Results

By type

          2021-04-20 04:08:35,249 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-04-20 04:08:39,053 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-04-20 04:08:41.861  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-04-20 04:08:53.948 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-04-20 04:08:55.056  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-04-20 04:08:55.747  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-04-20 04:09:09.845  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 36.895 seconds (JVM running for 44.295)
2021-04-20 04:22:17.651  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-20 04:22:17.752 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-20 04:22:17.855 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-04-20 04:22:17.860 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-20 04:22:17.952  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-04-20 04:22:17.956  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-20 04:22:18.042  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-20 04:22:18.043  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-20 04:22:18.043  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-20 04:22:18.051  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-20 04:22:18.054  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-20 04:22:18.250  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-20 04:22:18.258  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-20 04:22:18.259  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-20 04:22:18.358  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-20 04:22:19.859  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-20 04:22:19.944  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-20 04:22:19.944 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-20 04:22:19.950 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-20 04:22:20.040  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1391
2021-04-20 04:22:20.041  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-20 04:22:20.045  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-20 04:22:20.046  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-20 04:22:20.142  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-20 04:22:20.143  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-20 04:22:20.144 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-20 04:22:20.145 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-20 04:22:20.145 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-20 04:22:20.246 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-20 04:22:20.247 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-20 04:22:20.247 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-20 04:22:20.340 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-20 04:22:20.561 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 419276238002776225645994587108372327853506165783
             IssuerDN: UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Apr 20 04:04:15 UTC 2021
           Final Date: Sun Apr 20 04:04:15 UTC 2031
            SubjectDN: UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b2:c7:29:90:03:9f:c9:a3:09:16:e2:29:38:38:3b:e5:bd:2f:d2:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 13ec094a43efd00dd2b3c899e3568f4409d149ab
                       e4511120ddf60fbe4ad20aace910f320ffde95fc
                       2c731e40667c6e7272a4e5b29e182c0e52ebfbc4
                       a633d5e40c4b660ef27707e96c2768f07e35dbdd
                       31c1da4a7ae1918a0c625a3858689a2c648944de
                       fc42c175610fe39be27fb84e16b1a812ff04ddb0
                       3f7f03b6c47f360c59c54934f7423d23a0a866fb
                       96fb6a3867084a604c1f208baa34bc72876da7c0
                       4efd3176e9e0d115899ee1e20134fd22556e432b
                       7408ede586d31fb2076954fc6143d6252230f2c8
                       fd2c9465769d3d41bb361961ce7d2ecc7b97ad35
                       a2cc82ceeee012efe33bf6bd574fc282e7beb665
                       a381ecf96207a9f23936c881f3e9fbc30180c2b9
                       282feaeddcf8bf6e539fb6d966b01bd3f1134cac
                       dd2752f30b726e4667ff263c2843559fe1c4cacf
                       6c33c66cf3fb8739def617e588e5acf466b2d321
                       4d4bd74349f77ed52ff413dce69da9ae494642cd
                       fa7121e0623d831e96fcbfa100e2463c530a507d
                       bb70ca36e2f7b02c4ecf19e573c65202e4a83c10
                       1d2b94a1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2a:9e:92:87:50:2f:31:41:d2:28:ff:3b:93:a9:0e:41:bf:e6:39:f6]
            modulus: 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
    public exponent: 10001

] 
2021-04-20 05:46:06.066  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-20 05:46:06.072 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-20 05:46:06.074 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-20 05:46:06.078 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-20 05:46:06.079  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-20 05:46:06.079  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-20 05:46:06.140  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-20 05:46:06.141  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-20 05:46:06.142  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-20 05:46:06.155  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-20 05:46:06.156  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-20 05:46:06.157  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-20 05:46:06.162  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-20 05:46:06.408  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-20 05:46:06.409  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-20 05:46:06.410 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-20 05:46:06.413 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-20 05:46:06.414  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1391
2021-04-20 05:46:06.415  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-20 05:46:06.417  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-20 05:46:06.421  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-20 05:46:06.422  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-20 05:46:06.422  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-20 05:46:06.423 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-20 05:46:06.423 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-20 05:46:06.423 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-20 05:46:06.441 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-20 05:46:06.442 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-20 05:46:06.442 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-20 05:46:06.444 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-20 05:46:06.449 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 419276238002776225645994587108372327853506165783
             IssuerDN: UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Apr 20 04:04:15 UTC 2021
           Final Date: Sun Apr 20 04:04:15 UTC 2031
            SubjectDN: UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b2:c7:29:90:03:9f:c9:a3:09:16:e2:29:38:38:3b:e5:bd:2f:d2:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 13ec094a43efd00dd2b3c899e3568f4409d149ab
                       e4511120ddf60fbe4ad20aace910f320ffde95fc
                       2c731e40667c6e7272a4e5b29e182c0e52ebfbc4
                       a633d5e40c4b660ef27707e96c2768f07e35dbdd
                       31c1da4a7ae1918a0c625a3858689a2c648944de
                       fc42c175610fe39be27fb84e16b1a812ff04ddb0
                       3f7f03b6c47f360c59c54934f7423d23a0a866fb
                       96fb6a3867084a604c1f208baa34bc72876da7c0
                       4efd3176e9e0d115899ee1e20134fd22556e432b
                       7408ede586d31fb2076954fc6143d6252230f2c8
                       fd2c9465769d3d41bb361961ce7d2ecc7b97ad35
                       a2cc82ceeee012efe33bf6bd574fc282e7beb665
                       a381ecf96207a9f23936c881f3e9fbc30180c2b9
                       282feaeddcf8bf6e539fb6d966b01bd3f1134cac
                       dd2752f30b726e4667ff263c2843559fe1c4cacf
                       6c33c66cf3fb8739def617e588e5acf466b2d321
                       4d4bd74349f77ed52ff413dce69da9ae494642cd
                       fa7121e0623d831e96fcbfa100e2463c530a507d
                       bb70ca36e2f7b02c4ecf19e573c65202e4a83c10
                       1d2b94a1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f4:e1:3b:78:e8:26:e9:c9:70:91:d6:12:82:f7:90:07:d9:e9:17:b3]
            modulus: 8d010cf6d26dbb1faf2314cd47079b508e99d39e6fbc23fa3f6b2d7eae0ebb80fef4f4cda669ced2240a2d5b004e29467206eaaa7f496ecdac03b3c0522c2d94467391bf1cdbdddfb06df1a7a2757ef8b74fd68a1aeb541149ec2a93f339b20275dad66ea8eead127b0f242056b16efcf1374d57f5bebca4e38571c2a8bcd755d60fa9e1602d8bf237de355672d2d3482882835cab703ba25e209f4af61e039da155a282c1d845663136790940089a0fe4561926604db97bac34100ef170b88b58993f0bcf3f89a6456d978fa8402d6f8c957258dc356d9d9c09ecf1f1f32c997d50df1286dcb5a8864f0767164a37a9a6683a8abf1ec7ffb44e9b40ba58a527
    public exponent: 10001

