Results

By type

          2021-05-07 04:23:32,064 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-05-07 04:23:35,464 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-05-07 04:23:37.964  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-05-07 04:23:49.071 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-05-07 04:23:50.162  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-05-07 04:23:50.857  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-05-07 04:24:01.581  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 31.605 seconds (JVM running for 38.085)
2021-05-07 04:35:56.066  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-07 04:35:56.076 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-07 04:35:56.267 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-07 04:35:56.271 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-07 04:35:56.366  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-07 04:35:56.370  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-07 04:35:56.454  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-07 04:35:56.455  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 04:35:56.455  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-07 04:35:56.462  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-07 04:35:56.466  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-07 04:35:56.657  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-07 04:35:56.663  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 04:35:56.663  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 04:35:56.756  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-07 04:35:57.913  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-07 04:35:57.916  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-07 04:35:57.917 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-07 04:35:57.922 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-07 04:35:57.923  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1925
2021-05-07 04:35:57.923  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-07 04:35:57.927  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-07 04:35:57.928  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-07 04:35:57.957  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-07 04:35:57.958  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-07 04:35:57.958 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 04:35:57.959 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 04:35:57.959 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 04:35:57.979 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 04:35:57.980 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 04:35:57.980 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 04:35:58.057 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-07 04:35:58.153 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 23316176514195593655160808150690926901971292428
             IssuerDN: UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 07 04:19:10 UTC 2021
           Final Date: Wed May 07 04:19:10 UTC 2031
            SubjectDN: UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c6:28:79:67:4c:3b:14:c4:17:fc:b6:6b:14:00:ad:c6:1b:4b:b2:32]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ae34af116ab879138eb7e72c2ab4a936305ae9a9
                       17460ce40cc168669a63759b76444954fba91ba8
                       1c1814c0a2840438aca7e314f8ec72d414625594
                       be8a296094656359796365e2b09f3df0e44fe942
                       cedd7e74edf8bcd69a71099fd82a2b8340e7275d
                       1c28b58f5f41d22c611b07131da144ad8914bccf
                       0ee2d726eeef0b933953147b9c1fd8705824e137
                       8f6bd3e6afb93b127b55d62e786f7aee4f96a54d
                       68028f18276a968e67ab3e72d6c415f41f4dbcad
                       248d895d9fec8c3af8d7e8e7b600c7063a942640
                       d5be0a1608451a8ead887a3dd3ea5eb98ba2e573
                       08bee511a21a3262ff2d30516a4bbf492e54395e
                       d30b566f25a4f3bf770c53b187cb7a24d637b1c0
                       62514895122457cc61dafa306d1a9d7909fc4820
                       f09bd430a1ebe1ee0fd4d666920a11b690f8d017
                       bc4abbf356cc49060503e198e85e40731f2b4abd
                       3b44b81668c18578fe1b5f796c5fe1126cf6a3be
                       61be6d7e80faabfe1a83d71ec2e69b14d78af515
                       2336eef7176cd5772deb36c95dea05a93674f256
                       9f25e0e8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [54:00:b2:23:05:5d:58:62:1c:5d:bf:d7:1b:ca:9e:99:7c:3a:5c:a0]
            modulus: 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
    public exponent: 10001

] 
2021-05-07 05:39:23.810  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-07 05:39:23.811 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-07 05:39:23.813 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-07 05:39:23.814 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-07 05:39:23.815  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-07 05:39:23.816  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-07 05:39:23.816  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-07 05:39:23.817  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-07 05:39:23.817  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-07 05:39:23.825  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-07 05:39:23.826  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 05:39:23.826  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 05:39:23.831  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-07 05:39:23.981  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-07 05:39:23.982  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-07 05:39:23.983 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-07 05:39:23.985 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-07 05:39:23.986  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1925
2021-05-07 05:39:23.986  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-07 05:39:23.989  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-07 05:39:24.053  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-07 05:39:24.054  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-07 05:39:24.054  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-07 05:39:24.055 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 05:39:24.055 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 05:39:24.055 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 05:39:24.056 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 05:39:24.057 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 05:39:24.057 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 05:39:24.058 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-07 05:39:24.063 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 23316176514195593655160808150690926901971292428
             IssuerDN: UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 07 04:19:10 UTC 2021
           Final Date: Wed May 07 04:19:10 UTC 2031
            SubjectDN: UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c6:28:79:67:4c:3b:14:c4:17:fc:b6:6b:14:00:ad:c6:1b:4b:b2:32]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ae34af116ab879138eb7e72c2ab4a936305ae9a9
                       17460ce40cc168669a63759b76444954fba91ba8
                       1c1814c0a2840438aca7e314f8ec72d414625594
                       be8a296094656359796365e2b09f3df0e44fe942
                       cedd7e74edf8bcd69a71099fd82a2b8340e7275d
                       1c28b58f5f41d22c611b07131da144ad8914bccf
                       0ee2d726eeef0b933953147b9c1fd8705824e137
                       8f6bd3e6afb93b127b55d62e786f7aee4f96a54d
                       68028f18276a968e67ab3e72d6c415f41f4dbcad
                       248d895d9fec8c3af8d7e8e7b600c7063a942640
                       d5be0a1608451a8ead887a3dd3ea5eb98ba2e573
                       08bee511a21a3262ff2d30516a4bbf492e54395e
                       d30b566f25a4f3bf770c53b187cb7a24d637b1c0
                       62514895122457cc61dafa306d1a9d7909fc4820
                       f09bd430a1ebe1ee0fd4d666920a11b690f8d017
                       bc4abbf356cc49060503e198e85e40731f2b4abd
                       3b44b81668c18578fe1b5f796c5fe1126cf6a3be
                       61be6d7e80faabfe1a83d71ec2e69b14d78af515
                       2336eef7176cd5772deb36c95dea05a93674f256
                       9f25e0e8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9f:0e:54:d8:7e:dd:63:92:5b:86:c1:80:6c:b0:93:e9:8b:fc:82:ba]
            modulus: a1576d83a34fc703f693df39fcb5120ed322983360142c753bffd526e42d016a1a696346b1433ffcf5be519dccb012c7d19ee5cf5d0c219d100d86ae6f20ccfa98dbd6a1f1afdf62bf2c9030e09c33d1e1f6caa58223c0aaf35ef41841d15160688a8bbbe90dcb955db2bea98caae4209605958bdfa36d5f8c65ad2ed9558dfc53043bd932fcb9be920607530df9199279c1ab43f68b6abb1010d489fcab3332ef1f1424638e026d65f98c37a638a12231843366a642e76054f5c2110ac8cd391c2f6ee94dcf8546e56fb0a377c991bddcbdb3e712a3458020a3f9fafa4d1b5bbc0fd45bfa6e3c4d28bfdc2bf244ab55af456b5b0c2f40ea861619e6e91c8f6d
    public exponent: 10001

