2021-05-10 09:15:23,844 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-05-10 09:15:27,646 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-05-10 09:15:30.442  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-05-10 09:15:42.031 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-05-10 09:15:43.054  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-05-10 09:15:43.848  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-05-10 09:15:57.337  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 35.995 seconds (JVM running for 43.756) 2021-05-10 09:23:17.537  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-10 09:23:17.546 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-10 09:23:17.748 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-10 09:23:17.830 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-10 09:23:17.845  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-10 09:23:17.848  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-10 09:23:17.939  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-10 09:23:17.940  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-10 09:23:17.941  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-10 09:23:17.947  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-10 09:23:18.035  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-10 09:23:18.231  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-10 09:23:18.236  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-10 09:23:18.237  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-10 09:23:18.339  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-10 09:23:19.924  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-10 09:23:19.927  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-10 09:23:19.927 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-10 09:23:19.931 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-10 09:23:19.933  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1773 2021-05-10 09:23:19.933  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-10 09:23:19.936  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-10 09:23:19.937  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-10 09:23:19.942  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-10 09:23:19.942  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-10 09:23:19.943 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-10 09:23:19.943 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-10 09:23:19.943 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-10 09:23:20.042 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-10 09:23:20.042 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-10 09:23:20.043 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-10 09:23:20.048 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-10 09:23:20.239 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 97979661214240592149316051829574847691640973913 IssuerDN: UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 10 09:08:10 UTC 2021 Final Date: Sat May 10 09:08:10 UTC 2031 SubjectDN: UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [dd:4b:3a:2e:6c:18:25:36:bd:36:42:42:86:3f:f4:ee:0e:b7:fd:e1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 26ed4e03b9aa8a1f5778392e8b8c08c656c5b152 87f1e676d3916ab249e6c7a9c78370452543b282 a7410cbe799da0e331440495518bd0980576b3cb 3912439d6db524cac6232ce65346baa679139133 9791a3ebaab66f616c2c6f03ee4027ff9acce6d1 4897a6f30636c5bbcb4b4641395e0acaa1187315 e4951cd837614e5d51a7c6e083c0f37031a55435 833900b0ee8ef31cb080485715d872abd7da67d2 5153c92c3d862b5bd2f0abbdf2933b19cf9f73fe 120d89c041a43e35afbfa825f24088bcfd892ec2 11e566a465087a279c3f9449615cd5993c801a8d ba6907b47fe414b1db054fbd711aa48d4e3e357d e57eb6a861f025616ea56358ff1851022153dece c67808514738bc145bc70437f2e854ef6511420b 253f939a23febf77f3839dc972a32bc65ebda34f e9dc3be89b85484fcb933d1dfab8c4ce1f26e3b0 77d3e770f23d1864fe5d78170e5edac2780f8cd1 14d5aacebac3a794f29c0e992a32d33afa75e3ed b89575b8c3444ef8b004553ce0bcc16c343572b0 d6608ab1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ca:55:dd:8d:94:6d:b3:6a:b8:5b:cb:e4:46:0f:77:d8:68:8e:c5:1d] modulus: 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 public exponent: 10001 ] 2021-05-10 10:30:51.224  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-10 10:30:51.226 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-10 10:30:51.228 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-10 10:30:51.229 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-10 10:30:51.230  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-10 10:30:51.231  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-10 10:30:51.231  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-10 10:30:51.232  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-10 10:30:51.233  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-10 10:30:51.240  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-10 10:30:51.240  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-10 10:30:51.241  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-10 10:30:51.243  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-10 10:30:51.392  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-10 10:30:51.393  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-10 10:30:51.393 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-10 10:30:51.430 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-10 10:30:51.431  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1773 2021-05-10 10:30:51.431  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-10 10:30:51.434  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-10 10:30:51.434  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-10 10:30:51.435  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-10 10:30:51.435  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-10 10:30:51.435 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-10 10:30:51.435 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-10 10:30:51.436 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-10 10:30:51.437 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-10 10:30:51.437 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-10 10:30:51.438 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-10 10:30:51.439 