] 
2021-04-20 05:47:32.610  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-20 05:47:32.612 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-20 05:47:32.613 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-04-20 05:47:32.614 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-20 05:47:32.614  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-04-20 05:47:32.615  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-20 05:47:32.615  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-20 05:47:32.615  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-20 05:47:32.616  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-20 05:47:32.620  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-20 05:47:32.621  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-20 05:47:32.622  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-20 05:47:32.623  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-20 05:47:32.723  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-20 05:47:32.740  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-20 05:47:32.741 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-20 05:47:32.744 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-20 05:47:32.745  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1391
2021-04-20 05:47:32.745  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-20 05:47:32.746  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-20 05:47:32.747  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-20 05:47:32.748  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-20 05:47:32.748  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-20 05:47:32.749 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-20 05:47:32.749 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-20 05:47:32.750 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-20 05:47:32.750 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-20 05:47:32.751 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-20 05:47:32.751 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-20 05:47:32.752 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-20 05:47:32.756 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 419276238002776225645994587108372327853506165783
             IssuerDN: UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Apr 20 04:04:15 UTC 2021
           Final Date: Sun Apr 20 04:04:15 UTC 2031
            SubjectDN: UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b2:c7:29:90:03:9f:c9:a3:09:16:e2:29:38:38:3b:e5:bd:2f:d2:44]
            modulus: b837679a678658c5e0e8a703caa60e7358bde0080c1464eac33f2c9f04fdd9f89b370d6945dbe39a348099f88149b69219a0d1d4f015149d02ea742a3c7e6bb16807635b7b78773ce0a383bad27f37b4ab86dff97b1908c741f22e7b472ef25b43327ea5ad57b45ea3966adfa6efd753e1a0959608859bc93a75a0bfe90972cfd29cabfb4c6aa4d18d1d5561d8e7b7acf3f73240e6491960038c1c20eb72f17c3b1978f949422bb67f0c40f3cf60b19a0ef0e0967ea6f498e0ee97785404d55b313871f8b29b3f519ce243f5d338cc6809821f2ab86c48c50952df581e83f16b4aef94f925514a189f05a038b6879ecde8a8054dd9fa1fecab5e13028830f418d4ae080e4bfc2717d2d920976a32e4f44e79140569157987d74da23a0b3a477b27ee76226a686b8595c2f70a41e7adce2f33c58b0e23c75c625dbeb7102e682ce6544c4102ea0d665862af27fd906109c50ecebcb5a55deeebabd31667a7e86691687c47078273a488b3c0487a36a55e6711ad1d84d42cd2b04c98f04768e933
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 13ec094a43efd00dd2b3c899e3568f4409d149ab
                       e4511120ddf60fbe4ad20aace910f320ffde95fc
                       2c731e40667c6e7272a4e5b29e182c0e52ebfbc4
                       a633d5e40c4b660ef27707e96c2768f07e35dbdd
                       31c1da4a7ae1918a0c625a3858689a2c648944de
                       fc42c175610fe39be27fb84e16b1a812ff04ddb0
                       3f7f03b6c47f360c59c54934f7423d23a0a866fb
                       96fb6a3867084a604c1f208baa34bc72876da7c0
                       4efd3176e9e0d115899ee1e20134fd22556e432b
                       7408ede586d31fb2076954fc6143d6252230f2c8
                       fd2c9465769d3d41bb361961ce7d2ecc7b97ad35
                       a2cc82ceeee012efe33bf6bd574fc282e7beb665
                       a381ecf96207a9f23936c881f3e9fbc30180c2b9
                       282feaeddcf8bf6e539fb6d966b01bd3f1134cac
                       dd2752f30b726e4667ff263c2843559fe1c4cacf
                       6c33c66cf3fb8739def617e588e5acf466b2d321
                       4d4bd74349f77ed52ff413dce69da9ae494642cd
                       fa7121e0623d831e96fcbfa100e2463c530a507d
                       bb70ca36e2f7b02c4ecf19e573c65202e4a83c10
                       1d2b94a1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4a:ef:2f:31:c9:31:33:27:6c:70:e1:01:92:8d:78:51:60:a0:3d:77]
            modulus: 9d0eed12a686c1533307c40a9877b77b33b8d08e449827e1b2dc1fe105ca72aaf7a1356d7fed2a9ad0e19af30c7038abd6bcd6a6c44ecc1909e1ccbba7612818b9ec7de8a57db54717749e209a1be8d36ea8896aa649044bab14cdca537c363b4b82ac11d8bba891fdb68e4476e8fc6d4e0225274b4c51878aec9952b780314474eb13613d0adc6b38f24f615a95a31ef53f490d067763c6704c8e250fcef54cb463aeb062f4531f20c5dc625dc2a7036da2032e6805f00d1df71dba38f4fcc1dea42faba8ec0cd358789dedf88e5ca3fe28afc5103f3b6aae0f7baa005309e06f28ea5822d2b182080fa95e81559624736f5005a9a95f9f065e9a1d1bc3e6b7
    public exponent: 10001