] 
2021-05-07 05:40:47.387  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-07 05:40:47.388 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-07 05:40:47.389 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-07 05:40:47.390 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-07 05:40:47.391  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-07 05:40:47.392  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-07 05:40:47.393  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-07 05:40:47.393  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-07 05:40:47.394  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-07 05:40:47.404  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-07 05:40:47.405  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 05:40:47.405  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 05:40:47.408  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-07 05:40:47.583  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-07 05:40:47.583  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-07 05:40:47.584 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-07 05:40:47.653 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-07 05:40:47.654  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1925
2021-05-07 05:40:47.654  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-07 05:40:47.657  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-07 05:40:47.658  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-07 05:40:47.659  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-07 05:40:47.659  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-07 05:40:47.659 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 05:40:47.660 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 05:40:47.660 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 05:40:47.661 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 05:40:47.662 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 05:40:47.662 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 05:40:47.663 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-07 05:40:47.666 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 23316176514195593655160808150690926901971292428
             IssuerDN: UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 07 04:19:10 UTC 2021
           Final Date: Wed May 07 04:19:10 UTC 2031
            SubjectDN: UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c6:28:79:67:4c:3b:14:c4:17:fc:b6:6b:14:00:ad:c6:1b:4b:b2:32]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ae34af116ab879138eb7e72c2ab4a936305ae9a9
                       17460ce40cc168669a63759b76444954fba91ba8
                       1c1814c0a2840438aca7e314f8ec72d414625594
                       be8a296094656359796365e2b09f3df0e44fe942
                       cedd7e74edf8bcd69a71099fd82a2b8340e7275d
                       1c28b58f5f41d22c611b07131da144ad8914bccf
                       0ee2d726eeef0b933953147b9c1fd8705824e137
                       8f6bd3e6afb93b127b55d62e786f7aee4f96a54d
                       68028f18276a968e67ab3e72d6c415f41f4dbcad
                       248d895d9fec8c3af8d7e8e7b600c7063a942640
                       d5be0a1608451a8ead887a3dd3ea5eb98ba2e573
                       08bee511a21a3262ff2d30516a4bbf492e54395e
                       d30b566f25a4f3bf770c53b187cb7a24d637b1c0
                       62514895122457cc61dafa306d1a9d7909fc4820
                       f09bd430a1ebe1ee0fd4d666920a11b690f8d017
                       bc4abbf356cc49060503e198e85e40731f2b4abd
                       3b44b81668c18578fe1b5f796c5fe1126cf6a3be
                       61be6d7e80faabfe1a83d71ec2e69b14d78af515
                       2336eef7176cd5772deb36c95dea05a93674f256
                       9f25e0e8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [02:42:91:7d:8e:06:69:97:de:a2:f3:c8:b3:70:a2:ce:09:48:16:58]
            modulus: 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
    public exponent: 10001

