2021-05-09 04:08:05,882 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-05-09 04:08:10,291 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-05-09 04:08:13.684  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-05-09 04:08:26.893 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-05-09 04:08:28.291  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-05-09 04:08:29.094  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-05-09 04:08:44.483  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 41.391 seconds (JVM running for 49.548) 2021-05-09 04:18:28.990  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-09 04:18:29.000 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-09 04:18:29.185 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-09 04:18:29.190 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-09 04:18:29.288  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-09 04:18:29.291  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-09 04:18:29.296  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-09 04:18:29.296  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-09 04:18:29.297  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-09 04:18:29.383  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-09 04:18:29.389  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-09 04:18:29.592  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-09 04:18:29.598  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-09 04:18:29.599  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-09 04:18:29.695  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-09 04:18:31.125  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-09 04:18:31.128  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-09 04:18:31.129 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-09 04:18:31.135 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-09 04:18:31.136  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1150 2021-05-09 04:18:31.136  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-09 04:18:31.139  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-09 04:18:31.140  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-09 04:18:31.187  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-09 04:18:31.188  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-09 04:18:31.190 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-09 04:18:31.190 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-09 04:18:31.191 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-09 04:18:31.284 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-09 04:18:31.284 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-09 04:18:31.285 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-09 04:18:31.290 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-09 04:18:31.492 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 217200796859969864475724525228495586588717817153 IssuerDN: UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 09 04:04:28 UTC 2021 Final Date: Fri May 09 04:04:28 UTC 2031 SubjectDN: UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fb:ea:0d:fb:39:a2:1f:88:79:7e:ca:b0:6b:3a:51:75:5a:49:ad:28] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2dc0cff13acdaf4bf3e507f092d765b76594e64c 146d936df9a4f5becf3787af129f5bfa1b8bdf95 0aa4f845378a450e1121ab07d44afe019be5e3e4 c3f668d6f730039ff9bd9435eb58ff9747208e4a 7e80de7540d55dbd3de2820da8838ad97ea8932a 6a709b35dc3b0e99a68df6ffb3c29f9106f74cc8 f4acb39edfe12d833f7033b254af854cf2af7f50 1eaed8f032bda6b409732736818109a9ed318972 5b1edcf838955adaeae2928a68ba64d46e094e1d 3953ae73c2b3815c0af44415db406facc996b303 18a72592e50b099dba4585f58271d6eff3ca7f06 2494b72b1c5e1ccc59a256b8c566caac0c3bca14 ff8aa1a3457f7d1cbd6c705ac450c82bb139bd33 5aba8315ef2294124cdd87a35d2e4a4f937abf26 604a181ebb676f578a8d07baefde57e7666b4483 8c79337edaf26d87daecab07791604b57f67ab92 df94b247ff5c7ad7bfc4fc31fd4b932f73e9041e 55348c7350b2fcf0163a07f1e5fb4991dade8c0e ef9194611a38e443c4853a328119dcbaa7641cb6 a99c2fb0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a5:c1:5c:1b:77:6b:59:8b:9f:83:96:a6:c5:2e:97:39:84:c6:3f:04] modulus: 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 public exponent: 10001 ] 2021-05-09 05:28:48.292  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-09 05:28:48.295 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-09 05:28:48.296 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-09 05:28:48.379 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-09 05:28:48.380  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-09 05:28:48.381  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-09 05:28:48.382  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-09 05:28:48.384  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-09 05:28:48.384  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-09 05:28:48.392  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-09 05:28:48.479  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-09 05:28:48.480  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-09 05:28:48.485  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-09 05:28:48.814  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-09 05:28:48.815  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-09 05:28:48.816 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-09 05:28:48.879 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-09 05:28:48.881  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1150 2021-05-09 05:28:48.882  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-09 05:28:48.887  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-09 05:28:48.888  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-09 05:28:48.889  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-09 05:28:48.890  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-09 05:28:48.891 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-09 05:28:48.892 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-09 05:28:48.892 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-09 05:28:48.894 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-09 05:28:48.894 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-09 05:28:48.894 