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-10 10:30:51.532 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 97979661214240592149316051829574847691640973913 IssuerDN: UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 10 09:08:10 UTC 2021 Final Date: Sat May 10 09:08:10 UTC 2031 SubjectDN: UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [dd:4b:3a:2e:6c:18:25:36:bd:36:42:42:86:3f:f4:ee:0e:b7:fd:e1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 26ed4e03b9aa8a1f5778392e8b8c08c656c5b152 87f1e676d3916ab249e6c7a9c78370452543b282 a7410cbe799da0e331440495518bd0980576b3cb 3912439d6db524cac6232ce65346baa679139133 9791a3ebaab66f616c2c6f03ee4027ff9acce6d1 4897a6f30636c5bbcb4b4641395e0acaa1187315 e4951cd837614e5d51a7c6e083c0f37031a55435 833900b0ee8ef31cb080485715d872abd7da67d2 5153c92c3d862b5bd2f0abbdf2933b19cf9f73fe 120d89c041a43e35afbfa825f24088bcfd892ec2 11e566a465087a279c3f9449615cd5993c801a8d ba6907b47fe414b1db054fbd711aa48d4e3e357d e57eb6a861f025616ea56358ff1851022153dece c67808514738bc145bc70437f2e854ef6511420b 253f939a23febf77f3839dc972a32bc65ebda34f e9dc3be89b85484fcb933d1dfab8c4ce1f26e3b0 77d3e770f23d1864fe5d78170e5edac2780f8cd1 14d5aacebac3a794f29c0e992a32d33afa75e3ed b89575b8c3444ef8b004553ce0bcc16c343572b0 d6608ab1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [76:22:2d:19:c0:cf:d3:6d:55:ff:00:82:35:48:4b:8c:89:bd:05:52] modulus: 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 public exponent: 10001 ] 2021-05-10 10:32:36.280  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-10 10:32:36.285 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-10 10:32:36.288 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-05-10 10:32:36.289 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-10 10:32:36.289  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-05-10 10:32:36.290  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-10 10:32:36.290  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-10 10:32:36.291  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-10 10:32:36.291  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-10 10:32:36.337  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-10 10:32:36.338  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-10 10:32:36.339  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-10 10:32:36.342  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-10 10:32:36.442  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-10 10:32:36.443  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-10 10:32:36.443 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-10 10:32:36.444 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-10 10:32:36.445  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1773 2021-05-10 10:32:36.445  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-10 10:32:36.448  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-10 10:32:36.448  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-10 10:32:36.449  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-10 10:32:36.449  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-10 10:32:36.450 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-10 10:32:36.450 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-10 10:32:36.450 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-10 10:32:36.450 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-10 10:32:36.451 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-10 10:32:36.451 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-10 10:32:36.452 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-10 10:32:36.454 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 97979661214240592149316051829574847691640973913 IssuerDN: UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 10 09:08:10 UTC 2021 Final Date: Sat May 10 09:08:10 UTC 2031 SubjectDN: UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [dd:4b:3a:2e:6c:18:25:36:bd:36:42:42:86:3f:f4:ee:0e:b7:fd:e1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 26ed4e03b9aa8a1f5778392e8b8c08c656c5b152 87f1e676d3916ab249e6c7a9c78370452543b282 a7410cbe799da0e331440495518bd0980576b3cb 3912439d6db524cac6232ce65346baa679139133 9791a3ebaab66f616c2c6f03ee4027ff9acce6d1 4897a6f30636c5bbcb4b4641395e0acaa1187315 e4951cd837614e5d51a7c6e083c0f37031a55435 833900b0ee8ef31cb080485715d872abd7da67d2 5153c92c3d862b5bd2f0abbdf2933b19cf9f73fe 120d89c041a43e35afbfa825f24088bcfd892ec2 11e566a465087a279c3f9449615cd5993c801a8d ba6907b47fe414b1db054fbd711aa48d4e3e357d e57eb6a861f025616ea56358ff1851022153dece c67808514738bc145bc70437f2e854ef6511420b 253f939a23febf77f3839dc972a32bc65ebda34f e9dc3be89b85484fcb933d1dfab8c4ce1f26e3b0 77d3e770f23d1864fe5d78170e5edac2780f8cd1 14d5aacebac3a794f29c0e992a32d33afa75e3ed b89575b8c3444ef8b004553ce0bcc16c343572b0 d6608ab1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f0:e3:8d:a1:a0:d0:92:d8:40:be:bd:f0:50:32:fe:32:78:f4:f2:e7] modulus: 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 public exponent: 10001 ] 2021-05-10 10:35:35.239  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-10 10:35:35.241 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-10 10:35:35.242 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-10 10:35:35.242 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-10 10:35:35.243  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-10 10:35:35.243  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-10 10:35:35.244  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-10 10:35:35.244  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-10 10:35:35.245  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-10 10:35:35.249  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-10 10:35:35.250  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-10 10:35:35.250  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-10 10:35:35.253  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-10 10:35:35.375  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-10 10:35:35.430  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-10 10:35:35.430 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-10 10:35:35.431 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-10 10:35:35.432  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1773 2021-05-10 10:35:35.432  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-10 