] 
2021-05-07 05:43:40.101  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-07 05:43:40.103 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-07 05:43:40.105 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-07 05:43:40.105 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-07 05:43:40.106  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-07 05:43:40.107  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-07 05:43:40.107  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-07 05:43:40.108  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-07 05:43:40.108  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-07 05:43:40.113  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-07 05:43:40.114  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 05:43:40.114  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 05:43:40.116  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-07 05:43:40.261  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-07 05:43:40.262  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-07 05:43:40.263 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-07 05:43:40.264 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-07 05:43:40.265  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1925
2021-05-07 05:43:40.265  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-07 05:43:40.267  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-07 05:43:40.267  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-07 05:43:40.267  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-07 05:43:40.268  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-07 05:43:40.268 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 05:43:40.269 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 05:43:40.269 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 05:43:40.270 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 05:43:40.270 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 05:43:40.270 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 05:43:40.271 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-07 05:43:40.274 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 23316176514195593655160808150690926901971292428
             IssuerDN: UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 07 04:19:10 UTC 2021
           Final Date: Wed May 07 04:19:10 UTC 2031
            SubjectDN: UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c6:28:79:67:4c:3b:14:c4:17:fc:b6:6b:14:00:ad:c6:1b:4b:b2:32]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ae34af116ab879138eb7e72c2ab4a936305ae9a9
                       17460ce40cc168669a63759b76444954fba91ba8
                       1c1814c0a2840438aca7e314f8ec72d414625594
                       be8a296094656359796365e2b09f3df0e44fe942
                       cedd7e74edf8bcd69a71099fd82a2b8340e7275d
                       1c28b58f5f41d22c611b07131da144ad8914bccf
                       0ee2d726eeef0b933953147b9c1fd8705824e137
                       8f6bd3e6afb93b127b55d62e786f7aee4f96a54d
                       68028f18276a968e67ab3e72d6c415f41f4dbcad
                       248d895d9fec8c3af8d7e8e7b600c7063a942640
                       d5be0a1608451a8ead887a3dd3ea5eb98ba2e573
                       08bee511a21a3262ff2d30516a4bbf492e54395e
                       d30b566f25a4f3bf770c53b187cb7a24d637b1c0
                       62514895122457cc61dafa306d1a9d7909fc4820
                       f09bd430a1ebe1ee0fd4d666920a11b690f8d017
                       bc4abbf356cc49060503e198e85e40731f2b4abd
                       3b44b81668c18578fe1b5f796c5fe1126cf6a3be
                       61be6d7e80faabfe1a83d71ec2e69b14d78af515
                       2336eef7176cd5772deb36c95dea05a93674f256
                       9f25e0e8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ed:e9:fc:ec:c4:59:c8:f9:3a:9a:50:09:f1:2c:d1:58:b3:69:50:4b]
            modulus: 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
    public exponent: 10001

] 
2021-05-07 05:44:38.190  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-07 05:44:38.191 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-07 05:44:38.192 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-07 05:44:38.193 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-07 05:44:38.193  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-07 05:44:38.194  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-07 05:44:38.194  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-07 05:44:38.194  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-07 05:44:38.195  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-07 05:44:38.200  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-07 05:44:38.200  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 05:44:38.201  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 05:44:38.202  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-07 05:44:38.267  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-07 05:44:38.268  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-07 05:44:38.274 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-07 05:44:38.275 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-07 05:44:38.276  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1925
2021-05-07 05:44:38.276  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-07 05:44:38.277  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-07 05:44:38.278  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-07 05:44:38.278  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-07 05:44:38.278  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-07 05:44:38.279 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 05:44:38.279 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 05:44:38.279 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 05:44:38.279 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 05:44:38.280 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 05:44:38.280 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 05:44:38.281 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-07 05:44:38.283 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 23316176514195593655160808150690926901971292428
             IssuerDN: UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 07 04:19:10 UTC 2021
           Final Date: Wed May 07 04:19:10 UTC 2031
            SubjectDN: UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c6:28:79:67:4c:3b:14:c4:17:fc:b6:6b:14:00:ad:c6:1b:4b:b2:32]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ae34af116ab879138eb7e72c2ab4a936305ae9a9
                       17460ce40cc168669a63759b76444954fba91ba8
                       1c1814c0a2840438aca7e314f8ec72d414625594
                       be8a296094656359796365e2b09f3df0e44fe942
                       cedd7e74edf8bcd69a71099fd82a2b8340e7275d
                       1c28b58f5f41d22c611b07131da144ad8914bccf
                       0ee2d726eeef0b933953147b9c1fd8705824e137
                       8f6bd3e6afb93b127b55d62e786f7aee4f96a54d
                       68028f18276a968e67ab3e72d6c415f41f4dbcad
                       248d895d9fec8c3af8d7e8e7b600c7063a942640
                       d5be0a1608451a8ead887a3dd3ea5eb98ba2e573
                       08bee511a21a3262ff2d30516a4bbf492e54395e
                       d30b566f25a4f3bf770c53b187cb7a24d637b1c0
                       62514895122457cc61dafa306d1a9d7909fc4820
                       f09bd430a1ebe1ee0fd4d666920a11b690f8d017
                       bc4abbf356cc49060503e198e85e40731f2b4abd
                       3b44b81668c18578fe1b5f796c5fe1126cf6a3be
                       61be6d7e80faabfe1a83d71ec2e69b14d78af515
                       2336eef7176cd5772deb36c95dea05a93674f256
                       9f25e0e8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ef:cc:50:9c:c2:a9:67:b7:07:59:69:05:6b:d1:23:1e:da:7f:db:d2]
            modulus: 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
    public exponent: 10001

