ddb749f9413f4dd434c5d3479a3af4d63207e7868e1ef31f639e27d76a403b2a6e903f6b5501a909b7cdec8897138adde86e726fb5f2be655df8561ece1e861b3c6d00581702d1846928bc5691a8059f36de85defc419b78a0121c35e2aac93ec3369ad1ba7c7a0d7263ca3c875741323b1dad38732a76eac34392bd43054c21531e5122eca4268ed2187b1fab395c57024174109f7f2b2d7c9fc9e0b809fbebed11974ad6968bfa1d2e16fc521110bd
    public exponent: 10001

] 
2021-07-13 02:32:16.610  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-13 02:32:16.611 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-13 02:32:16.612 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-07-13 02:32:16.612 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-13 02:32:16.612  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-07-13 02:32:16.613  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-13 02:32:16.613  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-13 02:32:16.613  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-13 02:32:16.614  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-13 02:32:16.618  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-13 02:32:16.618  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-13 02:32:16.618  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-13 02:32:16.620  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-13 02:32:16.724  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-13 02:32:16.724  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-13 02:32:16.725 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-13 02:32:16.726 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-13 02:32:16.726  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1994
2021-07-13 02:32:16.726  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-13 02:32:16.728  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-13 02:32:16.728  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-13 02:32:16.728  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-13 02:32:16.729  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-13 02:32:16.729 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-13 02:32:16.729 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-13 02:32:16.729 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-13 02:32:16.730 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-13 02:32:16.730 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-13 02:32:16.730 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-13 02:32:16.731 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-13 02:32:16.734 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 330409948310716237821971006166220034711470090059
             IssuerDN: UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jul 13 00:36:30 UTC 2021
           Final Date: Sun Jul 13 00:36:30 UTC 2031
            SubjectDN: UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f4:91:f3:0b:db:df:aa:5d:e0:af:3c:df:66:42:55:16:cd:ca:44:10]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b14d7ca7920d3a10d0a776a1e1d42a5439494703
                       5c075e901a4cca642ffc075f33ab53e156150592
                       d7124ab57fdc2c1972a39fe4e251e050a54035fb
                       474859253885b44aeb9412951628160cdb912c2e
                       0614da809e3c076f0616fcce70d23b4d4577320a
                       ad4b4b1b709e27f976188d1d282670eee34ac214
                       27901a87292040d565d37235617e5d66f7d6fcc9
                       517fd60accc5d2f229b9f75864a641a28d36793a
                       4fc23785f5245db4bce7128f474f9dbb232e2ddb
                       38a7d5b519350df216936f6ae1d0cf1748b62a65
                       0a29518cc2424379e9a3e2bc33da7c43cec5b044
                       21f46f16510603ec43d892d8cace3c627720a666
                       08e935b800d0b3de46557ac31392d70f41fc4855
                       333f7955d5c82ae2309c4ea64dbe2b67a2374f6d
                       838533e2a5bdc28231cf79ed6c4d3edfc19deb02
                       a06f412c6886df096e0ef83088f78acf209f3223
                       ee3652ccaf4a3aac57579e767507e2ad96c4fed1
                       023e746f00406d1dda9a6d0514a9d9f2a213c7f0
                       fce844bcbd390c87aec81271f64a779ad87aa162
                       06c754db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a5:a8:d4:33:f3:58:d0:fd:82:fa:88:73:7f:0e:6f:26:46:a4:b1:f1]
            modulus: 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
    public exponent: 10001

] 
2021-07-13 02:33:48.306  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-13 02:33:48.307 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-13 02:33:48.308 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-07-13 02:33:48.309 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-13 02:33:48.309  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-07-13 02:33:48.310  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-13 02:33:48.310  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-13 02:33:48.310  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-13 02:33:48.310  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-13 02:33:48.314  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-13 02:33:48.315  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-13 02:33:48.315  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-13 02:33:48.316  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-13 02:33:48.409  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-13 02:33:48.409  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-13 02:33:48.410 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-13 02:33:48.411 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-13 02:33:48.411  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1994
2021-07-13 02:33:48.411  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-13 02:33:48.413  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-13 02:33:48.413  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-13 02:33:48.413  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-13 02:33:48.413  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-13 02:33:48.414 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-13 02:33:48.414 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-13 02:33:48.414 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-13 02:33:48.414 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-13 02:33:48.415 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-13 02:33:48.415 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-13 02:33:48.415 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-13 02:33:48.427 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 330409948310716237821971006166220034711470090059
             IssuerDN: UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jul 13 00:36:30 UTC 2021
           Final Date: Sun Jul 13 00:36:30 UTC 2031
            SubjectDN: UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f4:91:f3:0b:db:df:aa:5d:e0:af:3c:df:66:42:55:16:cd:ca:44:10]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b14d7ca7920d3a10d0a776a1e1d42a5439494703
                       5c075e901a4cca642ffc075f33ab53e156150592
                       d7124ab57fdc2c1972a39fe4e251e050a54035fb
                       474859253885b44aeb9412951628160cdb912c2e
                       0614da809e3c076f0616fcce70d23b4d4577320a
                       ad4b4b1b709e27f976188d1d282670eee34ac214
                       27901a87292040d565d37235617e5d66f7d6fcc9
                       517fd60accc5d2f229b9f75864a641a28d36793a
                       4fc23785f5245db4bce7128f474f9dbb232e2ddb
                       38a7d5b519350df216936f6ae1d0cf1748b62a65
                       0a29518cc2424379e9a3e2bc33da7c43cec5b044
                       21f46f16510603ec43d892d8cace3c627720a666
                       08e935b800d0b3de46557ac31392d70f41fc4855
                       333f7955d5c82ae2309c4ea64dbe2b67a2374f6d
                       838533e2a5bdc28231cf79ed6c4d3edfc19deb02
                       a06f412c6886df096e0ef83088f78acf209f3223
                       ee3652ccaf4a3aac57579e767507e2ad96c4fed1
                       023e746f00406d1dda9a6d0514a9d9f2a213c7f0
                       fce844bcbd390c87aec81271f64a779ad87aa162
                       06c754db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2b:27:12:da:4e:14:fe:69:ca:b5:ee:86:bd:47:da:e3:29:67:8e:7d]
            modulus: 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
    public exponent: 10001