10:35:35.436  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-10 10:35:35.436  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-10 10:35:35.437  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-10 10:35:35.437  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-10 10:35:35.437 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-10 10:35:35.438 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-10 10:35:35.438 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-10 10:35:35.439 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-10 10:35:35.439 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-10 10:35:35.442 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-10 10:35:35.446 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-10 10:35:35.448 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 97979661214240592149316051829574847691640973913 IssuerDN: UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 10 09:08:10 UTC 2021 Final Date: Sat May 10 09:08:10 UTC 2031 SubjectDN: UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [dd:4b:3a:2e:6c:18:25:36:bd:36:42:42:86:3f:f4:ee:0e:b7:fd:e1] modulus: a3be0f28889173328c4769bb4edf3c9c730fb35b6fbb8ea99344c63f98fb06a255f367175994823b107bc6d4c49111e26605660bfaa3e53d660872bc94f70b33a1afd2bc2586087cc9429d31e962a3bda431bb5b245d6951b3a1bec86f0b3ee2a68ffabc910fd0698588ab18196cf6931f23f6d130a2b5579894b75b434bab62403e1bf9e4dff559d13246e6f2aa097afad3a1b7d798985865ff4c56881e3d55b2fb76357efffe6f36b41a19d0a65b53a8706f1c3abf4815d1ec8294ce589d2488be34525dbf392c664c8a78b1a8adecc56feb95e1fbed1f546d38445c26446bcd4475731397aa9cfb64684590bcb64e3d9fcbc02f0ce5cec67405db8c39388d77ac6f7216619a72e1eee2acc826233c66b0d408945c09752806b5406bf4dc913bcc137c35ea3f37365d3eed9113c8e3acdae7ec2c03bb934c3b572c0978a74db97497b309cd99c378e8bfdd86b0f390dc1e0637817a12ba79e693878c070315f7c103798b8abe1392ba76db048614cff0112c918ec3a9fd1137d2d71c9d6007 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 26ed4e03b9aa8a1f5778392e8b8c08c656c5b152 87f1e676d3916ab249e6c7a9c78370452543b282 a7410cbe799da0e331440495518bd0980576b3cb 3912439d6db524cac6232ce65346baa679139133 9791a3ebaab66f616c2c6f03ee4027ff9acce6d1 4897a6f30636c5bbcb4b4641395e0acaa1187315 e4951cd837614e5d51a7c6e083c0f37031a55435 833900b0ee8ef31cb080485715d872abd7da67d2 5153c92c3d862b5bd2f0abbdf2933b19cf9f73fe 120d89c041a43e35afbfa825f24088bcfd892ec2 11e566a465087a279c3f9449615cd5993c801a8d ba6907b47fe414b1db054fbd711aa48d4e3e357d e57eb6a861f025616ea56358ff1851022153dece c67808514738bc145bc70437f2e854ef6511420b 253f939a23febf77f3839dc972a32bc65ebda34f e9dc3be89b85484fcb933d1dfab8c4ce1f26e3b0 77d3e770f23d1864fe5d78170e5edac2780f8cd1 14d5aacebac3a794f29c0e992a32d33afa75e3ed b89575b8c3444ef8b004553ce0bcc16c343572b0 d6608ab1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [93:f1:44:1f:2c:ea:ca:36:85:fc:a2:8f:c6:aa:e5:7e:06:da:02:15] modulus: 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 public exponent: 10001 ] 2021-05-10 10:36:17.284  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-10 10:36:17.285 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-10 10:36:17.287 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-10 10:36:17.287 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-10 10:36:17.288  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-10 10:36:17.289  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-10 10:36:17.289  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-10 10:36:17.289  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-10 10:36:17.290  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-10 10:36:17.295  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-10 10:36:17.295  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-10 10:36:17.295  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-10 10:36:17.297  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-10 10:36:17.430  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-10 10:36:17.431  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-10 10:36:17.431 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-10 10:36:17.434 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-10 10:36:17.435  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1773 2021-05-10 10:36:17.436  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-10 10:36:17.440  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-10 10:36:17.441  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-10 10:36:17.441  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-10 10:36:17.442  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-10 10:36:17.442 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-10 10:36:17.443 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-10 10:36:17.443 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-10 10:36:17.444 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-10 10:36:17.531 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-10 10:36:17.531 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-10 10:36:17.532 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-10 10:36:17.536 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 97979661214240592149316051829574847691640973913 IssuerDN: UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 10 09:08:10 UTC 2021 Final Date: Sat May 10 09:08:10 UTC 2031 SubjectDN: UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [dd:4b:3a:2e:6c:18:25:36:bd:36:42:42:86:3f:f4:ee:0e:b7:fd:e1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 26ed4e03b9aa8a1f5778392e8b8c08c656c5b152 87f1e676d3916ab249e6c7a9c78370452543b282 a7410cbe799da0e331440495518bd0980576b3cb 3912439d6db524cac6232ce65346baa679139133 9791a3ebaab66f616c2c6f03ee4027ff9acce6d1 4897a6f30636c5bbcb4b4641395e0acaa1187315 e4951cd837614e5d51a7c6e083c0f37031a55435 833900b0ee8ef31cb080485715d872abd7da67d2 5153c92c3d862b5bd2f0abbdf2933b19cf9f73fe 120d89c041a43e35afbfa825f24088bcfd892ec2 11e566a465087a279c3f9449615cd5993c801a8d ba6907b47fe414b1db054fbd711aa48d4e3e357d e57eb6a861f025616ea56358ff1851022153dece c67808514738bc145bc70437f2e854ef6511420b 253f939a23febf77f3839dc972a32bc65ebda34f e9dc3be89b85484fcb933d1dfab8c4ce1f26e3b0 77d3e770f23d1864fe5d78170e5edac2780f8cd1 14d5aacebac3a794f29c0e992a32d33afa75e3ed b89575b8c3444ef8b004553ce0bcc16c343572b0 