Results

By type

          2021-05-11 10:34:07,895 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-05-11 10:34:11,809 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-05-11 10:34:14.793  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-05-11 10:34:27.692 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-05-11 10:34:28.800  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-05-11 10:34:29.689  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-05-11 10:34:43.309  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 38.008 seconds (JVM running for 45.986)
2021-05-11 10:45:24.095  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-11 10:45:24.106 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-11 10:45:24.495 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-11 10:45:24.503 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-11 10:45:24.693  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-11 10:45:24.700  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-11 10:45:24.793  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-11 10:45:24.795  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-11 10:45:24.796  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-11 10:45:24.804  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-11 10:45:24.807  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-11 10:45:25.090  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-11 10:45:25.098  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-11 10:45:25.100  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-11 10:45:25.193  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-11 10:45:26.617  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-11 10:45:26.619  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-11 10:45:26.620 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-11 10:45:26.691 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-11 10:45:26.694  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1352
2021-05-11 10:45:26.695  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-11 10:45:26.699  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-11 10:45:26.700  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-11 10:45:26.797  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-11 10:45:26.799  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-11 10:45:26.799 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-11 10:45:26.800 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-11 10:45:26.800 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-11 10:45:26.810 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-11 10:45:26.810 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-11 10:45:26.811 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-11 10:45:26.890 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-11 10:45:26.997 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 655606632742016797727441561468196706559246178733
             IssuerDN: UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 11 10:27:38 UTC 2021
           Final Date: Sun May 11 10:27:38 UTC 2031
            SubjectDN: UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:11:0e:41:76:c7:e0:97:55:ee:1b:47:4c:3b:19:60:5b:19:aa:94]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b21488da392be96302fa507b93dc3c670368a8c
                       53ea0b7d66fd68a21039950c493c6fc144e5f9cf
                       7fde09c48e8ff7c04237880a94b68fef931140b0
                       d6afe0de27777787bc562b82651ec35a4bd3b299
                       290e4b4cea0322c395d2c8a58a88496ed962d205
                       6c68fec8d040bcaa155afadb75e70ca805338639
                       a37eb58a0668b5924ee5d1a1e95846acf8463653
                       f904b38503b11bb596bd9e0ea537962a9bea5a8e
                       1b225d138f5c94052585d7fb12ce1a98707c0b32
                       dd337c06b9bc6a437c8d79f6c054ab6c2392b0cc
                       83cf10345534208d6d41c1405d76f00a3de6173d
                       6a32dcb59e68108a96786abfd05a3da42f51a0a0
                       ee12791e36d3c6d8da3438d451a3b323ffebda50
                       f2ebb6f067c08186086d45e741020fa69c49a485
                       13f3e241836ebe6dadd9964bf49418bef745ae83
                       80cde1626d05449f594266fc4180e2c374bb1cd4
                       061f151ac1a71255c306e3591b3d530bff636ab3
                       3886b5164381900d290700ef5a44e5c127443f0f
                       bb3bbda7670a2ceab0de8bd246515095c8301e38
                       26a060a0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ee:fb:64:de:f2:25:0a:07:c6:e6:ec:be:7a:57:4e:0c:a0:c4:c0:b5]
            modulus: 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
    public exponent: 10001

] 
2021-05-11 12:07:11.582  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-11 12:07:11.584 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-11 12:07:11.586 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-11 12:07:11.587 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-11 12:07:11.588  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-11 12:07:11.588  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-11 12:07:11.589  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-11 12:07:11.589  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-11 12:07:11.590  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-11 12:07:11.598  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-11 12:07:11.598  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-11 12:07:11.599  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-11 12:07:11.600  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-11 12:07:11.770  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-11 12:07:11.789  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-11 12:07:11.790 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-11 12:07:11.798 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-11 12:07:11.800  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1352
2021-05-11 12:07:11.800  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-11 12:07:11.889  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-11 12:07:11.890  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-11 12:07:11.891  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-11 12:07:11.892  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-11 12:07:11.892 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-11 12:07:11.893 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-11 12:07:11.893 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-11 12:07:11.895 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-11 12:07:11.895 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-11 12:07:11.896 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-11 12:07:11.897 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-11 12:07:11.901 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 655606632742016797727441561468196706559246178733
             IssuerDN: UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 11 10:27:38 UTC 2021
           Final Date: Sun May 11 10:27:38 UTC 2031
            SubjectDN: UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:11:0e:41:76:c7:e0:97:55:ee:1b:47:4c:3b:19:60:5b:19:aa:94]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b21488da392be96302fa507b93dc3c670368a8c
                       53ea0b7d66fd68a21039950c493c6fc144e5f9cf
                       7fde09c48e8ff7c04237880a94b68fef931140b0
                       d6afe0de27777787bc562b82651ec35a4bd3b299
                       290e4b4cea0322c395d2c8a58a88496ed962d205
                       6c68fec8d040bcaa155afadb75e70ca805338639
                       a37eb58a0668b5924ee5d1a1e95846acf8463653
                       f904b38503b11bb596bd9e0ea537962a9bea5a8e
                       1b225d138f5c94052585d7fb12ce1a98707c0b32
                       dd337c06b9bc6a437c8d79f6c054ab6c2392b0cc
                       83cf10345534208d6d41c1405d76f00a3de6173d
                       6a32dcb59e68108a96786abfd05a3da42f51a0a0
                       ee12791e36d3c6d8da3438d451a3b323ffebda50
                       f2ebb6f067c08186086d45e741020fa69c49a485
                       13f3e241836ebe6dadd9964bf49418bef745ae83
                       80cde1626d05449f594266fc4180e2c374bb1cd4
                       061f151ac1a71255c306e3591b3d530bff636ab3
                       3886b5164381900d290700ef5a44e5c127443f0f
                       bb3bbda7670a2ceab0de8bd246515095c8301e38
                       26a060a0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ef:1e:79:c8:55:de:08:32:7a:ec:b4:33:77:4c:2d:c2:76:c6:9e:c2]
            modulus: 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
    public exponent: 10001