] 
2021-04-20 05:50:32.325  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-20 05:50:32.327 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-20 05:50:32.328 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-04-20 05:50:32.329 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-20 05:50:32.329  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-04-20 05:50:32.330  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-20 05:50:32.330  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-20 05:50:32.330  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-20 05:50:32.331  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-20 05:50:32.335  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-20 05:50:32.336  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-20 05:50:32.336  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-20 05:50:32.338  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-20 05:50:32.442  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-20 05:50:32.443  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-20 05:50:32.443 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-20 05:50:32.446 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-20 05:50:32.447  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1391
2021-04-20 05:50:32.447  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-20 05:50:32.449  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-20 05:50:32.450  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-20 05:50:32.451  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-20 05:50:32.451  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-20 05:50:32.452 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-20 05:50:32.452 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-20 05:50:32.453 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-20 05:50:32.454 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-20 05:50:32.454 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-20 05:50:32.455 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-20 05:50:32.456 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-20 05:50:32.461 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 419276238002776225645994587108372327853506165783
             IssuerDN: UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Apr 20 04:04:15 UTC 2021
           Final Date: Sun Apr 20 04:04:15 UTC 2031
            SubjectDN: UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b2:c7:29:90:03:9f:c9:a3:09:16:e2:29:38:38:3b:e5:bd:2f:d2:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 13ec094a43efd00dd2b3c899e3568f4409d149ab
                       e4511120ddf60fbe4ad20aace910f320ffde95fc
                       2c731e40667c6e7272a4e5b29e182c0e52ebfbc4
                       a633d5e40c4b660ef27707e96c2768f07e35dbdd
                       31c1da4a7ae1918a0c625a3858689a2c648944de
                       fc42c175610fe39be27fb84e16b1a812ff04ddb0
                       3f7f03b6c47f360c59c54934f7423d23a0a866fb
                       96fb6a3867084a604c1f208baa34bc72876da7c0
                       4efd3176e9e0d115899ee1e20134fd22556e432b
                       7408ede586d31fb2076954fc6143d6252230f2c8
                       fd2c9465769d3d41bb361961ce7d2ecc7b97ad35
                       a2cc82ceeee012efe33bf6bd574fc282e7beb665
                       a381ecf96207a9f23936c881f3e9fbc30180c2b9
                       282feaeddcf8bf6e539fb6d966b01bd3f1134cac
                       dd2752f30b726e4667ff263c2843559fe1c4cacf
                       6c33c66cf3fb8739def617e588e5acf466b2d321
                       4d4bd74349f77ed52ff413dce69da9ae494642cd
                       fa7121e0623d831e96fcbfa100e2463c530a507d
                       bb70ca36e2f7b02c4ecf19e573c65202e4a83c10
                       1d2b94a1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [78:f6:ce:e5:45:be:af:51:a3:5c:e2:22:6a:d3:dd:49:f3:d1:0d:c3]
            modulus: 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
    public exponent: 10001