d6608ab1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [97:75:05:04:dd:05:c8:08:cf:bb:b9:f3:aa:19:ee:82:af:a2:3e:9f] modulus: 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 public exponent: 10001 ] 2021-05-10 10:36:32.048  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-10 10:36:32.050 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-10 10:36:32.051 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-05-10 10:36:32.051 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-10 10:36:32.052  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-05-10 10:36:32.052  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-10 10:36:32.052  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-10 10:36:32.053  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-10 10:36:32.053  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-10 10:36:32.058  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-10 10:36:32.058  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-10 10:36:32.059  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-10 10:36:32.060  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-10 10:36:32.147  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-10 10:36:32.148  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-10 10:36:32.148 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-10 10:36:32.149 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-10 10:36:32.150  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1773 2021-05-10 10:36:32.150  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-10 10:36:32.151  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-10 10:36:32.152  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-10 10:36:32.152  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-10 10:36:32.152  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-10 10:36:32.152 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-10 10:36:32.152 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-10 10:36:32.153 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-10 10:36:32.153 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-10 10:36:32.153 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-10 10:36:32.153 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-10 10:36:32.154 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-10 10:36:32.160 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 97979661214240592149316051829574847691640973913 IssuerDN: UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 10 09:08:10 UTC 2021 Final Date: Sat May 10 09:08:10 UTC 2031 SubjectDN: UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [dd:4b:3a:2e:6c:18:25:36:bd:36:42:42:86:3f:f4:ee:0e:b7:fd:e1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 26ed4e03b9aa8a1f5778392e8b8c08c656c5b152 87f1e676d3916ab249e6c7a9c78370452543b282 a7410cbe799da0e331440495518bd0980576b3cb 3912439d6db524cac6232ce65346baa679139133 9791a3ebaab66f616c2c6f03ee4027ff9acce6d1 4897a6f30636c5bbcb4b4641395e0acaa1187315 e4951cd837614e5d51a7c6e083c0f37031a55435 833900b0ee8ef31cb080485715d872abd7da67d2 5153c92c3d862b5bd2f0abbdf2933b19cf9f73fe 120d89c041a43e35afbfa825f24088bcfd892ec2 11e566a465087a279c3f9449615cd5993c801a8d ba6907b47fe414b1db054fbd711aa48d4e3e357d e57eb6a861f025616ea56358ff1851022153dece c67808514738bc145bc70437f2e854ef6511420b 253f939a23febf77f3839dc972a32bc65ebda34f e9dc3be89b85484fcb933d1dfab8c4ce1f26e3b0 77d3e770f23d1864fe5d78170e5edac2780f8cd1 14d5aacebac3a794f29c0e992a32d33afa75e3ed b89575b8c3444ef8b004553ce0bcc16c343572b0 d6608ab1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [13:90:bf:83:7c:4d:a2:aa:26:48:6b:dc:89:5d:99:d1:44:bf:57:23] modulus: 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 public exponent: 10001 ] 2021-05-10 10:36:46.513  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-10 10:36:46.515 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-10 10:36:46.516 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-05-10 10:36:46.517 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-10 10:36:46.518  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-05-10 10:36:46.519  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-10 10:36:46.519  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-10 10:36:46.520  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-10 10:36:46.521  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-10 10:36:46.525  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-10 10:36:46.526  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-10 10:36:46.526  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-10 10:36:46.527  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-10 10:36:46.611  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-10 10:36:46.611  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-10 10:36:46.612 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-10 10:36:46.613 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-10 10:36:46.613  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1773 2021-05-10 10:36:46.614  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-10 10:36:46.630  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-10 10:36:46.631  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-10 10:36:46.631  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-10 10:36:46.632  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-10 10:36:46.632 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-10 10:36:46.632 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-10 10:36:46.633 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-10 10:36:46.633 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-10 10:36:46.634 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-10 10:36:46.634 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-10 10:36:46.635 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-10 10:36:46.638 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 97979661214240592149316051829574847691640973913 IssuerDN: UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 10 09:08:10 UTC 2021 Final Date: Sat May 10 09:08:10 UTC 2031 SubjectDN: UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [dd:4b:3a:2e:6c:18:25:36:bd:36:42:42:86:3f:f4:ee:0e:b7:fd:e1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 26ed4e03b9aa8a1f5778392e8b8c08c656c5b152 