] 
2021-05-11 12:08:38.482  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-11 12:08:38.484 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-11 12:08:38.485 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-11 12:08:38.486 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-11 12:08:38.487  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-11 12:08:38.488  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-11 12:08:38.488  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-11 12:08:38.489  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-11 12:08:38.489  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-11 12:08:38.496  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-11 12:08:38.497  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-11 12:08:38.497  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-11 12:08:38.499  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-11 12:08:38.603  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-11 12:08:38.604  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-11 12:08:38.604 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-11 12:08:38.607 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-11 12:08:38.609  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1352
2021-05-11 12:08:38.610  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-11 12:08:38.612  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-11 12:08:38.613  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-11 12:08:38.614  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-11 12:08:38.615  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-11 12:08:38.615 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-11 12:08:38.615 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-11 12:08:38.615 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-11 12:08:38.688 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-11 12:08:38.690 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-11 12:08:38.690 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-11 12:08:38.692 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-11 12:08:38.697 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 655606632742016797727441561468196706559246178733
             IssuerDN: UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 11 10:27:38 UTC 2021
           Final Date: Sun May 11 10:27:38 UTC 2031
            SubjectDN: UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:11:0e:41:76:c7:e0:97:55:ee:1b:47:4c:3b:19:60:5b:19:aa:94]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b21488da392be96302fa507b93dc3c670368a8c
                       53ea0b7d66fd68a21039950c493c6fc144e5f9cf
                       7fde09c48e8ff7c04237880a94b68fef931140b0
                       d6afe0de27777787bc562b82651ec35a4bd3b299
                       290e4b4cea0322c395d2c8a58a88496ed962d205
                       6c68fec8d040bcaa155afadb75e70ca805338639
                       a37eb58a0668b5924ee5d1a1e95846acf8463653
                       f904b38503b11bb596bd9e0ea537962a9bea5a8e
                       1b225d138f5c94052585d7fb12ce1a98707c0b32
                       dd337c06b9bc6a437c8d79f6c054ab6c2392b0cc
                       83cf10345534208d6d41c1405d76f00a3de6173d
                       6a32dcb59e68108a96786abfd05a3da42f51a0a0
                       ee12791e36d3c6d8da3438d451a3b323ffebda50
                       f2ebb6f067c08186086d45e741020fa69c49a485
                       13f3e241836ebe6dadd9964bf49418bef745ae83
                       80cde1626d05449f594266fc4180e2c374bb1cd4
                       061f151ac1a71255c306e3591b3d530bff636ab3
                       3886b5164381900d290700ef5a44e5c127443f0f
                       bb3bbda7670a2ceab0de8bd246515095c8301e38
                       26a060a0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [53:8d:b5:5d:71:f3:38:33:86:35:28:f7:80:cb:97:a1:a3:97:a0:4f]
            modulus: a36d6b8d07480bae37d07e47a2db3be0f167c54d494d769581c77346fcbc40c039b4ac69ca04bbec8cbe96c394ddc9020bf7c17d267565be6f1f043c05f9a94f394b111140e76e99b54594aeb5faa4d3a331de6b684f4672638972f0c4af5e987e4558ab3471cdb081bd20253d6c788401f19741fa9c0af702ec3c5d54859982153eaf667ac0f6022c432ed891efbda4c54aa8d94da0ac5a79c075ce1aa6dae92f6193c45c933d252c9be9ceb0d78beb3bd5ad0798b8c964f64f5d5989b17c49c0e4becee389a93ee8ca6242b614d9bcc5b31e46072f0f33502c6977c73aa898b63ce8c31047e4cc4eaf151fd537022354d77c8104fbfcaebeb8f08aebc2f63b
    public exponent: 10001