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-09 05:28:48.895 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-09 05:28:48.982 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 217200796859969864475724525228495586588717817153 IssuerDN: UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 09 04:04:28 UTC 2021 Final Date: Fri May 09 04:04:28 UTC 2031 SubjectDN: UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fb:ea:0d:fb:39:a2:1f:88:79:7e:ca:b0:6b:3a:51:75:5a:49:ad:28] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2dc0cff13acdaf4bf3e507f092d765b76594e64c 146d936df9a4f5becf3787af129f5bfa1b8bdf95 0aa4f845378a450e1121ab07d44afe019be5e3e4 c3f668d6f730039ff9bd9435eb58ff9747208e4a 7e80de7540d55dbd3de2820da8838ad97ea8932a 6a709b35dc3b0e99a68df6ffb3c29f9106f74cc8 f4acb39edfe12d833f7033b254af854cf2af7f50 1eaed8f032bda6b409732736818109a9ed318972 5b1edcf838955adaeae2928a68ba64d46e094e1d 3953ae73c2b3815c0af44415db406facc996b303 18a72592e50b099dba4585f58271d6eff3ca7f06 2494b72b1c5e1ccc59a256b8c566caac0c3bca14 ff8aa1a3457f7d1cbd6c705ac450c82bb139bd33 5aba8315ef2294124cdd87a35d2e4a4f937abf26 604a181ebb676f578a8d07baefde57e7666b4483 8c79337edaf26d87daecab07791604b57f67ab92 df94b247ff5c7ad7bfc4fc31fd4b932f73e9041e 55348c7350b2fcf0163a07f1e5fb4991dade8c0e ef9194611a38e443c4853a328119dcbaa7641cb6 a99c2fb0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [18:c3:11:ca:88:0b:5f:ce:5c:db:d0:cb:02:2f:2a:3d:0d:07:96:1c] modulus: 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 public exponent: 10001 ] 2021-05-09 05:30:34.428  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-09 05:30:34.429 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-09 05:30:34.430 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-05-09 05:30:34.431 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-09 05:30:34.432  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-05-09 05:30:34.432  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-09 05:30:34.433  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-09 05:30:34.433  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-09 05:30:34.434  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-09 05:30:34.484  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-09 05:30:34.485  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-09 05:30:34.486  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-09 05:30:34.489  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-09 05:30:34.612  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-09 05:30:34.613  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-09 05:30:34.613 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-09 05:30:34.680 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-09 05:30:34.681  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1150 2021-05-09 05:30:34.682  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-09 05:30:34.684  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-09 05:30:34.686  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-09 05:30:34.686  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-09 05:30:34.687  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-09 05:30:34.687 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-09 05:30:34.688 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-09 05:30:34.688 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-09 05:30:34.689 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-09 05:30:34.689 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-09 05:30:34.689 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-09 05:30:34.691 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-09 05:30:34.694 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 217200796859969864475724525228495586588717817153 IssuerDN: UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 09 04:04:28 UTC 2021 Final Date: Fri May 09 04:04:28 UTC 2031 SubjectDN: UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fb:ea:0d:fb:39:a2:1f:88:79:7e:ca:b0:6b:3a:51:75:5a:49:ad:28] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2dc0cff13acdaf4bf3e507f092d765b76594e64c 146d936df9a4f5becf3787af129f5bfa1b8bdf95 0aa4f845378a450e1121ab07d44afe019be5e3e4 c3f668d6f730039ff9bd9435eb58ff9747208e4a 7e80de7540d55dbd3de2820da8838ad97ea8932a 6a709b35dc3b0e99a68df6ffb3c29f9106f74cc8 f4acb39edfe12d833f7033b254af854cf2af7f50 1eaed8f032bda6b409732736818109a9ed318972 5b1edcf838955adaeae2928a68ba64d46e094e1d 3953ae73c2b3815c0af44415db406facc996b303 18a72592e50b099dba4585f58271d6eff3ca7f06 2494b72b1c5e1ccc59a256b8c566caac0c3bca14 ff8aa1a3457f7d1cbd6c705ac450c82bb139bd33 5aba8315ef2294124cdd87a35d2e4a4f937abf26 604a181ebb676f578a8d07baefde57e7666b4483 8c79337edaf26d87daecab07791604b57f67ab92 df94b247ff5c7ad7bfc4fc31fd4b932f73e9041e 55348c7350b2fcf0163a07f1e5fb4991dade8c0e ef9194611a38e443c4853a328119dcbaa7641cb6 a99c2fb0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [51:7a:b2:cf:fe:2a:a0:16:ea:bf:0c:f1:95:d8:d5:5d:0d:60:6d:6b] modulus: ba148a50058d35912785bc16dcc04ff905c7c3a6200b5a1420d43b54f54a3a1099ca7074da5f3dc6eef296f26f9232a1a0b37d299a839750b15d4e030b742abd0bac66692e049ecf6d848cc9e6a19af0eaba3f540d64d1757e00eb9f2bbf7ca8e7c9eb782354421066e2ef96a59ef4bc3e6de6cc9f217bc9044e53a14487b48410bbb32eae9f94df2d21d6081b73e309b86c96ddc872de25850785954600988401baed8f5cfa21ac3879cbeff6b3fff47cd610177cdf5b1236c12c04e2771e28aa6d70ced9f9fc9540a341cecb2acd80bdbabd963c0456c8776f82cdd65b268ec3aa87189d03e5c29a1174e6b728380a56025e914dec2ca58df0026d3e4e17eb public exponent: 10001 ] 2021-05-09 05:33:09.981  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-09 05:33:09.982 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-09 05:33:09.983 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-09 05:33:09.984 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-09 05:33:09.985  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-09 05:33:09.985  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-09 05:33:09.986  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-09 05:33:09.986  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-09 05:33:09.987  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-09 05:33:09.994  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-09 05:33:09.995  