87f1e676d3916ab249e6c7a9c78370452543b282 a7410cbe799da0e331440495518bd0980576b3cb 3912439d6db524cac6232ce65346baa679139133 9791a3ebaab66f616c2c6f03ee4027ff9acce6d1 4897a6f30636c5bbcb4b4641395e0acaa1187315 e4951cd837614e5d51a7c6e083c0f37031a55435 833900b0ee8ef31cb080485715d872abd7da67d2 5153c92c3d862b5bd2f0abbdf2933b19cf9f73fe 120d89c041a43e35afbfa825f24088bcfd892ec2 11e566a465087a279c3f9449615cd5993c801a8d ba6907b47fe414b1db054fbd711aa48d4e3e357d e57eb6a861f025616ea56358ff1851022153dece c67808514738bc145bc70437f2e854ef6511420b 253f939a23febf77f3839dc972a32bc65ebda34f e9dc3be89b85484fcb933d1dfab8c4ce1f26e3b0 77d3e770f23d1864fe5d78170e5edac2780f8cd1 14d5aacebac3a794f29c0e992a32d33afa75e3ed b89575b8c3444ef8b004553ce0bcc16c343572b0 d6608ab1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8e:86:5c:44:3d:a2:c4:24:ad:e5:63:b4:93:7c:7c:02:f6:81:c4:27] modulus: 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 public exponent: 10001 ] 2021-05-10 10:38:35.642  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-10 10:38:35.642 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-10 10:38:35.643 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-05-10 10:38:35.644 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-10 10:38:35.644  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-05-10 10:38:35.644  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-10 10:38:35.644  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-10 10:38:35.645  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-10 10:38:35.645  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-10 10:38:35.648  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-10 10:38:35.649  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-10 10:38:35.649  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-10 10:38:35.650  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-10 10:38:35.758  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-10 10:38:35.759  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-10 10:38:35.759 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-10 10:38:35.761 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-10 10:38:35.761  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1773 2021-05-10 10:38:35.762  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-10 10:38:35.764  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-10 10:38:35.765  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-10 10:38:35.765  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-10 10:38:35.766  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-10 10:38:35.766 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-10 10:38:35.766 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-10 10:38:35.767 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-10 10:38:35.767 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-10 10:38:35.768 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-10 10:38:35.768 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-10 10:38:35.769 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-10 10:38:35.771 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 97979661214240592149316051829574847691640973913 IssuerDN: UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 10 09:08:10 UTC 2021 Final Date: Sat May 10 09:08:10 UTC 2031 SubjectDN: UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [dd:4b:3a:2e:6c:18:25:36:bd:36:42:42:86:3f:f4:ee:0e:b7:fd:e1] modulus: a3be0f28889173328c4769bb4edf3c9c730fb35b6fbb8ea99344c63f98fb06a255f367175994823b107bc6d4c49111e26605660bfaa3e53d660872bc94f70b33a1afd2bc2586087cc9429d31e962a3bda431bb5b245d6951b3a1bec86f0b3ee2a68ffabc910fd0698588ab18196cf6931f23f6d130a2b5579894b75b434bab62403e1bf9e4dff559d13246e6f2aa097afad3a1b7d798985865ff4c56881e3d55b2fb76357efffe6f36b41a19d0a65b53a8706f1c3abf4815d1ec8294ce589d2488be34525dbf392c664c8a78b1a8adecc56feb95e1fbed1f546d38445c26446bcd4475731397aa9cfb64684590bcb64e3d9fcbc02f0ce5cec67405db8c39388d77ac6f7216619a72e1eee2acc826233c66b0d408945c09752806b5406bf4dc913bcc137c35ea3f37365d3eed9113c8e3acdae7ec2c03bb934c3b572c0978a74db97497b309cd99c378e8bfdd86b0f390dc1e0637817a12ba79e693878c070315f7c103798b8abe1392ba76db048614cff0112c918ec3a9fd1137d2d71c9d6007 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 26ed4e03b9aa8a1f5778392e8b8c08c656c5b152 87f1e676d3916ab249e6c7a9c78370452543b282 a7410cbe799da0e331440495518bd0980576b3cb 3912439d6db524cac6232ce65346baa679139133 9791a3ebaab66f616c2c6f03ee4027ff9acce6d1 4897a6f30636c5bbcb4b4641395e0acaa1187315 e4951cd837614e5d51a7c6e083c0f37031a55435 833900b0ee8ef31cb080485715d872abd7da67d2 5153c92c3d862b5bd2f0abbdf2933b19cf9f73fe 120d89c041a43e35afbfa825f24088bcfd892ec2 11e566a465087a279c3f9449615cd5993c801a8d ba6907b47fe414b1db054fbd711aa48d4e3e357d e57eb6a861f025616ea56358ff1851022153dece c67808514738bc145bc70437f2e854ef6511420b 253f939a23febf77f3839dc972a32bc65ebda34f e9dc3be89b85484fcb933d1dfab8c4ce1f26e3b0 77d3e770f23d1864fe5d78170e5edac2780f8cd1 14d5aacebac3a794f29c0e992a32d33afa75e3ed b89575b8c3444ef8b004553ce0bcc16c343572b0 d6608ab1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e9:d5:a7:4b:ef:12:8e:ed:a6:a9:9d:28:0c:8a:9f:91:f8:c0:cb:65] modulus: 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 public exponent: 10001 ] 2021-05-10 10:38:44.308  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-10 10:38:44.309 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-10 10:38:44.310 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-05-10 10:38:44.311 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-10 10:38:44.311  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-05-10 10:38:44.312  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-10 10:38:44.312  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-10 10:38:44.312  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-10 10:38:44.312  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-10 10:38:44.316  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-10 10:38:44.317  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-10 10:38:44.317  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-10 10:38:44.319  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-10 10:38:44.387  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-10 10:38:44.388  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-10 