] 
2021-07-13 02:36:50.943  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-13 02:36:50.944 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-13 02:36:50.946 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-07-13 02:36:50.946 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-13 02:36:50.947  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-07-13 02:36:50.947  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-13 02:36:50.948  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-13 02:36:50.948  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-13 02:36:50.949  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-13 02:36:50.954  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-13 02:36:50.955  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-13 02:36:50.955  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-13 02:36:50.957  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-13 02:36:51.063  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-13 02:36:51.063  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-13 02:36:51.064 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-13 02:36:51.065 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-13 02:36:51.065  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1994
2021-07-13 02:36:51.065  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-13 02:36:51.067  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-13 02:36:51.067  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-13 02:36:51.067  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-13 02:36:51.068  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-13 02:36:51.068 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-13 02:36:51.068 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-13 02:36:51.069 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-13 02:36:51.069 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-13 02:36:51.070 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-13 02:36:51.070 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-13 02:36:51.071 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-13 02:36:51.073 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 330409948310716237821971006166220034711470090059
             IssuerDN: UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jul 13 00:36:30 UTC 2021
           Final Date: Sun Jul 13 00:36:30 UTC 2031
            SubjectDN: UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f4:91:f3:0b:db:df:aa:5d:e0:af:3c:df:66:42:55:16:cd:ca:44:10]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b14d7ca7920d3a10d0a776a1e1d42a5439494703
                       5c075e901a4cca642ffc075f33ab53e156150592
                       d7124ab57fdc2c1972a39fe4e251e050a54035fb
                       474859253885b44aeb9412951628160cdb912c2e
                       0614da809e3c076f0616fcce70d23b4d4577320a
                       ad4b4b1b709e27f976188d1d282670eee34ac214
                       27901a87292040d565d37235617e5d66f7d6fcc9
                       517fd60accc5d2f229b9f75864a641a28d36793a
                       4fc23785f5245db4bce7128f474f9dbb232e2ddb
                       38a7d5b519350df216936f6ae1d0cf1748b62a65
                       0a29518cc2424379e9a3e2bc33da7c43cec5b044
                       21f46f16510603ec43d892d8cace3c627720a666
                       08e935b800d0b3de46557ac31392d70f41fc4855
                       333f7955d5c82ae2309c4ea64dbe2b67a2374f6d
                       838533e2a5bdc28231cf79ed6c4d3edfc19deb02
                       a06f412c6886df096e0ef83088f78acf209f3223
                       ee3652ccaf4a3aac57579e767507e2ad96c4fed1
                       023e746f00406d1dda9a6d0514a9d9f2a213c7f0
                       fce844bcbd390c87aec81271f64a779ad87aa162
                       06c754db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [eb:2b:c2:72:ec:9b:e6:fd:94:80:bf:63:a7:0a:47:b2:4a:3f:04:64]
            modulus: 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
    public exponent: 10001