] 
2021-04-20 05:50:54.747  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-20 05:50:54.748 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-20 05:50:54.749 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-04-20 05:50:54.750 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-20 05:50:54.750  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-04-20 05:50:54.751  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-20 05:50:54.751  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-20 05:50:54.751  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-20 05:50:54.752  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-20 05:50:54.756  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-20 05:50:54.756  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-20 05:50:54.757  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-20 05:50:54.758  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-20 05:50:54.838  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-20 05:50:54.839  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-20 05:50:54.840 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-20 05:50:54.841 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-20 05:50:54.841  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1391
2021-04-20 05:50:54.842  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-20 05:50:54.843  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-20 05:50:54.844  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-20 05:50:54.844  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-20 05:50:54.844  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-20 05:50:54.845 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-20 05:50:54.845 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-20 05:50:54.845 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-20 05:50:54.846 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-20 05:50:54.847 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-20 05:50:54.847 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-20 05:50:54.848 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-20 05:50:54.851 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 419276238002776225645994587108372327853506165783
             IssuerDN: UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Apr 20 04:04:15 UTC 2021
           Final Date: Sun Apr 20 04:04:15 UTC 2031
            SubjectDN: UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b2:c7:29:90:03:9f:c9:a3:09:16:e2:29:38:38:3b:e5:bd:2f:d2:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 13ec094a43efd00dd2b3c899e3568f4409d149ab
                       e4511120ddf60fbe4ad20aace910f320ffde95fc
                       2c731e40667c6e7272a4e5b29e182c0e52ebfbc4
                       a633d5e40c4b660ef27707e96c2768f07e35dbdd
                       31c1da4a7ae1918a0c625a3858689a2c648944de
                       fc42c175610fe39be27fb84e16b1a812ff04ddb0
                       3f7f03b6c47f360c59c54934f7423d23a0a866fb
                       96fb6a3867084a604c1f208baa34bc72876da7c0
                       4efd3176e9e0d115899ee1e20134fd22556e432b
                       7408ede586d31fb2076954fc6143d6252230f2c8
                       fd2c9465769d3d41bb361961ce7d2ecc7b97ad35
                       a2cc82ceeee012efe33bf6bd574fc282e7beb665
                       a381ecf96207a9f23936c881f3e9fbc30180c2b9
                       282feaeddcf8bf6e539fb6d966b01bd3f1134cac
                       dd2752f30b726e4667ff263c2843559fe1c4cacf
                       6c33c66cf3fb8739def617e588e5acf466b2d321
                       4d4bd74349f77ed52ff413dce69da9ae494642cd
                       fa7121e0623d831e96fcbfa100e2463c530a507d
                       bb70ca36e2f7b02c4ecf19e573c65202e4a83c10
                       1d2b94a1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [25:66:9b:32:2d:a1:c8:0c:c8:3a:99:e8:f1:9a:1b:03:4b:d9:c5:f0]
            modulus: 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
    public exponent: 10001

] 
2021-04-20 05:51:29.609  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-20 05:51:29.610 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-20 05:51:29.611 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-04-20 05:51:29.612 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-20 05:51:29.612  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-04-20 05:51:29.613  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-20 05:51:29.613  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-20 05:51:29.614  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-20 05:51:29.614  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-20 05:51:29.619  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-20 05:51:29.620  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-20 05:51:29.620  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-20 05:51:29.622  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-20 05:51:29.723  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-20 05:51:29.723  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-20 05:51:29.740 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-20 05:51:29.742 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-20 05:51:29.743  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1391
2021-04-20 05:51:29.745  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-20 05:51:29.746  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-20 05:51:29.747  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-20 05:51:29.747  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-20 05:51:29.747  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-20 05:51:29.748 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-20 05:51:29.748 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-20 05:51:29.748 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-20 05:51:29.749 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-20 05:51:29.750 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-20 05:51:29.750 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-20 05:51:29.751 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-20 05:51:29.754 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 419276238002776225645994587108372327853506165783
             IssuerDN: UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Apr 20 04:04:15 UTC 2021
           Final Date: Sun Apr 20 04:04:15 UTC 2031
            SubjectDN: UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b2:c7:29:90:03:9f:c9:a3:09:16:e2:29:38:38:3b:e5:bd:2f:d2:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 13ec094a43efd00dd2b3c899e3568f4409d149ab
                       e4511120ddf60fbe4ad20aace910f320ffde95fc
                       2c731e40667c6e7272a4e5b29e182c0e52ebfbc4
                       a633d5e40c4b660ef27707e96c2768f07e35dbdd
                       31c1da4a7ae1918a0c625a3858689a2c648944de
                       fc42c175610fe39be27fb84e16b1a812ff04ddb0
                       3f7f03b6c47f360c59c54934f7423d23a0a866fb
                       96fb6a3867084a604c1f208baa34bc72876da7c0
                       4efd3176e9e0d115899ee1e20134fd22556e432b
                       7408ede586d31fb2076954fc6143d6252230f2c8
                       fd2c9465769d3d41bb361961ce7d2ecc7b97ad35
                       a2cc82ceeee012efe33bf6bd574fc282e7beb665
                       a381ecf96207a9f23936c881f3e9fbc30180c2b9
                       282feaeddcf8bf6e539fb6d966b01bd3f1134cac
                       dd2752f30b726e4667ff263c2843559fe1c4cacf
                       6c33c66cf3fb8739def617e588e5acf466b2d321
                       4d4bd74349f77ed52ff413dce69da9ae494642cd
                       fa7121e0623d831e96fcbfa100e2463c530a507d
                       bb70ca36e2f7b02c4ecf19e573c65202e4a83c10
                       1d2b94a1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [be:f4:3f:87:e4:96:d1:14:47:c2:a2:43:8a:72:99:59:41:0d:c9:8b]
            modulus: 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
    public exponent: 10001