] 
2021-05-11 12:11:49.534  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-11 12:11:49.537 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-11 12:11:49.540 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-11 12:11:49.541 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-11 12:11:49.541  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-11 12:11:49.542  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-11 12:11:49.542  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-11 12:11:49.542  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-11 12:11:49.543  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-11 12:11:49.550  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-11 12:11:49.588  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-11 12:11:49.590  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-11 12:11:49.594  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-11 12:11:50.773  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-11 12:11:50.774  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-11 12:11:50.774 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-11 12:11:50.775 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-11 12:11:50.776  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1352
2021-05-11 12:11:50.776  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-11 12:11:50.777  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-11 12:11:50.778  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-11 12:11:50.778  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-11 12:11:50.778  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-11 12:11:50.779 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-11 12:11:50.779 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-11 12:11:50.779 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-11 12:11:50.780 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-11 12:11:50.780 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-11 12:11:50.781 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-11 12:11:50.781 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-11 12:11:50.784 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 655606632742016797727441561468196706559246178733
             IssuerDN: UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 11 10:27:38 UTC 2021
           Final Date: Sun May 11 10:27:38 UTC 2031
            SubjectDN: UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:11:0e:41:76:c7:e0:97:55:ee:1b:47:4c:3b:19:60:5b:19:aa:94]
            modulus: b2ca71afa0d2a997d5927505261e6cca665cfbe42a4a280c77126948ec20892369bde705a7652c74b14a70edce1e801f33be16ba31f469565eacc50ea4d221cf2baee5e85abcdefda6fa2abdd2c56b30fce08703334e6d404c87405eb323688d558b4c7361691aa639d939508a1620577d9436338c7235f5d810dbb673ff858a699821cdaf6b0bb2a28ccc392f3856c3d2e355435dc803f1c96b8f24cb5b4e409cb1192274b767cf9ada08dc54c2a3135efe53a5fa4850a7ee077da933713732cc6b24e0d2b569b44238d1cf9447080f34c3bb0b7dfbe460d2a285304dc4c58cf5920b54b239dc929becbef870bc2ae3ba8d91d3d5e0a9f0ad486253e8addae711d99706eb59126a91e8081d3551b1ffbedded519b87f0d853f17a83ed204e356de09eee7977b2172ee9aee304bba5e9723e7baf100bccc7face3e9b65ac1b9e7aafa290f84de0d0f183961110ae99058ad6d686d91aa4f9b0ac304862e3b98da346ec97739718705f8266ca5aeb7e5842f8f9757e0dcfa083963c004d6cd003
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b21488da392be96302fa507b93dc3c670368a8c
                       53ea0b7d66fd68a21039950c493c6fc144e5f9cf
                       7fde09c48e8ff7c04237880a94b68fef931140b0
                       d6afe0de27777787bc562b82651ec35a4bd3b299
                       290e4b4cea0322c395d2c8a58a88496ed962d205
                       6c68fec8d040bcaa155afadb75e70ca805338639
                       a37eb58a0668b5924ee5d1a1e95846acf8463653
                       f904b38503b11bb596bd9e0ea537962a9bea5a8e
                       1b225d138f5c94052585d7fb12ce1a98707c0b32
                       dd337c06b9bc6a437c8d79f6c054ab6c2392b0cc
                       83cf10345534208d6d41c1405d76f00a3de6173d
                       6a32dcb59e68108a96786abfd05a3da42f51a0a0
                       ee12791e36d3c6d8da3438d451a3b323ffebda50
                       f2ebb6f067c08186086d45e741020fa69c49a485
                       13f3e241836ebe6dadd9964bf49418bef745ae83
                       80cde1626d05449f594266fc4180e2c374bb1cd4
                       061f151ac1a71255c306e3591b3d530bff636ab3
                       3886b5164381900d290700ef5a44e5c127443f0f
                       bb3bbda7670a2ceab0de8bd246515095c8301e38
                       26a060a0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [85:33:53:09:bc:9e:a2:6a:51:76:0e:05:73:c7:94:9a:88:7a:a7:ad]
            modulus: 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
    public exponent: 10001

] 
2021-05-11 12:11:50.819  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-11 12:11:50.821 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-11 12:11:50.888 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-11 12:11:50.890 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-11 12:11:50.890  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-11 12:11:50.891  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-11 12:11:50.892  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-11 12:11:50.892  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-11 12:11:50.893  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-11 12:11:50.900  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-11 12:11:50.901  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-11 12:11:50.901  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-11 12:11:50.902  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-11 12:11:50.965  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-11 12:11:50.988  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-11 12:11:50.989 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-11 12:11:50.991 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-11 12:11:50.992  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1352
2021-05-11 12:11:50.992  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-11 12:11:50.994  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-11 12:11:50.994  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-11 12:11:50.995  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-11 12:11:50.995  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-11 12:11:50.995 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-11 12:11:50.996 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-11 12:11:50.996 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-11 12:11:50.997 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-11 12:11:50.997 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-11 12:11:50.997 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-11 12:11:50.998 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-11 12:11:51.001 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 655606632742016797727441561468196706559246178733
             IssuerDN: UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 11 10:27:38 UTC 2021
           Final Date: Sun May 11 10:27:38 UTC 2031
            SubjectDN: UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:11:0e:41:76:c7:e0:97:55:ee:1b:47:4c:3b:19:60:5b:19:aa:94]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b21488da392be96302fa507b93dc3c670368a8c
                       53ea0b7d66fd68a21039950c493c6fc144e5f9cf
                       7fde09c48e8ff7c04237880a94b68fef931140b0
                       d6afe0de27777787bc562b82651ec35a4bd3b299
                       290e4b4cea0322c395d2c8a58a88496ed962d205
                       6c68fec8d040bcaa155afadb75e70ca805338639
                       a37eb58a0668b5924ee5d1a1e95846acf8463653
                       f904b38503b11bb596bd9e0ea537962a9bea5a8e
                       1b225d138f5c94052585d7fb12ce1a98707c0b32
                       dd337c06b9bc6a437c8d79f6c054ab6c2392b0cc
                       83cf10345534208d6d41c1405d76f00a3de6173d
                       6a32dcb59e68108a96786abfd05a3da42f51a0a0
                       ee12791e36d3c6d8da3438d451a3b323ffebda50
                       f2ebb6f067c08186086d45e741020fa69c49a485
                       13f3e241836ebe6dadd9964bf49418bef745ae83
                       80cde1626d05449f594266fc4180e2c374bb1cd4
                       061f151ac1a71255c306e3591b3d530bff636ab3
                       3886b5164381900d290700ef5a44e5c127443f0f
                       bb3bbda7670a2ceab0de8bd246515095c8301e38
                       26a060a0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [14:66:91:61:d0:75:32:eb:d9:fe:20:31:bd:41:c8:2d:db:66:d7:99]
            modulus: 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
    public exponent: 10001