] 
2021-07-13 02:38:46.582  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-13 02:38:46.582 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-13 02:38:46.583 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-07-13 02:38:46.584 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-13 02:38:46.584  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-07-13 02:38:46.584  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-13 02:38:46.584  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-13 02:38:46.585  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-13 02:38:46.585  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-13 02:38:46.589  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-13 02:38:46.589  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-13 02:38:46.589  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-13 02:38:46.591  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-13 02:38:46.678  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-13 02:38:46.679  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-13 02:38:46.679 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-13 02:38:46.680 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-13 02:38:46.680  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1994
2021-07-13 02:38:46.681  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-13 02:38:46.682  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-13 02:38:46.682  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-13 02:38:46.682  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-13 02:38:46.683  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-13 02:38:46.683 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-13 02:38:46.683 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-13 02:38:46.683 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-13 02:38:46.684 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-13 02:38:46.684 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-13 02:38:46.684 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-13 02:38:46.685 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-13 02:38:46.688 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 330409948310716237821971006166220034711470090059
             IssuerDN: UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jul 13 00:36:30 UTC 2021
           Final Date: Sun Jul 13 00:36:30 UTC 2031
            SubjectDN: UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f4:91:f3:0b:db:df:aa:5d:e0:af:3c:df:66:42:55:16:cd:ca:44:10]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b14d7ca7920d3a10d0a776a1e1d42a5439494703
                       5c075e901a4cca642ffc075f33ab53e156150592
                       d7124ab57fdc2c1972a39fe4e251e050a54035fb
                       474859253885b44aeb9412951628160cdb912c2e
                       0614da809e3c076f0616fcce70d23b4d4577320a
                       ad4b4b1b709e27f976188d1d282670eee34ac214
                       27901a87292040d565d37235617e5d66f7d6fcc9
                       517fd60accc5d2f229b9f75864a641a28d36793a
                       4fc23785f5245db4bce7128f474f9dbb232e2ddb
                       38a7d5b519350df216936f6ae1d0cf1748b62a65
                       0a29518cc2424379e9a3e2bc33da7c43cec5b044
                       21f46f16510603ec43d892d8cace3c627720a666
                       08e935b800d0b3de46557ac31392d70f41fc4855
                       333f7955d5c82ae2309c4ea64dbe2b67a2374f6d
                       838533e2a5bdc28231cf79ed6c4d3edfc19deb02
                       a06f412c6886df096e0ef83088f78acf209f3223
                       ee3652ccaf4a3aac57579e767507e2ad96c4fed1
                       023e746f00406d1dda9a6d0514a9d9f2a213c7f0
                       fce844bcbd390c87aec81271f64a779ad87aa162
                       06c754db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8d:67:1d:6a:89:60:42:4d:a0:85:bc:40:2a:8c:fc:8b:45:71:75:d4]
            modulus: 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
    public exponent: 10001

] 
2021-07-13 02:40:20.550  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-13 02:40:20.551 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-13 02:40:20.552 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-07-13 02:40:20.553 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-13 02:40:20.553  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-07-13 02:40:20.554  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-13 02:40:20.554  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-13 02:40:20.555  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-13 02:40:20.555  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-13 02:40:20.559  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-13 02:40:20.559  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-13 02:40:20.559  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-13 02:40:20.561  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-13 02:40:20.649  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-13 02:40:20.650  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-13 02:40:20.650 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-13 02:40:20.651 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-13 02:40:20.652  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1994
2021-07-13 02:40:20.652  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-13 02:40:20.653  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-13 02:40:20.653  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-13 02:40:20.654  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-13 02:40:20.654  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-13 02:40:20.654 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-13 02:40:20.654 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-13 02:40:20.655 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-13 02:40:20.655 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-13 02:40:20.655 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-13 02:40:20.656 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-13 02:40:20.656 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-13 02:40:20.658 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 330409948310716237821971006166220034711470090059
             IssuerDN: UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jul 13 00:36:30 UTC 2021
           Final Date: Sun Jul 13 00:36:30 UTC 2031
            SubjectDN: UID=c-0dafb4e7502e8430e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f4:91:f3:0b:db:df:aa:5d:e0:af:3c:df:66:42:55:16:cd:ca:44:10]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b14d7ca7920d3a10d0a776a1e1d42a5439494703
                       5c075e901a4cca642ffc075f33ab53e156150592
                       d7124ab57fdc2c1972a39fe4e251e050a54035fb
                       474859253885b44aeb9412951628160cdb912c2e
                       0614da809e3c076f0616fcce70d23b4d4577320a
                       ad4b4b1b709e27f976188d1d282670eee34ac214
                       27901a87292040d565d37235617e5d66f7d6fcc9
                       517fd60accc5d2f229b9f75864a641a28d36793a
                       4fc23785f5245db4bce7128f474f9dbb232e2ddb
                       38a7d5b519350df216936f6ae1d0cf1748b62a65
                       0a29518cc2424379e9a3e2bc33da7c43cec5b044
                       21f46f16510603ec43d892d8cace3c627720a666
                       08e935b800d0b3de46557ac31392d70f41fc4855
                       333f7955d5c82ae2309c4ea64dbe2b67a2374f6d
                       838533e2a5bdc28231cf79ed6c4d3edfc19deb02
                       a06f412c6886df096e0ef83088f78acf209f3223
                       ee3652ccaf4a3aac57579e767507e2ad96c4fed1
                       023e746f00406d1dda9a6d0514a9d9f2a213c7f0
                       fce844bcbd390c87aec81271f64a779ad87aa162
                       06c754db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e9:88:7f:d9:e9:f7:35:bb:0f:ed:40:3c:3b:2e:c5:a5:d3:3a:6c:30]
            modulus: 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
    public exponent: 10001

]