] 
2021-04-20 05:51:51.089  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-20 05:51:51.090 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-20 05:51:51.092 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-04-20 05:51:51.092 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-20 05:51:51.093  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-04-20 05:51:51.094  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-20 05:51:51.094  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-20 05:51:51.095  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-20 05:51:51.095  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-20 05:51:51.103  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-20 05:51:51.104  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-20 05:51:51.105  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-20 05:51:51.106  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-20 05:51:51.230  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-20 05:51:51.231  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-20 05:51:51.231 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-20 05:51:51.241 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-20 05:51:51.242  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1391
2021-04-20 05:51:51.242  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-20 05:51:51.243  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-20 05:51:51.244  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-20 05:51:51.244  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-20 05:51:51.244  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-20 05:51:51.245 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-20 05:51:51.245 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-20 05:51:51.245 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-20 05:51:51.246 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-20 05:51:51.247 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-20 05:51:51.247 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-20 05:51:51.248 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-20 05:51:51.250 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 419276238002776225645994587108372327853506165783
             IssuerDN: UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Apr 20 04:04:15 UTC 2021
           Final Date: Sun Apr 20 04:04:15 UTC 2031
            SubjectDN: UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b2:c7:29:90:03:9f:c9:a3:09:16:e2:29:38:38:3b:e5:bd:2f:d2:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 13ec094a43efd00dd2b3c899e3568f4409d149ab
                       e4511120ddf60fbe4ad20aace910f320ffde95fc
                       2c731e40667c6e7272a4e5b29e182c0e52ebfbc4
                       a633d5e40c4b660ef27707e96c2768f07e35dbdd
                       31c1da4a7ae1918a0c625a3858689a2c648944de
                       fc42c175610fe39be27fb84e16b1a812ff04ddb0
                       3f7f03b6c47f360c59c54934f7423d23a0a866fb
                       96fb6a3867084a604c1f208baa34bc72876da7c0
                       4efd3176e9e0d115899ee1e20134fd22556e432b
                       7408ede586d31fb2076954fc6143d6252230f2c8
                       fd2c9465769d3d41bb361961ce7d2ecc7b97ad35
                       a2cc82ceeee012efe33bf6bd574fc282e7beb665
                       a381ecf96207a9f23936c881f3e9fbc30180c2b9
                       282feaeddcf8bf6e539fb6d966b01bd3f1134cac
                       dd2752f30b726e4667ff263c2843559fe1c4cacf
                       6c33c66cf3fb8739def617e588e5acf466b2d321
                       4d4bd74349f77ed52ff413dce69da9ae494642cd
                       fa7121e0623d831e96fcbfa100e2463c530a507d
                       bb70ca36e2f7b02c4ecf19e573c65202e4a83c10
                       1d2b94a1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b9:99:72:70:fb:44:e2:8a:18:bd:94:7a:34:70:36:27:ff:b4:76:a6]
            modulus: 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
    public exponent: 10001

] 
2021-04-20 05:52:38.355  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-20 05:52:38.357 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-20 05:52:38.358 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-04-20 05:52:38.359 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-20 05:52:38.359  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-04-20 05:52:38.360  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-20 05:52:38.361  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-20 05:52:38.361  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-20 05:52:38.362  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-20 05:52:38.369  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-20 05:52:38.370  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-20 05:52:38.370  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-20 05:52:38.372  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-20 05:52:38.552  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-20 05:52:38.553  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-20 05:52:38.553 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-20 05:52:38.555 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-20 05:52:38.556  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1391
2021-04-20 05:52:38.556  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-20 05:52:38.559  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-20 05:52:38.560  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-20 05:52:38.560  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-20 05:52:38.561  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-20 05:52:38.561 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-20 05:52:38.561 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-20 05:52:38.562 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-20 05:52:38.563 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-20 05:52:38.563 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-20 05:52:38.563 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-20 05:52:38.641 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-20 05:52:38.646 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 419276238002776225645994587108372327853506165783
             IssuerDN: UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Apr 20 04:04:15 UTC 2021
           Final Date: Sun Apr 20 04:04:15 UTC 2031
            SubjectDN: UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b2:c7:29:90:03:9f:c9:a3:09:16:e2:29:38:38:3b:e5:bd:2f:d2:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 13ec094a43efd00dd2b3c899e3568f4409d149ab
                       e4511120ddf60fbe4ad20aace910f320ffde95fc
                       2c731e40667c6e7272a4e5b29e182c0e52ebfbc4
                       a633d5e40c4b660ef27707e96c2768f07e35dbdd
                       31c1da4a7ae1918a0c625a3858689a2c648944de
                       fc42c175610fe39be27fb84e16b1a812ff04ddb0
                       3f7f03b6c47f360c59c54934f7423d23a0a866fb
                       96fb6a3867084a604c1f208baa34bc72876da7c0
                       4efd3176e9e0d115899ee1e20134fd22556e432b
                       7408ede586d31fb2076954fc6143d6252230f2c8
                       fd2c9465769d3d41bb361961ce7d2ecc7b97ad35
                       a2cc82ceeee012efe33bf6bd574fc282e7beb665
                       a381ecf96207a9f23936c881f3e9fbc30180c2b9
                       282feaeddcf8bf6e539fb6d966b01bd3f1134cac
                       dd2752f30b726e4667ff263c2843559fe1c4cacf
                       6c33c66cf3fb8739def617e588e5acf466b2d321
                       4d4bd74349f77ed52ff413dce69da9ae494642cd
                       fa7121e0623d831e96fcbfa100e2463c530a507d
                       bb70ca36e2f7b02c4ecf19e573c65202e4a83c10
                       1d2b94a1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [89:ba:97:7b:9e:31:f3:02:46:7e:c1:b3:46:f5:6e:c1:62:3c:26:b8]
            modulus: 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
    public exponent: 10001