] 
2021-05-11 12:12:39.687  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-11 12:12:39.688 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-11 12:12:39.689 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-11 12:12:39.690 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-11 12:12:39.690  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-11 12:12:39.691  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-11 12:12:39.691  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-11 12:12:39.691  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-11 12:12:39.692  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-11 12:12:39.696  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-11 12:12:39.697  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-11 12:12:39.697  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-11 12:12:39.698  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-11 12:12:39.796  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-11 12:12:39.797  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-11 12:12:39.798 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-11 12:12:39.800 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-11 12:12:39.801  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1352
2021-05-11 12:12:39.801  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-11 12:12:39.803  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-11 12:12:39.804  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-11 12:12:39.804  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-11 12:12:39.804  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-11 12:12:39.805 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-11 12:12:39.805 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-11 12:12:39.806 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-11 12:12:39.806 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-11 12:12:39.807 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-11 12:12:39.807 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-11 12:12:39.808 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-11 12:12:39.811 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 655606632742016797727441561468196706559246178733
             IssuerDN: UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 11 10:27:38 UTC 2021
           Final Date: Sun May 11 10:27:38 UTC 2031
            SubjectDN: UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:11:0e:41:76:c7:e0:97:55:ee:1b:47:4c:3b:19:60:5b:19:aa:94]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b21488da392be96302fa507b93dc3c670368a8c
                       53ea0b7d66fd68a21039950c493c6fc144e5f9cf
                       7fde09c48e8ff7c04237880a94b68fef931140b0
                       d6afe0de27777787bc562b82651ec35a4bd3b299
                       290e4b4cea0322c395d2c8a58a88496ed962d205
                       6c68fec8d040bcaa155afadb75e70ca805338639
                       a37eb58a0668b5924ee5d1a1e95846acf8463653
                       f904b38503b11bb596bd9e0ea537962a9bea5a8e
                       1b225d138f5c94052585d7fb12ce1a98707c0b32
                       dd337c06b9bc6a437c8d79f6c054ab6c2392b0cc
                       83cf10345534208d6d41c1405d76f00a3de6173d
                       6a32dcb59e68108a96786abfd05a3da42f51a0a0
                       ee12791e36d3c6d8da3438d451a3b323ffebda50
                       f2ebb6f067c08186086d45e741020fa69c49a485
                       13f3e241836ebe6dadd9964bf49418bef745ae83
                       80cde1626d05449f594266fc4180e2c374bb1cd4
                       061f151ac1a71255c306e3591b3d530bff636ab3
                       3886b5164381900d290700ef5a44e5c127443f0f
                       bb3bbda7670a2ceab0de8bd246515095c8301e38
                       26a060a0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [02:91:11:ef:cc:34:1a:96:ca:7e:95:4d:4b:07:1d:ff:26:06:c3:58]
            modulus: 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
    public exponent: 10001