] 
2021-05-07 05:44:47.748  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-07 05:44:47.749 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-07 05:44:47.750 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-07 05:44:47.751 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-07 05:44:47.751  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-07 05:44:47.752  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-07 05:44:47.752  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-07 05:44:47.752  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-07 05:44:47.753  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-07 05:44:47.757  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-07 05:44:47.758  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 05:44:47.758  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 05:44:47.759  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-07 05:44:47.839  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-07 05:44:47.853  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-07 05:44:47.853 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-07 05:44:47.857 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-07 05:44:47.857  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1925
2021-05-07 05:44:47.857  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-07 05:44:47.859  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-07 05:44:47.859  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-07 05:44:47.860  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-07 05:44:47.860  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-07 05:44:47.860 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 05:44:47.861 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 05:44:47.861 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 05:44:47.862 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 05:44:47.863 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 05:44:47.863 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 05:44:47.864 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-07 05:44:47.871 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 23316176514195593655160808150690926901971292428
             IssuerDN: UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 07 04:19:10 UTC 2021
           Final Date: Wed May 07 04:19:10 UTC 2031
            SubjectDN: UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c6:28:79:67:4c:3b:14:c4:17:fc:b6:6b:14:00:ad:c6:1b:4b:b2:32]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ae34af116ab879138eb7e72c2ab4a936305ae9a9
                       17460ce40cc168669a63759b76444954fba91ba8
                       1c1814c0a2840438aca7e314f8ec72d414625594
                       be8a296094656359796365e2b09f3df0e44fe942
                       cedd7e74edf8bcd69a71099fd82a2b8340e7275d
                       1c28b58f5f41d22c611b07131da144ad8914bccf
                       0ee2d726eeef0b933953147b9c1fd8705824e137
                       8f6bd3e6afb93b127b55d62e786f7aee4f96a54d
                       68028f18276a968e67ab3e72d6c415f41f4dbcad
                       248d895d9fec8c3af8d7e8e7b600c7063a942640
                       d5be0a1608451a8ead887a3dd3ea5eb98ba2e573
                       08bee511a21a3262ff2d30516a4bbf492e54395e
                       d30b566f25a4f3bf770c53b187cb7a24d637b1c0
                       62514895122457cc61dafa306d1a9d7909fc4820
                       f09bd430a1ebe1ee0fd4d666920a11b690f8d017
                       bc4abbf356cc49060503e198e85e40731f2b4abd
                       3b44b81668c18578fe1b5f796c5fe1126cf6a3be
                       61be6d7e80faabfe1a83d71ec2e69b14d78af515
                       2336eef7176cd5772deb36c95dea05a93674f256
                       9f25e0e8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [45:71:79:cd:39:35:86:9f:a1:c6:52:d9:0d:64:1a:b9:7b:e5:34:30]
            modulus: 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
    public exponent: 10001

] 
2021-05-07 05:45:07.286  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-07 05:45:07.286 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-07 05:45:07.287 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-07 05:45:07.288 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-07 05:45:07.288  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-07 05:45:07.289  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-07 05:45:07.289  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-07 05:45:07.290  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-07 05:45:07.290  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-07 05:45:07.294  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-07 05:45:07.294  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 05:45:07.295  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 05:45:07.296  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-07 05:45:07.353  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-07 05:45:07.354  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-07 05:45:07.354 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-07 05:45:07.355 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-07 05:45:07.356  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1925
2021-05-07 05:45:07.356  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-07 05:45:07.357  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-07 05:45:07.358  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-07 05:45:07.358  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-07 05:45:07.358  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-07 05:45:07.359 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 05:45:07.359 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 05:45:07.359 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 05:45:07.360 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 05:45:07.360 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 05:45:07.360 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 05:45:07.361 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-07 05:45:07.364 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 23316176514195593655160808150690926901971292428
             IssuerDN: UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 07 04:19:10 UTC 2021
           Final Date: Wed May 07 04:19:10 UTC 2031
            SubjectDN: UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c6:28:79:67:4c:3b:14:c4:17:fc:b6:6b:14:00:ad:c6:1b:4b:b2:32]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ae34af116ab879138eb7e72c2ab4a936305ae9a9
                       17460ce40cc168669a63759b76444954fba91ba8
                       1c1814c0a2840438aca7e314f8ec72d414625594
                       be8a296094656359796365e2b09f3df0e44fe942
                       cedd7e74edf8bcd69a71099fd82a2b8340e7275d
                       1c28b58f5f41d22c611b07131da144ad8914bccf
                       0ee2d726eeef0b933953147b9c1fd8705824e137
                       8f6bd3e6afb93b127b55d62e786f7aee4f96a54d
                       68028f18276a968e67ab3e72d6c415f41f4dbcad
                       248d895d9fec8c3af8d7e8e7b600c7063a942640
                       d5be0a1608451a8ead887a3dd3ea5eb98ba2e573
                       08bee511a21a3262ff2d30516a4bbf492e54395e
                       d30b566f25a4f3bf770c53b187cb7a24d637b1c0
                       62514895122457cc61dafa306d1a9d7909fc4820
                       f09bd430a1ebe1ee0fd4d666920a11b690f8d017
                       bc4abbf356cc49060503e198e85e40731f2b4abd
                       3b44b81668c18578fe1b5f796c5fe1126cf6a3be
                       61be6d7e80faabfe1a83d71ec2e69b14d78af515
                       2336eef7176cd5772deb36c95dea05a93674f256
                       9f25e0e8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [18:89:de:a4:87:41:81:c3:20:71:07:bf:58:d9:fb:8e:03:37:57:7a]
            modulus: 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
    public exponent: 10001