] 
2021-04-20 05:53:50.445  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-20 05:53:50.446 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-20 05:53:50.447 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-04-20 05:53:50.448 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-20 05:53:50.448  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-04-20 05:53:50.448  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-20 05:53:50.449  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-20 05:53:50.449  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-20 05:53:50.449  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-20 05:53:50.454  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-20 05:53:50.454  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-20 05:53:50.454  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-20 05:53:50.456  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-20 05:53:50.566  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-20 05:53:50.567  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-20 05:53:50.568 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-20 05:53:50.570 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-20 05:53:50.570  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1391
2021-04-20 05:53:50.571  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-20 05:53:50.572  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-20 05:53:50.573  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-20 05:53:50.573  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-20 05:53:50.574  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-20 05:53:50.574 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-20 05:53:50.575 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-20 05:53:50.575 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-20 05:53:50.576 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-20 05:53:50.576 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-20 05:53:50.576 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-20 05:53:50.577 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-20 05:53:50.641 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 419276238002776225645994587108372327853506165783
             IssuerDN: UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Apr 20 04:04:15 UTC 2021
           Final Date: Sun Apr 20 04:04:15 UTC 2031
            SubjectDN: UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b2:c7:29:90:03:9f:c9:a3:09:16:e2:29:38:38:3b:e5:bd:2f:d2:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 13ec094a43efd00dd2b3c899e3568f4409d149ab
                       e4511120ddf60fbe4ad20aace910f320ffde95fc
                       2c731e40667c6e7272a4e5b29e182c0e52ebfbc4
                       a633d5e40c4b660ef27707e96c2768f07e35dbdd
                       31c1da4a7ae1918a0c625a3858689a2c648944de
                       fc42c175610fe39be27fb84e16b1a812ff04ddb0
                       3f7f03b6c47f360c59c54934f7423d23a0a866fb
                       96fb6a3867084a604c1f208baa34bc72876da7c0
                       4efd3176e9e0d115899ee1e20134fd22556e432b
                       7408ede586d31fb2076954fc6143d6252230f2c8
                       fd2c9465769d3d41bb361961ce7d2ecc7b97ad35
                       a2cc82ceeee012efe33bf6bd574fc282e7beb665
                       a381ecf96207a9f23936c881f3e9fbc30180c2b9
                       282feaeddcf8bf6e539fb6d966b01bd3f1134cac
                       dd2752f30b726e4667ff263c2843559fe1c4cacf
                       6c33c66cf3fb8739def617e588e5acf466b2d321
                       4d4bd74349f77ed52ff413dce69da9ae494642cd
                       fa7121e0623d831e96fcbfa100e2463c530a507d
                       bb70ca36e2f7b02c4ecf19e573c65202e4a83c10
                       1d2b94a1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [26:3e:91:a8:7c:b8:97:37:1e:75:0d:a0:56:1b:f4:89:8d:6a:9f:ca]
            modulus: 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
    public exponent: 10001

] 
2021-04-20 05:56:31.237  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-20 05:56:31.239 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-20 05:56:31.240 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-20 05:56:31.240 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-20 05:56:31.241  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-20 05:56:31.241  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-20 05:56:31.241  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-20 05:56:31.242  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-20 05:56:31.242  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-20 05:56:31.249  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-20 05:56:31.250  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-20 05:56:31.250  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-20 05:56:31.252  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-20 05:56:31.346  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-20 05:56:31.347  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-20 05:56:31.347 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-20 05:56:31.348 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-20 05:56:31.349  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1391
2021-04-20 05:56:31.349  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-20 05:56:31.350  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-20 05:56:31.350  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-20 05:56:31.350  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-20 05:56:31.351  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-20 05:56:31.351 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-20 05:56:31.351 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-20 05:56:31.351 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-20 05:56:31.352 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-20 05:56:31.352 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-20 05:56:31.352 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-20 05:56:31.353 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-20 05:56:31.355 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 419276238002776225645994587108372327853506165783
             IssuerDN: UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Apr 20 04:04:15 UTC 2021
           Final Date: Sun Apr 20 04:04:15 UTC 2031
            SubjectDN: UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b2:c7:29:90:03:9f:c9:a3:09:16:e2:29:38:38:3b:e5:bd:2f:d2:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 13ec094a43efd00dd2b3c899e3568f4409d149ab
                       e4511120ddf60fbe4ad20aace910f320ffde95fc
                       2c731e40667c6e7272a4e5b29e182c0e52ebfbc4
                       a633d5e40c4b660ef27707e96c2768f07e35dbdd
                       31c1da4a7ae1918a0c625a3858689a2c648944de
                       fc42c175610fe39be27fb84e16b1a812ff04ddb0
                       3f7f03b6c47f360c59c54934f7423d23a0a866fb
                       96fb6a3867084a604c1f208baa34bc72876da7c0
                       4efd3176e9e0d115899ee1e20134fd22556e432b
                       7408ede586d31fb2076954fc6143d6252230f2c8
                       fd2c9465769d3d41bb361961ce7d2ecc7b97ad35
                       a2cc82ceeee012efe33bf6bd574fc282e7beb665
                       a381ecf96207a9f23936c881f3e9fbc30180c2b9
                       282feaeddcf8bf6e539fb6d966b01bd3f1134cac
                       dd2752f30b726e4667ff263c2843559fe1c4cacf
                       6c33c66cf3fb8739def617e588e5acf466b2d321
                       4d4bd74349f77ed52ff413dce69da9ae494642cd
                       fa7121e0623d831e96fcbfa100e2463c530a507d
                       bb70ca36e2f7b02c4ecf19e573c65202e4a83c10
                       1d2b94a1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cf:d4:88:6e:ac:45:f8:a5:cd:af:63:eb:42:10:b8:45:56:26:d6:d5]
            modulus: 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
    public exponent: 10001