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-09 05:33:09.995  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-09 05:33:09.996  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-09 05:33:10.112  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-09 05:33:10.113  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-09 05:33:10.114 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-09 05:33:10.118 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-09 05:33:10.179  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1150 2021-05-09 05:33:10.180  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-09 05:33:10.183  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-09 05:33:10.184  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-09 05:33:10.184  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-09 05:33:10.185  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-09 05:33:10.186 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-09 05:33:10.186 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-09 05:33:10.186 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-09 05:33:10.187 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-09 05:33:10.187 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-09 05:33:10.188 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-09 05:33:10.189 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-09 05:33:10.192 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 217200796859969864475724525228495586588717817153 IssuerDN: UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 09 04:04:28 UTC 2021 Final Date: Fri May 09 04:04:28 UTC 2031 SubjectDN: UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fb:ea:0d:fb:39:a2:1f:88:79:7e:ca:b0:6b:3a:51:75:5a:49:ad:28] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2dc0cff13acdaf4bf3e507f092d765b76594e64c 146d936df9a4f5becf3787af129f5bfa1b8bdf95 0aa4f845378a450e1121ab07d44afe019be5e3e4 c3f668d6f730039ff9bd9435eb58ff9747208e4a 7e80de7540d55dbd3de2820da8838ad97ea8932a 6a709b35dc3b0e99a68df6ffb3c29f9106f74cc8 f4acb39edfe12d833f7033b254af854cf2af7f50 1eaed8f032bda6b409732736818109a9ed318972 5b1edcf838955adaeae2928a68ba64d46e094e1d 3953ae73c2b3815c0af44415db406facc996b303 18a72592e50b099dba4585f58271d6eff3ca7f06 2494b72b1c5e1ccc59a256b8c566caac0c3bca14 ff8aa1a3457f7d1cbd6c705ac450c82bb139bd33 5aba8315ef2294124cdd87a35d2e4a4f937abf26 604a181ebb676f578a8d07baefde57e7666b4483 8c79337edaf26d87daecab07791604b57f67ab92 df94b247ff5c7ad7bfc4fc31fd4b932f73e9041e 55348c7350b2fcf0163a07f1e5fb4991dade8c0e ef9194611a38e443c4853a328119dcbaa7641cb6 a99c2fb0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [89:46:33:54:e9:ca:60:b2:fa:71:24:52:2a:00:4e:22:2e:8f:cc:b1] modulus: 8ac411479622b519694bca8e867581696068806e89297aab51065669026a05b835378f9c7443aead2c107e3bae21206b9873576123950ffdd2590a7b02e94ee6b0165618ed4c5e614252f74eefcb6c76c18d166c29e76e6ffa18ff2d07424beaa2fcd931d712ea7713dcdf1ca5acfc2212ee518a2b9e4ade39c1ed6b31809a6e252d9ee552024dd0638cad79d8e1c85172e0d6e04945fda5db939e9cc49103e59385755c1c0a90f48babda1ec7386add93acf897f3ccf73866551f487202309f0f6ee365d6ca3d31ed4976e55f92d3d818e8444db11c82714264277a8b4a5b67622efc8ade6e966943f705805c267cbb4e7d41997ca81e3203a1413ea9f33cd1 public exponent: 10001 ] 2021-05-09 05:33:23.091  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-09 05:33:23.094 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-09 05:33:23.095 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-09 05:33:23.096 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-09 05:33:23.096  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-09 05:33:23.097  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-09 05:33:23.098  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-09 05:33:23.098  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-09 05:33:23.098  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-09 05:33:23.106  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-09 05:33:23.107  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-09 05:33:23.107  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-09 05:33:23.108  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-09 05:33:23.295  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-09 05:33:23.296  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-09 05:33:23.296 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-09 05:33:23.298 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-09 05:33:23.299  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1150 2021-05-09 05:33:23.299  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-09 05:33:23.301  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-09 05:33:23.302  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-09 05:33:23.303  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-09 05:33:23.303  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-09 05:33:23.304 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-09 05:33:23.304 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-09 05:33:23.305 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-09 05:33:23.306 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-09 05:33:23.306 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-09 05:33:23.306 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-09 05:33:23.307 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-09 05:33:23.380 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 217200796859969864475724525228495586588717817153 IssuerDN: UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 09 04:04:28 UTC 2021 Final Date: Fri May 09 04:04:28 UTC 2031 SubjectDN: UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fb:ea:0d:fb:39:a2:1f:88:79:7e:ca:b0:6b:3a:51:75:5a:49:ad:28] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2dc0cff13acdaf4bf3e507f092d765b76594e64c 146d936df9a4f5becf3787af129f5bfa1b8bdf95 0aa4f845378a450e1121ab07d44afe019be5e3e4 c3f668d6f730039ff9bd9435eb58ff9747208e4a 7e80de7540d55dbd3de2820da8838ad97ea8932a 6a709b35dc3b0e99a68df6ffb3c29f9106f74cc8 f4acb39edfe12d833f7033b254af854cf2af7f50 1eaed8f032bda6b409732736818109a9ed318972 5b1edcf838955adaeae2928a68ba64d46e094e1d 3953ae73c2b3815c0af44415db406facc996b303 18a72592e50b099dba4585f58271d6eff3ca7f06 2494b72b1c5e1ccc59a256b8c566caac0c3bca14 