] 
2021-05-07 05:45:38.553  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-07 05:45:38.554 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-07 05:45:38.555 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-07 05:45:38.555 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-07 05:45:38.556  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-07 05:45:38.556  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-07 05:45:38.557  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-07 05:45:38.557  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-07 05:45:38.557  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-07 05:45:38.561  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-07 05:45:38.561  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 05:45:38.562  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 05:45:38.563  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-07 05:45:38.712  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-07 05:45:38.712  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-07 05:45:38.713 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-07 05:45:38.715 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-07 05:45:38.716  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1925
2021-05-07 05:45:38.716  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-07 05:45:38.719  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-07 05:45:38.719  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-07 05:45:38.720  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-07 05:45:38.720  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-07 05:45:38.721 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 05:45:38.721 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 05:45:38.722 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 05:45:38.722 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 05:45:38.723 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 05:45:38.723 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 05:45:38.724 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-07 05:45:38.726 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 23316176514195593655160808150690926901971292428
             IssuerDN: UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 07 04:19:10 UTC 2021
           Final Date: Wed May 07 04:19:10 UTC 2031
            SubjectDN: UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c6:28:79:67:4c:3b:14:c4:17:fc:b6:6b:14:00:ad:c6:1b:4b:b2:32]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ae34af116ab879138eb7e72c2ab4a936305ae9a9
                       17460ce40cc168669a63759b76444954fba91ba8
                       1c1814c0a2840438aca7e314f8ec72d414625594
                       be8a296094656359796365e2b09f3df0e44fe942
                       cedd7e74edf8bcd69a71099fd82a2b8340e7275d
                       1c28b58f5f41d22c611b07131da144ad8914bccf
                       0ee2d726eeef0b933953147b9c1fd8705824e137
                       8f6bd3e6afb93b127b55d62e786f7aee4f96a54d
                       68028f18276a968e67ab3e72d6c415f41f4dbcad
                       248d895d9fec8c3af8d7e8e7b600c7063a942640
                       d5be0a1608451a8ead887a3dd3ea5eb98ba2e573
                       08bee511a21a3262ff2d30516a4bbf492e54395e
                       d30b566f25a4f3bf770c53b187cb7a24d637b1c0
                       62514895122457cc61dafa306d1a9d7909fc4820
                       f09bd430a1ebe1ee0fd4d666920a11b690f8d017
                       bc4abbf356cc49060503e198e85e40731f2b4abd
                       3b44b81668c18578fe1b5f796c5fe1126cf6a3be
                       61be6d7e80faabfe1a83d71ec2e69b14d78af515
                       2336eef7176cd5772deb36c95dea05a93674f256
                       9f25e0e8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b5:2a:eb:25:fb:b2:8f:98:56:39:b9:cc:03:0e:9c:a1:be:7f:2b:ab]
            modulus: 8e0896453a24ab03220586d5b8c3c43f626ddf7cc123d57c5a4675cacf36fdddc4620bffaed2af09d74b0a271db5525a7ccf0fe05c0ea6a26051de51ae75484ebffbbe3e82f361a39e21a6e05958f21da607588792b88be708616b6681230837e0fe123856290f44b964bba3e3f87bac8ddfc36aff7e4ab694beca8b88e59435ff7a2487d58ad8beeb7781fd60ff447ca3c6f5202561ab89913a2520462ff93cb8af9e1cc181f2ed645d4b92bedcdc4a3617a873de7394f44888b54b7f6928ed7302e8123b2a8b859ca90aa2085a5fbfee1ee562340fe15f615597f61cad6d45917d9a359f9218d2bf18dd944fdf0a26788715f45cd20a94399e0cdeb670141b
    public exponent: 10001