] 
2021-04-20 05:59:17.538  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-20 05:59:17.539 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-20 05:59:17.541 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-20 05:59:17.542 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-20 05:59:17.542  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-20 05:59:17.542  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-20 05:59:17.543  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-20 05:59:17.543  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-20 05:59:17.544  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-20 05:59:17.548  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-20 05:59:17.548  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-20 05:59:17.548  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-20 05:59:17.549  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-20 05:59:17.627  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-20 05:59:17.627  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-20 05:59:17.627 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-20 05:59:17.629 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-20 05:59:17.630  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1391
2021-04-20 05:59:17.630  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-20 05:59:17.631  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-20 05:59:17.632  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-20 05:59:17.632  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-20 05:59:17.633  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-20 05:59:17.633 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-20 05:59:17.634 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-20 05:59:17.634 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-20 05:59:17.634 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-20 05:59:17.635 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-20 05:59:17.635 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-20 05:59:17.636 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-20 05:59:17.638 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 419276238002776225645994587108372327853506165783
             IssuerDN: UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Apr 20 04:04:15 UTC 2021
           Final Date: Sun Apr 20 04:04:15 UTC 2031
            SubjectDN: UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b2:c7:29:90:03:9f:c9:a3:09:16:e2:29:38:38:3b:e5:bd:2f:d2:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 13ec094a43efd00dd2b3c899e3568f4409d149ab
                       e4511120ddf60fbe4ad20aace910f320ffde95fc
                       2c731e40667c6e7272a4e5b29e182c0e52ebfbc4
                       a633d5e40c4b660ef27707e96c2768f07e35dbdd
                       31c1da4a7ae1918a0c625a3858689a2c648944de
                       fc42c175610fe39be27fb84e16b1a812ff04ddb0
                       3f7f03b6c47f360c59c54934f7423d23a0a866fb
                       96fb6a3867084a604c1f208baa34bc72876da7c0
                       4efd3176e9e0d115899ee1e20134fd22556e432b
                       7408ede586d31fb2076954fc6143d6252230f2c8
                       fd2c9465769d3d41bb361961ce7d2ecc7b97ad35
                       a2cc82ceeee012efe33bf6bd574fc282e7beb665
                       a381ecf96207a9f23936c881f3e9fbc30180c2b9
                       282feaeddcf8bf6e539fb6d966b01bd3f1134cac
                       dd2752f30b726e4667ff263c2843559fe1c4cacf
                       6c33c66cf3fb8739def617e588e5acf466b2d321
                       4d4bd74349f77ed52ff413dce69da9ae494642cd
                       fa7121e0623d831e96fcbfa100e2463c530a507d
                       bb70ca36e2f7b02c4ecf19e573c65202e4a83c10
                       1d2b94a1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ff:38:8f:be:c1:e5:86:da:9a:58:62:ea:da:40:0c:37:df:fc:07:ea]
            modulus: 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
    public exponent: 10001