ff8aa1a3457f7d1cbd6c705ac450c82bb139bd33 5aba8315ef2294124cdd87a35d2e4a4f937abf26 604a181ebb676f578a8d07baefde57e7666b4483 8c79337edaf26d87daecab07791604b57f67ab92 df94b247ff5c7ad7bfc4fc31fd4b932f73e9041e 55348c7350b2fcf0163a07f1e5fb4991dade8c0e ef9194611a38e443c4853a328119dcbaa7641cb6 a99c2fb0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0a:87:f5:cc:a6:43:b1:8c:e7:ba:fd:1b:8c:f7:d4:c2:da:7e:24:75] modulus: 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 public exponent: 10001 ] 2021-05-09 05:33:41.227  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-09 05:33:41.228 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-09 05:33:41.229 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-05-09 05:33:41.230 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-09 05:33:41.230  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-05-09 05:33:41.231  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-09 05:33:41.231  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-09 05:33:41.231  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-09 05:33:41.232  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-09 05:33:41.288  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-09 05:33:41.289  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-09 05:33:41.290  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-09 05:33:41.291  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-09 05:33:41.378  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-09 05:33:41.379  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-09 05:33:41.379 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-09 05:33:41.381 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-09 05:33:41.382  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1150 2021-05-09 05:33:41.383  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-09 05:33:41.384  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-09 05:33:41.384  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-09 05:33:41.384  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-09 05:33:41.385  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-09 05:33:41.385 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-09 05:33:41.385 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-09 05:33:41.385 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-09 05:33:41.386 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-09 05:33:41.386 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-09 05:33:41.386 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-09 05:33:41.387 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-09 05:33:41.390 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 217200796859969864475724525228495586588717817153 IssuerDN: UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 09 04:04:28 UTC 2021 Final Date: Fri May 09 04:04:28 UTC 2031 SubjectDN: UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fb:ea:0d:fb:39:a2:1f:88:79:7e:ca:b0:6b:3a:51:75:5a:49:ad:28] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2dc0cff13acdaf4bf3e507f092d765b76594e64c 146d936df9a4f5becf3787af129f5bfa1b8bdf95 0aa4f845378a450e1121ab07d44afe019be5e3e4 c3f668d6f730039ff9bd9435eb58ff9747208e4a 7e80de7540d55dbd3de2820da8838ad97ea8932a 6a709b35dc3b0e99a68df6ffb3c29f9106f74cc8 f4acb39edfe12d833f7033b254af854cf2af7f50 1eaed8f032bda6b409732736818109a9ed318972 5b1edcf838955adaeae2928a68ba64d46e094e1d 3953ae73c2b3815c0af44415db406facc996b303 18a72592e50b099dba4585f58271d6eff3ca7f06 2494b72b1c5e1ccc59a256b8c566caac0c3bca14 ff8aa1a3457f7d1cbd6c705ac450c82bb139bd33 5aba8315ef2294124cdd87a35d2e4a4f937abf26 604a181ebb676f578a8d07baefde57e7666b4483 8c79337edaf26d87daecab07791604b57f67ab92 df94b247ff5c7ad7bfc4fc31fd4b932f73e9041e 55348c7350b2fcf0163a07f1e5fb4991dade8c0e ef9194611a38e443c4853a328119dcbaa7641cb6 a99c2fb0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [44:17:22:81:8c:10:66:5f:05:53:9b:f3:d4:4e:dc:2f:2f:37:0e:9d] modulus: 8f0e64942a02de82ea5f3800c9023241f6c92c5bf1958019889f278fde44325ac7f74eccf9ba28708074744c2999572d81a3c8fde734adabb4d2442e02ec191c9b5f94221194ce914b54dd28d16326ed6aeaa6b0bd285a8a117bfdb93be1875a96ead1204ac3d1aef6f28926b756bf3521ad20c4b3cb32d70c0a032137f0dff4954e4251a2611ce3b711df7090f9b0489b0a5862e047a1ac0a0bc1ca3979877244d2c2ee035c8b1004e784490f7b31b30fa0c131b29f71a3292816d329efd81c73b72236860f60f6027f81e87ffadc03e2b6cb293d7b266e90281606a9d5096b7e8b55160a8aed07bf61ae9d6ade5f2a9d8c900d8a37d39614a87ca450854f2b public exponent: 10001 ] 2021-05-09 05:34:19.509  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-09 05:34:19.510 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-09 05:34:19.511 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-05-09 05:34:19.511 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-09 05:34:19.512  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-05-09 05:34:19.512  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-09 05:34:19.513  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-09 05:34:19.513  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-09 05:34:19.513  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-09 05:34:19.519  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-09 05:34:19.519  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-09 05:34:19.520  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-09 05:34:19.521  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-09 05:34:19.677  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-09 05:34:19.678  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-09 05:34:19.678 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-09 05:34:19.680 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-09 05:34:19.681  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1150 2021-05-09 05:34:19.681  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-09 05:34:19.683  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-09 05:34:19.684  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-09 05:34:19.684  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-09 05:34:19.684  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-09 05:34:19.685 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-09 05:34:19.685 