] 
2021-05-07 05:47:33.256  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-07 05:47:33.257 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-07 05:47:33.259 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-07 05:47:33.260 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-07 05:47:33.260  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-07 05:47:33.261  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-07 05:47:33.262  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-07 05:47:33.262  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-07 05:47:33.263  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-07 05:47:33.267  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-07 05:47:33.268  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 05:47:33.268  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 05:47:33.269  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-07 05:47:33.357  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-07 05:47:33.358  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-07 05:47:33.358 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-07 05:47:33.359 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-07 05:47:33.360  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1925
2021-05-07 05:47:33.360  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-07 05:47:33.361  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-07 05:47:33.361  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-07 05:47:33.362  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-07 05:47:33.362  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-07 05:47:33.362 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 05:47:33.363 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 05:47:33.363 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 05:47:33.363 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 05:47:33.364 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 05:47:33.364 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 05:47:33.364 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-07 05:47:33.367 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 23316176514195593655160808150690926901971292428
             IssuerDN: UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 07 04:19:10 UTC 2021
           Final Date: Wed May 07 04:19:10 UTC 2031
            SubjectDN: UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c6:28:79:67:4c:3b:14:c4:17:fc:b6:6b:14:00:ad:c6:1b:4b:b2:32]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ae34af116ab879138eb7e72c2ab4a936305ae9a9
                       17460ce40cc168669a63759b76444954fba91ba8
                       1c1814c0a2840438aca7e314f8ec72d414625594
                       be8a296094656359796365e2b09f3df0e44fe942
                       cedd7e74edf8bcd69a71099fd82a2b8340e7275d
                       1c28b58f5f41d22c611b07131da144ad8914bccf
                       0ee2d726eeef0b933953147b9c1fd8705824e137
                       8f6bd3e6afb93b127b55d62e786f7aee4f96a54d
                       68028f18276a968e67ab3e72d6c415f41f4dbcad
                       248d895d9fec8c3af8d7e8e7b600c7063a942640
                       d5be0a1608451a8ead887a3dd3ea5eb98ba2e573
                       08bee511a21a3262ff2d30516a4bbf492e54395e
                       d30b566f25a4f3bf770c53b187cb7a24d637b1c0
                       62514895122457cc61dafa306d1a9d7909fc4820
                       f09bd430a1ebe1ee0fd4d666920a11b690f8d017
                       bc4abbf356cc49060503e198e85e40731f2b4abd
                       3b44b81668c18578fe1b5f796c5fe1126cf6a3be
                       61be6d7e80faabfe1a83d71ec2e69b14d78af515
                       2336eef7176cd5772deb36c95dea05a93674f256
                       9f25e0e8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2a:23:92:a2:53:9b:5f:d5:dd:47:ba:87:a3:a8:ea:64:09:bc:30:a5]
            modulus: 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
    public exponent: 10001

] 
2021-05-07 05:49:33.830  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-07 05:49:33.831 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-07 05:49:33.832 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-07 05:49:33.832 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-07 05:49:33.833  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-07 05:49:33.833  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-07 05:49:33.833  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-07 05:49:33.834  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-07 05:49:33.834  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-07 05:49:33.838  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-07 05:49:33.839  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 05:49:33.839  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 05:49:33.840  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-07 05:49:33.944  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-07 05:49:33.945  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-07 05:49:33.945 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-07 05:49:33.953 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-07 05:49:33.954  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1925
2021-05-07 05:49:33.954  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-07 05:49:33.956  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-07 05:49:33.956  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-07 05:49:33.956  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-07 05:49:33.956  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-07 05:49:33.957 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 05:49:33.957 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 05:49:33.957 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 05:49:33.958 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 05:49:33.958 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 05:49:33.958 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 05:49:33.959 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-07 05:49:33.966 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 23316176514195593655160808150690926901971292428
             IssuerDN: UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 07 04:19:10 UTC 2021
           Final Date: Wed May 07 04:19:10 UTC 2031
            SubjectDN: UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c6:28:79:67:4c:3b:14:c4:17:fc:b6:6b:14:00:ad:c6:1b:4b:b2:32]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ae34af116ab879138eb7e72c2ab4a936305ae9a9
                       17460ce40cc168669a63759b76444954fba91ba8
                       1c1814c0a2840438aca7e314f8ec72d414625594
                       be8a296094656359796365e2b09f3df0e44fe942
                       cedd7e74edf8bcd69a71099fd82a2b8340e7275d
                       1c28b58f5f41d22c611b07131da144ad8914bccf
                       0ee2d726eeef0b933953147b9c1fd8705824e137
                       8f6bd3e6afb93b127b55d62e786f7aee4f96a54d
                       68028f18276a968e67ab3e72d6c415f41f4dbcad
                       248d895d9fec8c3af8d7e8e7b600c7063a942640
                       d5be0a1608451a8ead887a3dd3ea5eb98ba2e573
                       08bee511a21a3262ff2d30516a4bbf492e54395e
                       d30b566f25a4f3bf770c53b187cb7a24d637b1c0
                       62514895122457cc61dafa306d1a9d7909fc4820
                       f09bd430a1ebe1ee0fd4d666920a11b690f8d017
                       bc4abbf356cc49060503e198e85e40731f2b4abd
                       3b44b81668c18578fe1b5f796c5fe1126cf6a3be
                       61be6d7e80faabfe1a83d71ec2e69b14d78af515
                       2336eef7176cd5772deb36c95dea05a93674f256
                       9f25e0e8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [08:ae:54:67:96:fc:ac:ec:45:0b:a5:b7:f4:3b:0f:71:5f:3d:b3:c3]
            modulus: 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
    public exponent: 10001