] 
2021-05-11 12:12:54.408  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-11 12:12:54.409 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-11 12:12:54.411 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-11 12:12:54.413 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-11 12:12:54.413  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-11 12:12:54.414  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-11 12:12:54.414  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-11 12:12:54.415  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-11 12:12:54.415  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-11 12:12:54.419  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-11 12:12:54.420  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-11 12:12:54.420  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-11 12:12:54.421  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-11 12:12:54.560  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-11 12:12:54.561  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-11 12:12:54.562 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-11 12:12:54.565 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-11 12:12:54.566  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1352
2021-05-11 12:12:54.566  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-11 12:12:54.568  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-11 12:12:54.569  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-11 12:12:54.569  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-11 12:12:54.570  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-11 12:12:54.570 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-11 12:12:54.588 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-11 12:12:54.588 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-11 12:12:54.589 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-11 12:12:54.590 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-11 12:12:54.590 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-11 12:12:54.590 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-11 12:12:54.592 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 655606632742016797727441561468196706559246178733
             IssuerDN: UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 11 10:27:38 UTC 2021
           Final Date: Sun May 11 10:27:38 UTC 2031
            SubjectDN: UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:11:0e:41:76:c7:e0:97:55:ee:1b:47:4c:3b:19:60:5b:19:aa:94]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b21488da392be96302fa507b93dc3c670368a8c
                       53ea0b7d66fd68a21039950c493c6fc144e5f9cf
                       7fde09c48e8ff7c04237880a94b68fef931140b0
                       d6afe0de27777787bc562b82651ec35a4bd3b299
                       290e4b4cea0322c395d2c8a58a88496ed962d205
                       6c68fec8d040bcaa155afadb75e70ca805338639
                       a37eb58a0668b5924ee5d1a1e95846acf8463653
                       f904b38503b11bb596bd9e0ea537962a9bea5a8e
                       1b225d138f5c94052585d7fb12ce1a98707c0b32
                       dd337c06b9bc6a437c8d79f6c054ab6c2392b0cc
                       83cf10345534208d6d41c1405d76f00a3de6173d
                       6a32dcb59e68108a96786abfd05a3da42f51a0a0
                       ee12791e36d3c6d8da3438d451a3b323ffebda50
                       f2ebb6f067c08186086d45e741020fa69c49a485
                       13f3e241836ebe6dadd9964bf49418bef745ae83
                       80cde1626d05449f594266fc4180e2c374bb1cd4
                       061f151ac1a71255c306e3591b3d530bff636ab3
                       3886b5164381900d290700ef5a44e5c127443f0f
                       bb3bbda7670a2ceab0de8bd246515095c8301e38
                       26a060a0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [25:af:38:f4:1e:a4:51:34:61:20:9a:8d:69:d0:1a:6d:57:da:fd:f8]
            modulus: 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
    public exponent: 10001

] 
2021-05-11 12:13:43.551  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-11 12:13:43.552 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-11 12:13:43.553 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-11 12:13:43.553 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-11 12:13:43.553  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-11 12:13:43.554  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-11 12:13:43.554  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-11 12:13:43.554  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-11 12:13:43.555  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-11 12:13:43.558  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-11 12:13:43.559  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-11 12:13:43.559  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-11 12:13:43.560  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-11 12:13:43.654  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-11 12:13:43.655  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-11 12:13:43.656 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-11 12:13:43.660 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-11 12:13:43.662  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1352
2021-05-11 12:13:43.663  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-11 12:13:43.665  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-11 12:13:43.665  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-11 12:13:43.666  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-11 12:13:43.688  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-11 12:13:43.689 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-11 12:13:43.690 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-11 12:13:43.690 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-11 12:13:43.691 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-11 12:13:43.691 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-11 12:13:43.691 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-11 12:13:43.692 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-11 12:13:43.695 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 655606632742016797727441561468196706559246178733
             IssuerDN: UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 11 10:27:38 UTC 2021
           Final Date: Sun May 11 10:27:38 UTC 2031
            SubjectDN: UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:11:0e:41:76:c7:e0:97:55:ee:1b:47:4c:3b:19:60:5b:19:aa:94]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b21488da392be96302fa507b93dc3c670368a8c
                       53ea0b7d66fd68a21039950c493c6fc144e5f9cf
                       7fde09c48e8ff7c04237880a94b68fef931140b0
                       d6afe0de27777787bc562b82651ec35a4bd3b299
                       290e4b4cea0322c395d2c8a58a88496ed962d205
                       6c68fec8d040bcaa155afadb75e70ca805338639
                       a37eb58a0668b5924ee5d1a1e95846acf8463653
                       f904b38503b11bb596bd9e0ea537962a9bea5a8e
                       1b225d138f5c94052585d7fb12ce1a98707c0b32
                       dd337c06b9bc6a437c8d79f6c054ab6c2392b0cc
                       83cf10345534208d6d41c1405d76f00a3de6173d
                       6a32dcb59e68108a96786abfd05a3da42f51a0a0
                       ee12791e36d3c6d8da3438d451a3b323ffebda50
                       f2ebb6f067c08186086d45e741020fa69c49a485
                       13f3e241836ebe6dadd9964bf49418bef745ae83
                       80cde1626d05449f594266fc4180e2c374bb1cd4
                       061f151ac1a71255c306e3591b3d530bff636ab3
                       3886b5164381900d290700ef5a44e5c127443f0f
                       bb3bbda7670a2ceab0de8bd246515095c8301e38
                       26a060a0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b1:31:66:6e:d6:f0:d1:3a:12:8f:08:42:40:14:3d:57:93:af:bc:df]
            modulus: 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
    public exponent: 10001