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-09 05:34:19.685 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-09 05:34:19.686 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-09 05:34:19.687 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-09 05:34:19.687 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-09 05:34:19.688 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-09 05:34:19.691 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 217200796859969864475724525228495586588717817153 IssuerDN: UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 09 04:04:28 UTC 2021 Final Date: Fri May 09 04:04:28 UTC 2031 SubjectDN: UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fb:ea:0d:fb:39:a2:1f:88:79:7e:ca:b0:6b:3a:51:75:5a:49:ad:28] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2dc0cff13acdaf4bf3e507f092d765b76594e64c 146d936df9a4f5becf3787af129f5bfa1b8bdf95 0aa4f845378a450e1121ab07d44afe019be5e3e4 c3f668d6f730039ff9bd9435eb58ff9747208e4a 7e80de7540d55dbd3de2820da8838ad97ea8932a 6a709b35dc3b0e99a68df6ffb3c29f9106f74cc8 f4acb39edfe12d833f7033b254af854cf2af7f50 1eaed8f032bda6b409732736818109a9ed318972 5b1edcf838955adaeae2928a68ba64d46e094e1d 3953ae73c2b3815c0af44415db406facc996b303 18a72592e50b099dba4585f58271d6eff3ca7f06 2494b72b1c5e1ccc59a256b8c566caac0c3bca14 ff8aa1a3457f7d1cbd6c705ac450c82bb139bd33 5aba8315ef2294124cdd87a35d2e4a4f937abf26 604a181ebb676f578a8d07baefde57e7666b4483 8c79337edaf26d87daecab07791604b57f67ab92 df94b247ff5c7ad7bfc4fc31fd4b932f73e9041e 55348c7350b2fcf0163a07f1e5fb4991dade8c0e ef9194611a38e443c4853a328119dcbaa7641cb6 a99c2fb0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [08:f0:77:fc:4c:fc:a9:92:ab:0c:aa:ed:69:aa:97:00:11:2c:a2:13] modulus: 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 public exponent: 10001 ] 2021-05-09 05:35:00.563  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-09 05:35:00.564 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-09 05:35:00.565 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-05-09 05:35:00.566 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-09 05:35:00.567  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-05-09 05:35:00.567  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-09 05:35:00.568  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-09 05:35:00.568  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-09 05:35:00.569  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-09 05:35:00.573  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-09 05:35:00.574  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-09 05:35:00.574  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-09 05:35:00.575  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-09 05:35:00.716  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-09 05:35:00.717  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-09 05:35:00.717 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-09 05:35:00.718 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-09 05:35:00.719  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1150 2021-05-09 05:35:00.719  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-09 05:35:00.721  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-09 05:35:00.721  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-09 05:35:00.722  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-09 05:35:00.722  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-09 05:35:00.722 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-09 05:35:00.723 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-09 05:35:00.723 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-09 05:35:00.723 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-09 05:35:00.724 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-09 05:35:00.724 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-09 05:35:00.725 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-09 05:35:00.728 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 217200796859969864475724525228495586588717817153 IssuerDN: UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 09 04:04:28 UTC 2021 Final Date: Fri May 09 04:04:28 UTC 2031 SubjectDN: UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fb:ea:0d:fb:39:a2:1f:88:79:7e:ca:b0:6b:3a:51:75:5a:49:ad:28] modulus: 9a72447166de4cd45da7eb037bfb1575021fa078be1d36c6dad8463335e146e2f3be2663f36eaba9b86b6c395b09e088b3d7119f38342289447b3844557e93d0612570fc55e5beaaad6a1d21abde06ba0a5d2e8d813d0b7445aa7a0410ad571bf70c91e1559eb77d818d5c9c2bac42d61de2c7646f90f06bfeae5550b228184fa17a46713e53d557dced9dc856c6922b0e0ff576bba32e1ef578280741eedc30f036a4aed05d34f503a97291523d7ac2ea347bb0d80aff5721849cdb9c175303377e52b967e175243791e4fb05ce7cdd1adb932f6c48b453f85fb242b1fdc0f32ccdc15fa9658f234ed319642f3bf2d0a3ec27c4485bf3046cac8180f2f7741858653b0a6916d2a15dcec619476b7c5211bf43c33cf98eb69bdaa29c95319ea4ee7eada8fcfef3c9991866556ce8cf346cb1031e1848b9b415d3b33c0b3a0603da1c6c6e4842a2f3afedbf69cc3c80954f772a017187678d2c164380284045eb2e7f43b3fc61aa92eb7116b60c8cc3cc4fb57aecfc08930e439034600d005b55 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2dc0cff13acdaf4bf3e507f092d765b76594e64c 146d936df9a4f5becf3787af129f5bfa1b8bdf95 0aa4f845378a450e1121ab07d44afe019be5e3e4 c3f668d6f730039ff9bd9435eb58ff9747208e4a 7e80de7540d55dbd3de2820da8838ad97ea8932a 6a709b35dc3b0e99a68df6ffb3c29f9106f74cc8 f4acb39edfe12d833f7033b254af854cf2af7f50 1eaed8f032bda6b409732736818109a9ed318972 5b1edcf838955adaeae2928a68ba64d46e094e1d 3953ae73c2b3815c0af44415db406facc996b303 18a72592e50b099dba4585f58271d6eff3ca7f06 2494b72b1c5e1ccc59a256b8c566caac0c3bca14 ff8aa1a3457f7d1cbd6c705ac450c82bb139bd33 5aba8315ef2294124cdd87a35d2e4a4f937abf26 604a181ebb676f578a8d07baefde57e7666b4483 8c79337edaf26d87daecab07791604b57f67ab92 df94b247ff5c7ad7bfc4fc31fd4b932f73e9041e 55348c7350b2fcf0163a07f1e5fb4991dade8c0e ef9194611a38e443c4853a328119dcbaa7641cb6 a99c2fb0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c0:58:1c:7b:20:a2:28:0f:5e:0a:6b:ac:11:e2:a2:c8:0a:da:56:0a] modulus: 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 public exponent: 10001 ] 2021-05-09 05:36:20.673  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-09 05:36:20.675 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-09 