10:38:44.430 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-10 10:38:44.431 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-10 10:38:44.432  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1773 2021-05-10 10:38:44.432  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-10 10:38:44.433  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-10 10:38:44.434  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-10 10:38:44.434  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-10 10:38:44.434  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-10 10:38:44.435 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-10 10:38:44.435 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-10 10:38:44.435 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-10 10:38:44.435 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-10 10:38:44.436 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-10 10:38:44.436 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-10 10:38:44.436 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-10 10:38:44.439 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 97979661214240592149316051829574847691640973913 IssuerDN: UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 10 09:08:10 UTC 2021 Final Date: Sat May 10 09:08:10 UTC 2031 SubjectDN: UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [dd:4b:3a:2e:6c:18:25:36:bd:36:42:42:86:3f:f4:ee:0e:b7:fd:e1] modulus: a3be0f28889173328c4769bb4edf3c9c730fb35b6fbb8ea99344c63f98fb06a255f367175994823b107bc6d4c49111e26605660bfaa3e53d660872bc94f70b33a1afd2bc2586087cc9429d31e962a3bda431bb5b245d6951b3a1bec86f0b3ee2a68ffabc910fd0698588ab18196cf6931f23f6d130a2b5579894b75b434bab62403e1bf9e4dff559d13246e6f2aa097afad3a1b7d798985865ff4c56881e3d55b2fb76357efffe6f36b41a19d0a65b53a8706f1c3abf4815d1ec8294ce589d2488be34525dbf392c664c8a78b1a8adecc56feb95e1fbed1f546d38445c26446bcd4475731397aa9cfb64684590bcb64e3d9fcbc02f0ce5cec67405db8c39388d77ac6f7216619a72e1eee2acc826233c66b0d408945c09752806b5406bf4dc913bcc137c35ea3f37365d3eed9113c8e3acdae7ec2c03bb934c3b572c0978a74db97497b309cd99c378e8bfdd86b0f390dc1e0637817a12ba79e693878c070315f7c103798b8abe1392ba76db048614cff0112c918ec3a9fd1137d2d71c9d6007 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 26ed4e03b9aa8a1f5778392e8b8c08c656c5b152 87f1e676d3916ab249e6c7a9c78370452543b282 a7410cbe799da0e331440495518bd0980576b3cb 3912439d6db524cac6232ce65346baa679139133 9791a3ebaab66f616c2c6f03ee4027ff9acce6d1 4897a6f30636c5bbcb4b4641395e0acaa1187315 e4951cd837614e5d51a7c6e083c0f37031a55435 833900b0ee8ef31cb080485715d872abd7da67d2 5153c92c3d862b5bd2f0abbdf2933b19cf9f73fe 120d89c041a43e35afbfa825f24088bcfd892ec2 11e566a465087a279c3f9449615cd5993c801a8d ba6907b47fe414b1db054fbd711aa48d4e3e357d e57eb6a861f025616ea56358ff1851022153dece c67808514738bc145bc70437f2e854ef6511420b 253f939a23febf77f3839dc972a32bc65ebda34f e9dc3be89b85484fcb933d1dfab8c4ce1f26e3b0 77d3e770f23d1864fe5d78170e5edac2780f8cd1 14d5aacebac3a794f29c0e992a32d33afa75e3ed b89575b8c3444ef8b004553ce0bcc16c343572b0 d6608ab1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ad:20:36:e3:69:1f:91:ea:c3:b3:8c:3b:3d:25:bf:cd:00:83:b3:72] modulus: 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 public exponent: 10001 ] 2021-05-10 10:41:42.317  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-10 10:41:42.319 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-10 10:41:42.321 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-10 10:41:42.322 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-10 10:41:42.322  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-10 10:41:42.323  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-10 10:41:42.323  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-10 10:41:42.323  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-10 10:41:42.324  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-10 10:41:42.329  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-10 10:41:42.329  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-10 10:41:42.330  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-10 10:41:42.331  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-10 10:41:42.424  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-10 10:41:42.425  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-10 10:41:42.425 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-10 10:41:42.427 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-10 10:41:42.428  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1773 2021-05-10 10:41:42.429  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-10 10:41:42.430  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-10 10:41:42.431  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-10 10:41:42.432  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-10 10:41:42.432  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-10 10:41:42.432 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-10 10:41:42.433 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-10 10:41:42.433 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-10 10:41:42.434 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-10 10:41:42.434 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-10 10:41:42.435 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-10 10:41:42.436 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-10 10:41:42.439 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 97979661214240592149316051829574847691640973913 IssuerDN: UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 10 09:08:10 UTC 2021 Final Date: Sat May 10 09:08:10 UTC 2031 SubjectDN: UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [dd:4b:3a:2e:6c:18:25:36:bd:36:42:42:86:3f:f4:ee:0e:b7:fd:e1] modulus: a3be0f28889173328c4769bb4edf3c9c730fb35b6fbb8ea99344c63f98fb06a255f367175994823b107bc6d4c49111e26605660bfaa3e53d660872bc94f70b33a1afd2bc2586087cc9429d31e962a3bda431bb5b245d6951b3a1bec86f0b3ee2a68ffabc910fd0698588ab18196cf6931f23f6d130a2b5579894b75b434bab62403e1bf9e4dff559d13246e6f2aa097afad3a1b7d798985865ff4c56881e3d55b2fb76357efffe6f36b41a19d0a65b53a8706f1c3abf4815d1ec8294ce589d2488be34525dbf392c664c8a78b1a8adecc56feb95e1fbed1f546d38445c26446bcd4475731397aa9cfb64684590bcb64e3d9fcbc02f0ce5cec67405db8c39388d77ac6f7216619a72e1eee2acc826233c66b0d408945c09752806b5406bf4dc913bcc137c35ea3f37365d3eed9113c8e3acdae7ec2c03bb934c3b572c0978a74db97497b309cd99c378e8bfdd86b0f390dc1e0637817a12ba79e693878c070315f7c103798b8abe1392ba76db048614cff0112c918ec3a9fd1137d2d71c9d6007 