] 
2021-04-20 06:00:58.485  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-20 06:00:58.486 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-20 06:00:58.488 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-20 06:00:58.488 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-20 06:00:58.489  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-20 06:00:58.489  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-20 06:00:58.489  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-20 06:00:58.490  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-20 06:00:58.490  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-20 06:00:58.494  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-20 06:00:58.495  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-20 06:00:58.495  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-20 06:00:58.496  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-20 06:00:58.599  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-20 06:00:58.600  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-20 06:00:58.600 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-20 06:00:58.601 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-20 06:00:58.602  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1391
2021-04-20 06:00:58.602  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-20 06:00:58.603  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-20 06:00:58.604  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-20 06:00:58.604  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-20 06:00:58.604  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-20 06:00:58.604 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-20 06:00:58.605 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-20 06:00:58.605 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-20 06:00:58.605 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-20 06:00:58.606 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-20 06:00:58.606 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-20 06:00:58.607 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-20 06:00:58.610 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 419276238002776225645994587108372327853506165783
             IssuerDN: UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Apr 20 04:04:15 UTC 2021
           Final Date: Sun Apr 20 04:04:15 UTC 2031
            SubjectDN: UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b2:c7:29:90:03:9f:c9:a3:09:16:e2:29:38:38:3b:e5:bd:2f:d2:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 13ec094a43efd00dd2b3c899e3568f4409d149ab
                       e4511120ddf60fbe4ad20aace910f320ffde95fc
                       2c731e40667c6e7272a4e5b29e182c0e52ebfbc4
                       a633d5e40c4b660ef27707e96c2768f07e35dbdd
                       31c1da4a7ae1918a0c625a3858689a2c648944de
                       fc42c175610fe39be27fb84e16b1a812ff04ddb0
                       3f7f03b6c47f360c59c54934f7423d23a0a866fb
                       96fb6a3867084a604c1f208baa34bc72876da7c0
                       4efd3176e9e0d115899ee1e20134fd22556e432b
                       7408ede586d31fb2076954fc6143d6252230f2c8
                       fd2c9465769d3d41bb361961ce7d2ecc7b97ad35
                       a2cc82ceeee012efe33bf6bd574fc282e7beb665
                       a381ecf96207a9f23936c881f3e9fbc30180c2b9
                       282feaeddcf8bf6e539fb6d966b01bd3f1134cac
                       dd2752f30b726e4667ff263c2843559fe1c4cacf
                       6c33c66cf3fb8739def617e588e5acf466b2d321
                       4d4bd74349f77ed52ff413dce69da9ae494642cd
                       fa7121e0623d831e96fcbfa100e2463c530a507d
                       bb70ca36e2f7b02c4ecf19e573c65202e4a83c10
                       1d2b94a1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ef:0c:43:52:ce:ce:3f:75:2d:de:00:c2:33:57:83:86:6e:4d:9d:8b]
            modulus: 9e081eda530a33b6d1088212c6e90fa6c7f192c9f713e69870ca936ac11ed076b69cc798bca1c27c3781de41c7111fa084b1393271fedf99952a32c3597f733fae49e45ae5291f966efa5b69c01a42f35cddfc5dbefa1272ad5f85e2c781280a47fb5c38db8c9480ca1d44f49aa356a649bef7d55fb28cca9fa705388f2721b20945f5c2dff1057996cd70b96ce395c0a057a097b816ab5f44ee8e2813191dc8a647b506140d2b0fd22662e3dc3a56031adf563c2b4fed9935d70d362be1f67bd7e299c9cf486bf4940a9e2b9722cc60ce6a21a00240cdf476d972bb4ffe4236c6257bd669d50df7deb120179c1b148336207e733bb7836af00526a6f919f97f
    public exponent: 10001

] 
2021-04-20 06:02:30.880  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-20 06:02:30.881 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-20 06:02:30.882 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-20 06:02:30.882 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-20 06:02:30.883  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-20 06:02:30.886  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-20 06:02:30.886  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-20 06:02:30.886  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-20 06:02:30.886  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-20 06:02:30.890  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-20 06:02:30.891  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-20 06:02:30.891  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-20 06:02:30.892  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-20 06:02:30.988  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-20 06:02:30.988  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-20 06:02:30.988 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-20 06:02:30.989 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-20 06:02:30.989  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1391
2021-04-20 06:02:30.990  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-20 06:02:30.991  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-20 06:02:30.991  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-20 06:02:30.991  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-20 06:02:30.991  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-20 06:02:30.991 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-20 06:02:30.992 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-20 06:02:30.992 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-20 06:02:30.992 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-20 06:02:30.992 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-20 06:02:30.993 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-20 06:02:30.993 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-20 06:02:30.995 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 419276238002776225645994587108372327853506165783
             IssuerDN: UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Apr 20 04:04:15 UTC 2021
           Final Date: Sun Apr 20 04:04:15 UTC 2031
            SubjectDN: UID=c-0982acee09e5ab5e5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b2:c7:29:90:03:9f:c9:a3:09:16:e2:29:38:38:3b:e5:bd:2f:d2:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 13ec094a43efd00dd2b3c899e3568f4409d149ab
                       e4511120ddf60fbe4ad20aace910f320ffde95fc
                       2c731e40667c6e7272a4e5b29e182c0e52ebfbc4
                       a633d5e40c4b660ef27707e96c2768f07e35dbdd
                       31c1da4a7ae1918a0c625a3858689a2c648944de
                       fc42c175610fe39be27fb84e16b1a812ff04ddb0
                       3f7f03b6c47f360c59c54934f7423d23a0a866fb
                       96fb6a3867084a604c1f208baa34bc72876da7c0
                       4efd3176e9e0d115899ee1e20134fd22556e432b
                       7408ede586d31fb2076954fc6143d6252230f2c8
                       fd2c9465769d3d41bb361961ce7d2ecc7b97ad35
                       a2cc82ceeee012efe33bf6bd574fc282e7beb665
                       a381ecf96207a9f23936c881f3e9fbc30180c2b9
                       282feaeddcf8bf6e539fb6d966b01bd3f1134cac
                       dd2752f30b726e4667ff263c2843559fe1c4cacf
                       6c33c66cf3fb8739def617e588e5acf466b2d321
                       4d4bd74349f77ed52ff413dce69da9ae494642cd
                       fa7121e0623d831e96fcbfa100e2463c530a507d
                       bb70ca36e2f7b02c4ecf19e573c65202e4a83c10
                       1d2b94a1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0a:6f:b9:ae:83:aa:f8:a1:a3:fc:8b:ad:99:40:94:0b:e5:b7:ef:f3]
            modulus: 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
    public exponent: 10001

]