] 
2021-05-11 12:15:24.342  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-11 12:15:24.343 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-11 12:15:24.344 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-11 12:15:24.344 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-11 12:15:24.344  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-11 12:15:24.345  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-11 12:15:24.345  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-11 12:15:24.346  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-11 12:15:24.346  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-11 12:15:24.351  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-11 12:15:24.352  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-11 12:15:24.352  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-11 12:15:24.353  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-11 12:15:24.451  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-11 12:15:24.451  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-11 12:15:24.451 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-11 12:15:24.453 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-11 12:15:24.453  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1352
2021-05-11 12:15:24.454  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-11 12:15:24.455  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-11 12:15:24.455  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-11 12:15:24.456  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-11 12:15:24.456  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-11 12:15:24.456 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-11 12:15:24.456 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-11 12:15:24.457 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-11 12:15:24.457 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-11 12:15:24.458 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-11 12:15:24.458 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-11 12:15:24.459 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-11 12:15:24.462 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 655606632742016797727441561468196706559246178733
             IssuerDN: UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 11 10:27:38 UTC 2021
           Final Date: Sun May 11 10:27:38 UTC 2031
            SubjectDN: UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:11:0e:41:76:c7:e0:97:55:ee:1b:47:4c:3b:19:60:5b:19:aa:94]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b21488da392be96302fa507b93dc3c670368a8c
                       53ea0b7d66fd68a21039950c493c6fc144e5f9cf
                       7fde09c48e8ff7c04237880a94b68fef931140b0
                       d6afe0de27777787bc562b82651ec35a4bd3b299
                       290e4b4cea0322c395d2c8a58a88496ed962d205
                       6c68fec8d040bcaa155afadb75e70ca805338639
                       a37eb58a0668b5924ee5d1a1e95846acf8463653
                       f904b38503b11bb596bd9e0ea537962a9bea5a8e
                       1b225d138f5c94052585d7fb12ce1a98707c0b32
                       dd337c06b9bc6a437c8d79f6c054ab6c2392b0cc
                       83cf10345534208d6d41c1405d76f00a3de6173d
                       6a32dcb59e68108a96786abfd05a3da42f51a0a0
                       ee12791e36d3c6d8da3438d451a3b323ffebda50
                       f2ebb6f067c08186086d45e741020fa69c49a485
                       13f3e241836ebe6dadd9964bf49418bef745ae83
                       80cde1626d05449f594266fc4180e2c374bb1cd4
                       061f151ac1a71255c306e3591b3d530bff636ab3
                       3886b5164381900d290700ef5a44e5c127443f0f
                       bb3bbda7670a2ceab0de8bd246515095c8301e38
                       26a060a0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1f:13:4a:3e:4a:10:68:22:d2:ac:fa:8e:f2:d9:69:c0:b6:f4:a4:65]
            modulus: 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
    public exponent: 10001

] 
2021-05-11 12:18:18.855  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-11 12:18:18.857 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-11 12:18:18.859 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-11 12:18:18.860 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-11 12:18:18.860  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-11 12:18:18.861  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-11 12:18:18.861  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-11 12:18:18.862  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-11 12:18:18.862  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-11 12:18:18.869  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-11 12:18:18.869  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-11 12:18:18.870  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-11 12:18:18.871  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-11 12:18:19.006  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-11 12:18:19.006  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-11 12:18:19.007 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-11 12:18:19.008 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-11 12:18:19.008  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1352
2021-05-11 12:18:19.009  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-11 12:18:19.010  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-11 12:18:19.010  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-11 12:18:19.011  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-11 12:18:19.011  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-11 12:18:19.011 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-11 12:18:19.011 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-11 12:18:19.011 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-11 12:18:19.012 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-11 12:18:19.012 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-11 12:18:19.013 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-11 12:18:19.013 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-11 12:18:19.015 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 655606632742016797727441561468196706559246178733
             IssuerDN: UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 11 10:27:38 UTC 2021
           Final Date: Sun May 11 10:27:38 UTC 2031
            SubjectDN: UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:11:0e:41:76:c7:e0:97:55:ee:1b:47:4c:3b:19:60:5b:19:aa:94]
            modulus: b2ca71afa0d2a997d5927505261e6cca665cfbe42a4a280c77126948ec20892369bde705a7652c74b14a70edce1e801f33be16ba31f469565eacc50ea4d221cf2baee5e85abcdefda6fa2abdd2c56b30fce08703334e6d404c87405eb323688d558b4c7361691aa639d939508a1620577d9436338c7235f5d810dbb673ff858a699821cdaf6b0bb2a28ccc392f3856c3d2e355435dc803f1c96b8f24cb5b4e409cb1192274b767cf9ada08dc54c2a3135efe53a5fa4850a7ee077da933713732cc6b24e0d2b569b44238d1cf9447080f34c3bb0b7dfbe460d2a285304dc4c58cf5920b54b239dc929becbef870bc2ae3ba8d91d3d5e0a9f0ad486253e8addae711d99706eb59126a91e8081d3551b1ffbedded519b87f0d853f17a83ed204e356de09eee7977b2172ee9aee304bba5e9723e7baf100bccc7face3e9b65ac1b9e7aafa290f84de0d0f183961110ae99058ad6d686d91aa4f9b0ac304862e3b98da346ec97739718705f8266ca5aeb7e5842f8f9757e0dcfa083963c004d6cd003
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b21488da392be96302fa507b93dc3c670368a8c
                       53ea0b7d66fd68a21039950c493c6fc144e5f9cf
                       7fde09c48e8ff7c04237880a94b68fef931140b0
                       d6afe0de27777787bc562b82651ec35a4bd3b299
                       290e4b4cea0322c395d2c8a58a88496ed962d205
                       6c68fec8d040bcaa155afadb75e70ca805338639
                       a37eb58a0668b5924ee5d1a1e95846acf8463653
                       f904b38503b11bb596bd9e0ea537962a9bea5a8e
                       1b225d138f5c94052585d7fb12ce1a98707c0b32
                       dd337c06b9bc6a437c8d79f6c054ab6c2392b0cc
                       83cf10345534208d6d41c1405d76f00a3de6173d
                       6a32dcb59e68108a96786abfd05a3da42f51a0a0
                       ee12791e36d3c6d8da3438d451a3b323ffebda50
                       f2ebb6f067c08186086d45e741020fa69c49a485
                       13f3e241836ebe6dadd9964bf49418bef745ae83
                       80cde1626d05449f594266fc4180e2c374bb1cd4
                       061f151ac1a71255c306e3591b3d530bff636ab3
                       3886b5164381900d290700ef5a44e5c127443f0f
                       bb3bbda7670a2ceab0de8bd246515095c8301e38
                       26a060a0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [05:69:eb:89:95:aa:4a:44:bb:d3:e3:4a:29:9f:2d:0b:b1:c7:25:fa]
            modulus: 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
    public exponent: 10001