] 
2021-05-07 05:52:05.311  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-07 05:52:05.312 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-07 05:52:05.313 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-07 05:52:05.314 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-07 05:52:05.314  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-07 05:52:05.315  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-07 05:52:05.315  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-07 05:52:05.315  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-07 05:52:05.316  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-07 05:52:05.319  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-07 05:52:05.320  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 05:52:05.320  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 05:52:05.321  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-07 05:52:05.405  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-07 05:52:05.405  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-07 05:52:05.405 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-07 05:52:05.407 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-07 05:52:05.407  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1925
2021-05-07 05:52:05.407  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-07 05:52:05.408  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-07 05:52:05.409  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-07 05:52:05.409  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-07 05:52:05.409  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-07 05:52:05.410 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 05:52:05.410 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 05:52:05.410 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 05:52:05.411 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 05:52:05.411 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 05:52:05.411 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 05:52:05.412 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-07 05:52:05.415 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 23316176514195593655160808150690926901971292428
             IssuerDN: UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 07 04:19:10 UTC 2021
           Final Date: Wed May 07 04:19:10 UTC 2031
            SubjectDN: UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c6:28:79:67:4c:3b:14:c4:17:fc:b6:6b:14:00:ad:c6:1b:4b:b2:32]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ae34af116ab879138eb7e72c2ab4a936305ae9a9
                       17460ce40cc168669a63759b76444954fba91ba8
                       1c1814c0a2840438aca7e314f8ec72d414625594
                       be8a296094656359796365e2b09f3df0e44fe942
                       cedd7e74edf8bcd69a71099fd82a2b8340e7275d
                       1c28b58f5f41d22c611b07131da144ad8914bccf
                       0ee2d726eeef0b933953147b9c1fd8705824e137
                       8f6bd3e6afb93b127b55d62e786f7aee4f96a54d
                       68028f18276a968e67ab3e72d6c415f41f4dbcad
                       248d895d9fec8c3af8d7e8e7b600c7063a942640
                       d5be0a1608451a8ead887a3dd3ea5eb98ba2e573
                       08bee511a21a3262ff2d30516a4bbf492e54395e
                       d30b566f25a4f3bf770c53b187cb7a24d637b1c0
                       62514895122457cc61dafa306d1a9d7909fc4820
                       f09bd430a1ebe1ee0fd4d666920a11b690f8d017
                       bc4abbf356cc49060503e198e85e40731f2b4abd
                       3b44b81668c18578fe1b5f796c5fe1126cf6a3be
                       61be6d7e80faabfe1a83d71ec2e69b14d78af515
                       2336eef7176cd5772deb36c95dea05a93674f256
                       9f25e0e8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2f:d0:e0:d2:f9:d4:07:17:4c:84:91:a1:bf:25:d9:d1:6e:d6:db:90]
            modulus: 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
    public exponent: 10001

] 
2021-05-07 05:54:03.555  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-07 05:54:03.556 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-07 05:54:03.557 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-07 05:54:03.557 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-07 05:54:03.558  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-07 05:54:03.558  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-07 05:54:03.558  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-07 05:54:03.559  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-07 05:54:03.559  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-07 05:54:03.563  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-07 05:54:03.564  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 05:54:03.564  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 05:54:03.565  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-07 05:54:03.695  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-07 05:54:03.695  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-07 05:54:03.696 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-07 05:54:03.697 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-07 05:54:03.697  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1925
2021-05-07 05:54:03.697  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-07 05:54:03.755  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-07 05:54:03.756  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-07 05:54:03.757  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-07 05:54:03.757  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-07 05:54:03.757 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 05:54:03.758 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 05:54:03.758 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 05:54:03.759 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 05:54:03.759 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 05:54:03.760 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 05:54:03.765 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-07 05:54:03.769 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 23316176514195593655160808150690926901971292428
             IssuerDN: UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 07 04:19:10 UTC 2021
           Final Date: Wed May 07 04:19:10 UTC 2031
            SubjectDN: UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c6:28:79:67:4c:3b:14:c4:17:fc:b6:6b:14:00:ad:c6:1b:4b:b2:32]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ae34af116ab879138eb7e72c2ab4a936305ae9a9
                       17460ce40cc168669a63759b76444954fba91ba8
                       1c1814c0a2840438aca7e314f8ec72d414625594
                       be8a296094656359796365e2b09f3df0e44fe942
                       cedd7e74edf8bcd69a71099fd82a2b8340e7275d
                       1c28b58f5f41d22c611b07131da144ad8914bccf
                       0ee2d726eeef0b933953147b9c1fd8705824e137
                       8f6bd3e6afb93b127b55d62e786f7aee4f96a54d
                       68028f18276a968e67ab3e72d6c415f41f4dbcad
                       248d895d9fec8c3af8d7e8e7b600c7063a942640
                       d5be0a1608451a8ead887a3dd3ea5eb98ba2e573
                       08bee511a21a3262ff2d30516a4bbf492e54395e
                       d30b566f25a4f3bf770c53b187cb7a24d637b1c0
                       62514895122457cc61dafa306d1a9d7909fc4820
                       f09bd430a1ebe1ee0fd4d666920a11b690f8d017
                       bc4abbf356cc49060503e198e85e40731f2b4abd
                       3b44b81668c18578fe1b5f796c5fe1126cf6a3be
                       61be6d7e80faabfe1a83d71ec2e69b14d78af515
                       2336eef7176cd5772deb36c95dea05a93674f256
                       9f25e0e8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ff:0f:9c:02:54:d2:67:97:fb:70:cd:c5:f8:87:31:60:64:bc:16:09]
            modulus: 8c78092e88e0a60f6347ea67d10c8f5ae4af507f52bea298a440e5d90a3fd9f875bbc729f23272d9c47dca122bbc2d54129c57b6de86e31b9c6606029ccb55b70331fc82acd589bacc1a8b325ae40b147070141d833d2f1dd82b41595649570e1de343258e73d31e3c6790255bb9d4a1a5c1189a36ae0806063a686a6e4e55f4aea1d5ac6ff52a6e66c038c0480fcaa3b70c014b45d73eaa7c0ccadd7eebcaddbab2b7e1637d49992b6db91d1d2f5432daf4751cee3f79e9850166a755d41b821ab4915152cf8259c495fb980c0d45381c0b915105894b06f4be51c714d86143e757a4333e86d424566d02b9d5ca9a16ff7081ac688a5591f19f2ffb407e370b
    public exponent: 10001