05:36:20.676 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-05-09 05:36:20.677 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-09 05:36:20.677  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-05-09 05:36:20.678  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-09 05:36:20.678  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-09 05:36:20.678  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-09 05:36:20.679  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-09 05:36:20.686  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-09 05:36:20.687  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-09 05:36:20.687  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-09 05:36:20.688  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-09 05:36:20.798  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-09 05:36:20.799  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-09 05:36:20.799 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-09 05:36:20.801 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-09 05:36:20.801  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1150 2021-05-09 05:36:20.801  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-09 05:36:20.803  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-09 05:36:20.803  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-09 05:36:20.803  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-09 05:36:20.804  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-09 05:36:20.804 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-09 05:36:20.804 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-09 05:36:20.804 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-09 05:36:20.805 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-09 05:36:20.805 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-09 05:36:20.805 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-09 05:36:20.806 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-09 05:36:20.808 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 217200796859969864475724525228495586588717817153 IssuerDN: UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 09 04:04:28 UTC 2021 Final Date: Fri May 09 04:04:28 UTC 2031 SubjectDN: UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fb:ea:0d:fb:39:a2:1f:88:79:7e:ca:b0:6b:3a:51:75:5a:49:ad:28] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2dc0cff13acdaf4bf3e507f092d765b76594e64c 146d936df9a4f5becf3787af129f5bfa1b8bdf95 0aa4f845378a450e1121ab07d44afe019be5e3e4 c3f668d6f730039ff9bd9435eb58ff9747208e4a 7e80de7540d55dbd3de2820da8838ad97ea8932a 6a709b35dc3b0e99a68df6ffb3c29f9106f74cc8 f4acb39edfe12d833f7033b254af854cf2af7f50 1eaed8f032bda6b409732736818109a9ed318972 5b1edcf838955adaeae2928a68ba64d46e094e1d 3953ae73c2b3815c0af44415db406facc996b303 18a72592e50b099dba4585f58271d6eff3ca7f06 2494b72b1c5e1ccc59a256b8c566caac0c3bca14 ff8aa1a3457f7d1cbd6c705ac450c82bb139bd33 5aba8315ef2294124cdd87a35d2e4a4f937abf26 604a181ebb676f578a8d07baefde57e7666b4483 8c79337edaf26d87daecab07791604b57f67ab92 df94b247ff5c7ad7bfc4fc31fd4b932f73e9041e 55348c7350b2fcf0163a07f1e5fb4991dade8c0e ef9194611a38e443c4853a328119dcbaa7641cb6 a99c2fb0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [05:e7:67:43:4b:92:1d:2f:a9:79:3c:ba:8b:2f:54:f3:52:e1:ef:36] modulus: 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 public exponent: 10001 ] 2021-05-09 05:38:31.318  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-09 05:38:31.319 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-09 05:38:31.320 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-09 05:38:31.320 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-09 05:38:31.320  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-09 05:38:31.321  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-09 05:38:31.321  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-09 05:38:31.321  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-09 05:38:31.322  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-09 05:38:31.326  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-09 05:38:31.327  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-09 05:38:31.328  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-09 05:38:31.329  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-09 05:38:31.431  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-09 05:38:31.432  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-09 05:38:31.433 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-09 05:38:31.435 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-09 05:38:31.435  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1150 2021-05-09 05:38:31.436  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-09 05:38:31.437  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-09 05:38:31.437  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-09 05:38:31.438  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-09 05:38:31.438  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-09 05:38:31.438 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-09 05:38:31.438 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-09 05:38:31.439 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-09 05:38:31.439 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-09 05:38:31.440 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-09 05:38:31.440 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-09 05:38:31.441 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-09 05:38:31.448 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 217200796859969864475724525228495586588717817153 IssuerDN: UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 09 04:04:28 UTC 2021 Final Date: Fri May 09 04:04:28 UTC 2031 SubjectDN: UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fb:ea:0d:fb:39:a2:1f:88:79:7e:ca:b0:6b:3a:51:75:5a:49:ad:28] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2dc0cff13acdaf4bf3e507f092d765b76594e64c 146d936df9a4f5becf3787af129f5bfa1b8bdf95 0aa4f845378a450e1121ab07d44afe019be5e3e4 c3f668d6f730039ff9bd9435eb58ff9747208e4a 7e80de7540d55dbd3de2820da8838ad97ea8932a 6a709b35dc3b0e99a68df6ffb3c29f9106f74cc8 f4acb39edfe12d833f7033b254af854cf2af7f50 1eaed8f032bda6b409732736818109a9ed318972 