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 26ed4e03b9aa8a1f5778392e8b8c08c656c5b152 87f1e676d3916ab249e6c7a9c78370452543b282 a7410cbe799da0e331440495518bd0980576b3cb 3912439d6db524cac6232ce65346baa679139133 9791a3ebaab66f616c2c6f03ee4027ff9acce6d1 4897a6f30636c5bbcb4b4641395e0acaa1187315 e4951cd837614e5d51a7c6e083c0f37031a55435 833900b0ee8ef31cb080485715d872abd7da67d2 5153c92c3d862b5bd2f0abbdf2933b19cf9f73fe 120d89c041a43e35afbfa825f24088bcfd892ec2 11e566a465087a279c3f9449615cd5993c801a8d ba6907b47fe414b1db054fbd711aa48d4e3e357d e57eb6a861f025616ea56358ff1851022153dece c67808514738bc145bc70437f2e854ef6511420b 253f939a23febf77f3839dc972a32bc65ebda34f e9dc3be89b85484fcb933d1dfab8c4ce1f26e3b0 77d3e770f23d1864fe5d78170e5edac2780f8cd1 14d5aacebac3a794f29c0e992a32d33afa75e3ed b89575b8c3444ef8b004553ce0bcc16c343572b0 d6608ab1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [93:5b:68:72:64:42:2d:55:0c:90:4d:40:b0:21:02:3f:32:65:b1:3b] modulus: 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 public exponent: 10001 ] 2021-05-10 10:44:58.052  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-10 10:44:58.054 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-10 10:44:58.055 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-10 10:44:58.056 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-10 10:44:58.056  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-10 10:44:58.057  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-10 10:44:58.057  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-10 10:44:58.058  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-10 10:44:58.058  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-10 10:44:58.062  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-10 10:44:58.062  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-10 10:44:58.063  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-10 10:44:58.064  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-10 10:44:58.128  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-10 10:44:58.129  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-10 10:44:58.130 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-10 10:44:58.132 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-10 10:44:58.132  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1773 2021-05-10 10:44:58.133  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-10 10:44:58.134  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-10 10:44:58.135  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-10 10:44:58.135  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-10 10:44:58.136  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-10 10:44:58.136 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-10 10:44:58.136 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-10 10:44:58.136 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-10 10:44:58.137 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-10 10:44:58.137 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-10 10:44:58.138 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-10 10:44:58.139 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-10 10:44:58.142 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 97979661214240592149316051829574847691640973913 IssuerDN: UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 10 09:08:10 UTC 2021 Final Date: Sat May 10 09:08:10 UTC 2031 SubjectDN: UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [dd:4b:3a:2e:6c:18:25:36:bd:36:42:42:86:3f:f4:ee:0e:b7:fd:e1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 26ed4e03b9aa8a1f5778392e8b8c08c656c5b152 87f1e676d3916ab249e6c7a9c78370452543b282 a7410cbe799da0e331440495518bd0980576b3cb 3912439d6db524cac6232ce65346baa679139133 9791a3ebaab66f616c2c6f03ee4027ff9acce6d1 4897a6f30636c5bbcb4b4641395e0acaa1187315 e4951cd837614e5d51a7c6e083c0f37031a55435 833900b0ee8ef31cb080485715d872abd7da67d2 5153c92c3d862b5bd2f0abbdf2933b19cf9f73fe 120d89c041a43e35afbfa825f24088bcfd892ec2 11e566a465087a279c3f9449615cd5993c801a8d ba6907b47fe414b1db054fbd711aa48d4e3e357d e57eb6a861f025616ea56358ff1851022153dece c67808514738bc145bc70437f2e854ef6511420b 253f939a23febf77f3839dc972a32bc65ebda34f e9dc3be89b85484fcb933d1dfab8c4ce1f26e3b0 77d3e770f23d1864fe5d78170e5edac2780f8cd1 14d5aacebac3a794f29c0e992a32d33afa75e3ed b89575b8c3444ef8b004553ce0bcc16c343572b0 d6608ab1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a4:f2:9c:7f:1e:85:3c:40:cd:5d:83:b2:f9:5e:04:7b:18:af:f1:7f] modulus: 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 public exponent: 10001 ] 2021-05-10 10:46:54.114  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-10 10:46:54.115 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-10 10:46:54.116 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-10 10:46:54.117 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-10 10:46:54.117  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-10 10:46:54.118  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-10 10:46:54.118  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-10 10:46:54.118  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-10 10:46:54.118  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-10 10:46:54.124  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-10 10:46:54.124  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-10 10:46:54.124  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-10 10:46:54.125  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-10 10:46:54.219  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-10 10:46:54.220  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-10 10:46:54.220 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-10 10:46:54.222 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-10 10:46:54.223  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1773 2021-05-10 10:46:54.223  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-10 10:46:54.225  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-10 10:46:54.226  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-10 10:46:54.226  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-10 