] 
2021-05-07 05:55:29.331  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-07 05:55:29.331 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-07 05:55:29.333 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-07 05:55:29.333 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-07 05:55:29.333  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-07 05:55:29.334  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-07 05:55:29.334  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-07 05:55:29.334  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-07 05:55:29.335  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-07 05:55:29.338  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-07 05:55:29.339  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 05:55:29.339  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-07 05:55:29.340  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-07 05:55:29.462  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-07 05:55:29.462  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-07 05:55:29.463 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-07 05:55:29.464 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-07 05:55:29.464  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1925
2021-05-07 05:55:29.465  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-07 05:55:29.466  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-07 05:55:29.466  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-07 05:55:29.466  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-07 05:55:29.467  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-07 05:55:29.467 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 05:55:29.467 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 05:55:29.467 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 05:55:29.468 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-07 05:55:29.468 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-07 05:55:29.468 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-07 05:55:29.469 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-07 05:55:29.471 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 23316176514195593655160808150690926901971292428
             IssuerDN: UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 07 04:19:10 UTC 2021
           Final Date: Wed May 07 04:19:10 UTC 2031
            SubjectDN: UID=c-0df07fb24c953b6ad,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c6:28:79:67:4c:3b:14:c4:17:fc:b6:6b:14:00:ad:c6:1b:4b:b2:32]
            modulus: b04b037011c1179d5cb83fc74758e3d1a8b61d70e83b0e8293fc5b0cfa13901ef6d0067868fab32b1ea8e39ea41f5ccbba42b79cd19eb2558a81630741b7d3610f39393062e69ac67ebb32251d0ac9ed8d47d874ed40f5ac290be70b8d6e7e45f17667dcf75224432f33ca955927abbd15c9dc56c90f203202c5305cab3a925a5c8e524d5dfa5665676293c259c52108cd7eb42cda935d6e668ca19104c55a074fd852e19513bc0836ba0fac50914aaae1b844b35d46cd764866c798dcbb5605078425cee93d71fd025af8aec419359d4c597860991e22853f606e78f6a0887587261a19e3aa56cbfe93bd4119508796203b50338d3667f9a95a1d50653fd00231f1ad69eab895087a746f3d19ab732829125811fe5b397d2fe34992c5141f4e0bc1658fc601825c40c2bf91fd32ed94c1fd6f3dbb07bcd3abe21cf64360a1f5c8406685c2e932041cafbd90390d5d1fcf598e072ec8cf3e15175f95926de84c60fd69c3ce3c0e727dc1d7ab8c22ab9d7ebee5685288ec75a2dc68b75fe38643
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ae34af116ab879138eb7e72c2ab4a936305ae9a9
                       17460ce40cc168669a63759b76444954fba91ba8
                       1c1814c0a2840438aca7e314f8ec72d414625594
                       be8a296094656359796365e2b09f3df0e44fe942
                       cedd7e74edf8bcd69a71099fd82a2b8340e7275d
                       1c28b58f5f41d22c611b07131da144ad8914bccf
                       0ee2d726eeef0b933953147b9c1fd8705824e137
                       8f6bd3e6afb93b127b55d62e786f7aee4f96a54d
                       68028f18276a968e67ab3e72d6c415f41f4dbcad
                       248d895d9fec8c3af8d7e8e7b600c7063a942640
                       d5be0a1608451a8ead887a3dd3ea5eb98ba2e573
                       08bee511a21a3262ff2d30516a4bbf492e54395e
                       d30b566f25a4f3bf770c53b187cb7a24d637b1c0
                       62514895122457cc61dafa306d1a9d7909fc4820
                       f09bd430a1ebe1ee0fd4d666920a11b690f8d017
                       bc4abbf356cc49060503e198e85e40731f2b4abd
                       3b44b81668c18578fe1b5f796c5fe1126cf6a3be
                       61be6d7e80faabfe1a83d71ec2e69b14d78af515
                       2336eef7176cd5772deb36c95dea05a93674f256
                       9f25e0e8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fe:3c:6e:3a:9d:8e:0e:8b:87:b4:d5:b9:ba:f3:e9:3a:ec:bb:a2:c5]
            modulus: 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
    public exponent: 10001

]