5b1edcf838955adaeae2928a68ba64d46e094e1d 3953ae73c2b3815c0af44415db406facc996b303 18a72592e50b099dba4585f58271d6eff3ca7f06 2494b72b1c5e1ccc59a256b8c566caac0c3bca14 ff8aa1a3457f7d1cbd6c705ac450c82bb139bd33 5aba8315ef2294124cdd87a35d2e4a4f937abf26 604a181ebb676f578a8d07baefde57e7666b4483 8c79337edaf26d87daecab07791604b57f67ab92 df94b247ff5c7ad7bfc4fc31fd4b932f73e9041e 55348c7350b2fcf0163a07f1e5fb4991dade8c0e ef9194611a38e443c4853a328119dcbaa7641cb6 a99c2fb0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [85:09:88:77:cb:95:db:6d:4e:53:57:c3:00:f7:df:1b:38:8e:55:8c] modulus: 8a0fa54a9217847cfebb44f84ce2a62a11fb2a68cb69f1fa273a25dd6babbae6b5a0fa53997101ab1b469da8e9e9f696df40597bb52e0104f3beae3f71867303311b27b743ea76a1c0285a93263409903c311720eab72fa98c7311eff4b2d6b0aee2c7ac9d4a380ae37b1e77435eac99bca7bd87af499dffccb71cc7f27b7d77e2967b369e5a1f4b6b641f3b79c755927bc0970d01c1dcb2bcf51d025e99b83e039d8c9a6979e259d986ceec88b3d1e9ac1179d33688d561f0c1617414372fbc23d2a6c444ec09910c842d6823e8527caa2d30d88040448703bd39741fb1d00c1d8ce123f04704a63f685a48e277fdc13b92ef253f0295741c8391ac6b081369 public exponent: 10001 ] 2021-05-09 05:41:16.830  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-09 05:41:16.831 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-09 05:41:16.832 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-09 05:41:16.833 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-09 05:41:16.833  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-09 05:41:16.834  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-09 05:41:16.834  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-09 05:41:16.835  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-09 05:41:16.835  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-09 05:41:16.842  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-09 05:41:16.843  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-09 05:41:16.843  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-09 05:41:16.844  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-09 05:41:17.028  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-09 05:41:17.029  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-09 05:41:17.029 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-09 05:41:17.030 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-09 05:41:17.030  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1150 2021-05-09 05:41:17.031  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-09 05:41:17.032  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-09 05:41:17.032  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-09 05:41:17.032  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-09 05:41:17.033  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-09 05:41:17.033 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-09 05:41:17.033 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-09 05:41:17.033 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-09 05:41:17.034 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-09 05:41:17.034 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-09 05:41:17.034 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-09 05:41:17.035 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-09 05:41:17.037 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 217200796859969864475724525228495586588717817153 IssuerDN: UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 09 04:04:28 UTC 2021 Final Date: Fri May 09 04:04:28 UTC 2031 SubjectDN: UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fb:ea:0d:fb:39:a2:1f:88:79:7e:ca:b0:6b:3a:51:75:5a:49:ad:28] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2dc0cff13acdaf4bf3e507f092d765b76594e64c 146d936df9a4f5becf3787af129f5bfa1b8bdf95 0aa4f845378a450e1121ab07d44afe019be5e3e4 c3f668d6f730039ff9bd9435eb58ff9747208e4a 7e80de7540d55dbd3de2820da8838ad97ea8932a 6a709b35dc3b0e99a68df6ffb3c29f9106f74cc8 f4acb39edfe12d833f7033b254af854cf2af7f50 1eaed8f032bda6b409732736818109a9ed318972 5b1edcf838955adaeae2928a68ba64d46e094e1d 3953ae73c2b3815c0af44415db406facc996b303 18a72592e50b099dba4585f58271d6eff3ca7f06 2494b72b1c5e1ccc59a256b8c566caac0c3bca14 ff8aa1a3457f7d1cbd6c705ac450c82bb139bd33 5aba8315ef2294124cdd87a35d2e4a4f937abf26 604a181ebb676f578a8d07baefde57e7666b4483 8c79337edaf26d87daecab07791604b57f67ab92 df94b247ff5c7ad7bfc4fc31fd4b932f73e9041e 55348c7350b2fcf0163a07f1e5fb4991dade8c0e ef9194611a38e443c4853a328119dcbaa7641cb6 a99c2fb0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f0:d4:d6:73:6c:4f:5f:17:ca:46:b2:4a:97:2e:46:ce:36:48:8d:bf] modulus: 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 public exponent: 10001 ] 2021-05-09 05:43:41.885  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-09 05:43:41.886 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-09 05:43:41.894 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-09 05:43:41.894 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-09 05:43:41.895  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-09 05:43:41.895  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-09 05:43:41.895  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-09 05:43:41.895  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-09 05:43:41.896  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-09 05:43:41.983  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-09 05:43:41.984  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-09 05:43:41.984  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-09 05:43:41.986  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-09 05:43:42.155  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-09 05:43:42.155  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-09 05:43:42.156 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-09 05:43:42.158 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-09 05:43:42.159  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1150 2021-05-09 05:43:42.159  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-09 05:43:42.161  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-09 05:43:42.161  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-09 05:43:42.161  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-09 05:43:42.161  