10:46:54.226  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-10 10:46:54.227 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-10 10:46:54.227 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-10 10:46:54.227 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-10 10:46:54.228 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-10 10:46:54.228 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-10 10:46:54.228 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-10 10:46:54.229 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-10 10:46:54.231 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 97979661214240592149316051829574847691640973913 IssuerDN: UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 10 09:08:10 UTC 2021 Final Date: Sat May 10 09:08:10 UTC 2031 SubjectDN: UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [dd:4b:3a:2e:6c:18:25:36:bd:36:42:42:86:3f:f4:ee:0e:b7:fd:e1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 26ed4e03b9aa8a1f5778392e8b8c08c656c5b152 87f1e676d3916ab249e6c7a9c78370452543b282 a7410cbe799da0e331440495518bd0980576b3cb 3912439d6db524cac6232ce65346baa679139133 9791a3ebaab66f616c2c6f03ee4027ff9acce6d1 4897a6f30636c5bbcb4b4641395e0acaa1187315 e4951cd837614e5d51a7c6e083c0f37031a55435 833900b0ee8ef31cb080485715d872abd7da67d2 5153c92c3d862b5bd2f0abbdf2933b19cf9f73fe 120d89c041a43e35afbfa825f24088bcfd892ec2 11e566a465087a279c3f9449615cd5993c801a8d ba6907b47fe414b1db054fbd711aa48d4e3e357d e57eb6a861f025616ea56358ff1851022153dece c67808514738bc145bc70437f2e854ef6511420b 253f939a23febf77f3839dc972a32bc65ebda34f e9dc3be89b85484fcb933d1dfab8c4ce1f26e3b0 77d3e770f23d1864fe5d78170e5edac2780f8cd1 14d5aacebac3a794f29c0e992a32d33afa75e3ed b89575b8c3444ef8b004553ce0bcc16c343572b0 d6608ab1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [50:1e:97:36:83:96:de:cd:5a:49:0e:61:37:69:dc:e7:25:de:52:17] modulus: 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 public exponent: 10001 ] 2021-05-10 10:48:30.067  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-10 10:48:30.068 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-10 10:48:30.069 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-10 10:48:30.070 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-10 10:48:30.070  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-10 10:48:30.071  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-10 10:48:30.071  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-10 10:48:30.072  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-10 10:48:30.072  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-10 10:48:30.077  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-10 10:48:30.078  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-10 10:48:30.078  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-10 10:48:30.079  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-10 10:48:30.154  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-10 10:48:30.155  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-10 10:48:30.155 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-10 10:48:30.159 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-10 10:48:30.159  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1773 2021-05-10 10:48:30.160  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-10 10:48:30.161  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-10 10:48:30.162  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-10 10:48:30.162  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-10 10:48:30.162  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-10 10:48:30.163 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-10 10:48:30.163 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-10 10:48:30.164 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-10 10:48:30.164 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-10 10:48:30.165 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-10 10:48:30.165 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-10 10:48:30.166 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-10 10:48:30.168 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 97979661214240592149316051829574847691640973913 IssuerDN: UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 10 09:08:10 UTC 2021 Final Date: Sat May 10 09:08:10 UTC 2031 SubjectDN: UID=c-0d0b219a1ea17fbd4,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [dd:4b:3a:2e:6c:18:25:36:bd:36:42:42:86:3f:f4:ee:0e:b7:fd:e1] modulus: a3be0f28889173328c4769bb4edf3c9c730fb35b6fbb8ea99344c63f98fb06a255f367175994823b107bc6d4c49111e26605660bfaa3e53d660872bc94f70b33a1afd2bc2586087cc9429d31e962a3bda431bb5b245d6951b3a1bec86f0b3ee2a68ffabc910fd0698588ab18196cf6931f23f6d130a2b5579894b75b434bab62403e1bf9e4dff559d13246e6f2aa097afad3a1b7d798985865ff4c56881e3d55b2fb76357efffe6f36b41a19d0a65b53a8706f1c3abf4815d1ec8294ce589d2488be34525dbf392c664c8a78b1a8adecc56feb95e1fbed1f546d38445c26446bcd4475731397aa9cfb64684590bcb64e3d9fcbc02f0ce5cec67405db8c39388d77ac6f7216619a72e1eee2acc826233c66b0d408945c09752806b5406bf4dc913bcc137c35ea3f37365d3eed9113c8e3acdae7ec2c03bb934c3b572c0978a74db97497b309cd99c378e8bfdd86b0f390dc1e0637817a12ba79e693878c070315f7c103798b8abe1392ba76db048614cff0112c918ec3a9fd1137d2d71c9d6007 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 26ed4e03b9aa8a1f5778392e8b8c08c656c5b152 87f1e676d3916ab249e6c7a9c78370452543b282 a7410cbe799da0e331440495518bd0980576b3cb 3912439d6db524cac6232ce65346baa679139133 9791a3ebaab66f616c2c6f03ee4027ff9acce6d1 4897a6f30636c5bbcb4b4641395e0acaa1187315 e4951cd837614e5d51a7c6e083c0f37031a55435 833900b0ee8ef31cb080485715d872abd7da67d2 5153c92c3d862b5bd2f0abbdf2933b19cf9f73fe 120d89c041a43e35afbfa825f24088bcfd892ec2 11e566a465087a279c3f9449615cd5993c801a8d ba6907b47fe414b1db054fbd711aa48d4e3e357d e57eb6a861f025616ea56358ff1851022153dece c67808514738bc145bc70437f2e854ef6511420b 253f939a23febf77f3839dc972a32bc65ebda34f e9dc3be89b85484fcb933d1dfab8c4ce1f26e3b0 77d3e770f23d1864fe5d78170e5edac2780f8cd1 14d5aacebac3a794f29c0e992a32d33afa75e3ed b89575b8c3444ef8b004553ce0bcc16c343572b0 d6608ab1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [54:ec:33:dc:0f:42:45:9e:25:38:d8:63:1a:fd:64:5b:75:c6:33:84] modulus: 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 public exponent: 10001 ]