] 
2021-05-11 12:21:14.482  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-11 12:21:14.484 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-11 12:21:14.485 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-11 12:21:14.486 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-11 12:21:14.486  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-11 12:21:14.486  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-11 12:21:14.486  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-11 12:21:14.487  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-11 12:21:14.487  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-11 12:21:14.491  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-11 12:21:14.491  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-11 12:21:14.492  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-11 12:21:14.492  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-11 12:21:14.570  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-11 12:21:14.570  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-11 12:21:14.570 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-11 12:21:14.591 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-11 12:21:14.592  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1352
2021-05-11 12:21:14.592  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-11 12:21:14.594  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-11 12:21:14.595  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-11 12:21:14.595  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-11 12:21:14.595  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-11 12:21:14.596 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-11 12:21:14.596 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-11 12:21:14.597 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-11 12:21:14.597 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-11 12:21:14.598 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-11 12:21:14.598 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-11 12:21:14.598 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-11 12:21:14.601 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 655606632742016797727441561468196706559246178733
             IssuerDN: UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 11 10:27:38 UTC 2021
           Final Date: Sun May 11 10:27:38 UTC 2031
            SubjectDN: UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:11:0e:41:76:c7:e0:97:55:ee:1b:47:4c:3b:19:60:5b:19:aa:94]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b21488da392be96302fa507b93dc3c670368a8c
                       53ea0b7d66fd68a21039950c493c6fc144e5f9cf
                       7fde09c48e8ff7c04237880a94b68fef931140b0
                       d6afe0de27777787bc562b82651ec35a4bd3b299
                       290e4b4cea0322c395d2c8a58a88496ed962d205
                       6c68fec8d040bcaa155afadb75e70ca805338639
                       a37eb58a0668b5924ee5d1a1e95846acf8463653
                       f904b38503b11bb596bd9e0ea537962a9bea5a8e
                       1b225d138f5c94052585d7fb12ce1a98707c0b32
                       dd337c06b9bc6a437c8d79f6c054ab6c2392b0cc
                       83cf10345534208d6d41c1405d76f00a3de6173d
                       6a32dcb59e68108a96786abfd05a3da42f51a0a0
                       ee12791e36d3c6d8da3438d451a3b323ffebda50
                       f2ebb6f067c08186086d45e741020fa69c49a485
                       13f3e241836ebe6dadd9964bf49418bef745ae83
                       80cde1626d05449f594266fc4180e2c374bb1cd4
                       061f151ac1a71255c306e3591b3d530bff636ab3
                       3886b5164381900d290700ef5a44e5c127443f0f
                       bb3bbda7670a2ceab0de8bd246515095c8301e38
                       26a060a0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [97:c0:41:24:a5:c5:bc:ad:54:b4:f9:23:ed:6c:86:c4:70:13:dd:48]
            modulus: e5e8397ead2045a8f40f7be5796bc593fbea457d42e43aeb118cb8f31637a2474696f001ce11daf3e2f3e96216828ccfd99231cfe22e7b7813c3746726e38f7bd5aa53482500d91458d8e7ac2362b58d42c6cf0f2db4ffcd2d8eb7c3b19a55d86d65d8047689ef3f88ad33128cf7b3f10cbd6bde3bbf90a862218fcc827a4fae74223d176a283c6e7d6abbcb0ba264857389433085583bcecd08bbf5d86366b5c03d29b96d51779d9bc04d60805552501a528a4b03af6107623bf30036e5f846a0375134e2298540ca534bb897a871f5e6a5dc1f04aa84ff1a0d81927b5c9cf10fcb50c44d466cc2f21aa0180277a7aa49fbf4eb93974325e297660c6ced1aeb
    public exponent: 10001