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-09 05:43:42.162 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-09 05:43:42.162 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-09 05:43:42.162 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-09 05:43:42.162 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-09 05:43:42.163 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-09 05:43:42.163 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-09 05:43:42.163 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-09 05:43:42.178 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 217200796859969864475724525228495586588717817153 IssuerDN: UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 09 04:04:28 UTC 2021 Final Date: Fri May 09 04:04:28 UTC 2031 SubjectDN: UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fb:ea:0d:fb:39:a2:1f:88:79:7e:ca:b0:6b:3a:51:75:5a:49:ad:28] modulus: 9a72447166de4cd45da7eb037bfb1575021fa078be1d36c6dad8463335e146e2f3be2663f36eaba9b86b6c395b09e088b3d7119f38342289447b3844557e93d0612570fc55e5beaaad6a1d21abde06ba0a5d2e8d813d0b7445aa7a0410ad571bf70c91e1559eb77d818d5c9c2bac42d61de2c7646f90f06bfeae5550b228184fa17a46713e53d557dced9dc856c6922b0e0ff576bba32e1ef578280741eedc30f036a4aed05d34f503a97291523d7ac2ea347bb0d80aff5721849cdb9c175303377e52b967e175243791e4fb05ce7cdd1adb932f6c48b453f85fb242b1fdc0f32ccdc15fa9658f234ed319642f3bf2d0a3ec27c4485bf3046cac8180f2f7741858653b0a6916d2a15dcec619476b7c5211bf43c33cf98eb69bdaa29c95319ea4ee7eada8fcfef3c9991866556ce8cf346cb1031e1848b9b415d3b33c0b3a0603da1c6c6e4842a2f3afedbf69cc3c80954f772a017187678d2c164380284045eb2e7f43b3fc61aa92eb7116b60c8cc3cc4fb57aecfc08930e439034600d005b55 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2dc0cff13acdaf4bf3e507f092d765b76594e64c 146d936df9a4f5becf3787af129f5bfa1b8bdf95 0aa4f845378a450e1121ab07d44afe019be5e3e4 c3f668d6f730039ff9bd9435eb58ff9747208e4a 7e80de7540d55dbd3de2820da8838ad97ea8932a 6a709b35dc3b0e99a68df6ffb3c29f9106f74cc8 f4acb39edfe12d833f7033b254af854cf2af7f50 1eaed8f032bda6b409732736818109a9ed318972 5b1edcf838955adaeae2928a68ba64d46e094e1d 3953ae73c2b3815c0af44415db406facc996b303 18a72592e50b099dba4585f58271d6eff3ca7f06 2494b72b1c5e1ccc59a256b8c566caac0c3bca14 ff8aa1a3457f7d1cbd6c705ac450c82bb139bd33 5aba8315ef2294124cdd87a35d2e4a4f937abf26 604a181ebb676f578a8d07baefde57e7666b4483 8c79337edaf26d87daecab07791604b57f67ab92 df94b247ff5c7ad7bfc4fc31fd4b932f73e9041e 55348c7350b2fcf0163a07f1e5fb4991dade8c0e ef9194611a38e443c4853a328119dcbaa7641cb6 a99c2fb0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [36:1a:49:bb:0d:ca:a4:38:8c:57:f0:dc:62:c3:4f:5a:86:e3:2e:59] modulus: 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 public exponent: 10001 ] 2021-05-09 05:45:09.538  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-09 05:45:09.540 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-09 05:45:09.541 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-09 05:45:09.541 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-09 05:45:09.542  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-09 05:45:09.542  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-09 05:45:09.542  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-09 05:45:09.542  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-09 05:45:09.543  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-09 05:45:09.547  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-09 05:45:09.547  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-09 05:45:09.548  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-09 05:45:09.549  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-09 05:45:09.657  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-09 05:45:09.658  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-09 05:45:09.659 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-09 05:45:09.661 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-09 05:45:09.662  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1150 2021-05-09 05:45:09.662  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-09 05:45:09.664  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-09 05:45:09.665  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-09 05:45:09.665  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-09 05:45:09.665  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-09 05:45:09.666 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-09 05:45:09.666 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-09 05:45:09.666 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-09 05:45:09.666 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-09 05:45:09.667 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-09 05:45:09.667 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-09 05:45:09.667 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-09 05:45:09.670 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 217200796859969864475724525228495586588717817153 IssuerDN: UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 09 04:04:28 UTC 2021 Final Date: Fri May 09 04:04:28 UTC 2031 SubjectDN: UID=c-02156764e3c54*/3e,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fb:ea:0d:fb:39:a2:1f:88:79:7e:ca:b0:6b:3a:51:75:5a:49:ad:28] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2dc0cff13acdaf4bf3e507f092d765b76594e64c 146d936df9a4f5becf3787af129f5bfa1b8bdf95 0aa4f845378a450e1121ab07d44afe019be5e3e4 c3f668d6f730039ff9bd9435eb58ff9747208e4a 7e80de7540d55dbd3de2820da8838ad97ea8932a 6a709b35dc3b0e99a68df6ffb3c29f9106f74cc8 f4acb39edfe12d833f7033b254af854cf2af7f50 1eaed8f032bda6b409732736818109a9ed318972 5b1edcf838955adaeae2928a68ba64d46e094e1d 3953ae73c2b3815c0af44415db406facc996b303 18a72592e50b099dba4585f58271d6eff3ca7f06 2494b72b1c5e1ccc59a256b8c566caac0c3bca14 ff8aa1a3457f7d1cbd6c705ac450c82bb139bd33 5aba8315ef2294124cdd87a35d2e4a4f937abf26 604a181ebb676f578a8d07baefde57e7666b4483 8c79337edaf26d87daecab07791604b57f67ab92 df94b247ff5c7ad7bfc4fc31fd4b932f73e9041e 55348c7350b2fcf0163a07f1e5fb4991dade8c0e ef9194611a38e443c4853a328119dcbaa7641cb6 a99c2fb0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [15:d4:23:5d:36:bc:6c:bf:d1:a0:e1:97:a6:db:06:6f:36:b5:b2:c1] modulus: 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 public exponent: 10001 ]