] 
2021-05-11 12:23:11.412  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-11 12:23:11.414 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-11 12:23:11.415 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-11 12:23:11.416 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-11 12:23:11.416  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-11 12:23:11.416  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-11 12:23:11.417  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-11 12:23:11.417  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-11 12:23:11.417  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-11 12:23:11.422  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-11 12:23:11.423  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-11 12:23:11.423  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-11 12:23:11.424  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-11 12:23:11.497  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-11 12:23:11.498  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-11 12:23:11.498 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-11 12:23:11.500 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-11 12:23:11.501  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1352
2021-05-11 12:23:11.502  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-11 12:23:11.504  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-11 12:23:11.504  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-11 12:23:11.505  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-11 12:23:11.505  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-11 12:23:11.505 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-11 12:23:11.505 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-11 12:23:11.505 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-11 12:23:11.506 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-11 12:23:11.506 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-11 12:23:11.506 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-11 12:23:11.507 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-11 12:23:11.510 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 655606632742016797727441561468196706559246178733
             IssuerDN: UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 11 10:27:38 UTC 2021
           Final Date: Sun May 11 10:27:38 UTC 2031
            SubjectDN: UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:11:0e:41:76:c7:e0:97:55:ee:1b:47:4c:3b:19:60:5b:19:aa:94]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b21488da392be96302fa507b93dc3c670368a8c
                       53ea0b7d66fd68a21039950c493c6fc144e5f9cf
                       7fde09c48e8ff7c04237880a94b68fef931140b0
                       d6afe0de27777787bc562b82651ec35a4bd3b299
                       290e4b4cea0322c395d2c8a58a88496ed962d205
                       6c68fec8d040bcaa155afadb75e70ca805338639
                       a37eb58a0668b5924ee5d1a1e95846acf8463653
                       f904b38503b11bb596bd9e0ea537962a9bea5a8e
                       1b225d138f5c94052585d7fb12ce1a98707c0b32
                       dd337c06b9bc6a437c8d79f6c054ab6c2392b0cc
                       83cf10345534208d6d41c1405d76f00a3de6173d
                       6a32dcb59e68108a96786abfd05a3da42f51a0a0
                       ee12791e36d3c6d8da3438d451a3b323ffebda50
                       f2ebb6f067c08186086d45e741020fa69c49a485
                       13f3e241836ebe6dadd9964bf49418bef745ae83
                       80cde1626d05449f594266fc4180e2c374bb1cd4
                       061f151ac1a71255c306e3591b3d530bff636ab3
                       3886b5164381900d290700ef5a44e5c127443f0f
                       bb3bbda7670a2ceab0de8bd246515095c8301e38
                       26a060a0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0b:e2:1d:f1:a4:43:17:3c:3d:52:e3:ff:a5:f6:9f:91:6e:c6:cf:ae]
            modulus: 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
    public exponent: 10001

] 
2021-05-11 12:24:35.371  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-11 12:24:35.373 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-11 12:24:35.374 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-11 12:24:35.375 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-11 12:24:35.375  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-11 12:24:35.376  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-11 12:24:35.376  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-11 12:24:35.376  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-11 12:24:35.376  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-11 12:24:35.381  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-11 12:24:35.381  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-11 12:24:35.381  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-11 12:24:35.383  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-11 12:24:35.469  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-11 12:24:35.469  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-11 12:24:35.469 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-11 12:24:35.471 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-11 12:24:35.471  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1352
2021-05-11 12:24:35.472  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-11 12:24:35.473  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-11 12:24:35.473  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-11 12:24:35.473  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-11 12:24:35.474  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-11 12:24:35.474 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-11 12:24:35.474 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-11 12:24:35.474 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-11 12:24:35.475 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-11 12:24:35.475 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-11 12:24:35.475 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-11 12:24:35.476 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-11 12:24:35.478 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 655606632742016797727441561468196706559246178733
             IssuerDN: UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 11 10:27:38 UTC 2021
           Final Date: Sun May 11 10:27:38 UTC 2031
            SubjectDN: UID=c-0676915954d6849d0,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [77:11:0e:41:76:c7:e0:97:55:ee:1b:47:4c:3b:19:60:5b:19:aa:94]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b21488da392be96302fa507b93dc3c670368a8c
                       53ea0b7d66fd68a21039950c493c6fc144e5f9cf
                       7fde09c48e8ff7c04237880a94b68fef931140b0
                       d6afe0de27777787bc562b82651ec35a4bd3b299
                       290e4b4cea0322c395d2c8a58a88496ed962d205
                       6c68fec8d040bcaa155afadb75e70ca805338639
                       a37eb58a0668b5924ee5d1a1e95846acf8463653
                       f904b38503b11bb596bd9e0ea537962a9bea5a8e
                       1b225d138f5c94052585d7fb12ce1a98707c0b32
                       dd337c06b9bc6a437c8d79f6c054ab6c2392b0cc
                       83cf10345534208d6d41c1405d76f00a3de6173d
                       6a32dcb59e68108a96786abfd05a3da42f51a0a0
                       ee12791e36d3c6d8da3438d451a3b323ffebda50
                       f2ebb6f067c08186086d45e741020fa69c49a485
                       13f3e241836ebe6dadd9964bf49418bef745ae83
                       80cde1626d05449f594266fc4180e2c374bb1cd4
                       061f151ac1a71255c306e3591b3d530bff636ab3
                       3886b5164381900d290700ef5a44e5c127443f0f
                       bb3bbda7670a2ceab0de8bd246515095c8301e38
                       26a060a0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0d:15:6e:2c:c8:8b:33:3c:cf:7a:e2:e6:8a:26:ee:de:3c:a8:51:69]
            modulus: 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
    public exponent: 10001

]