Results

By type

          2021-05-12 09:00:55,880 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-05-12 09:01:00,389 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-05-12 09:01:03.290  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-05-12 09:01:15.985 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-05-12 09:01:16.994  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-05-12 09:01:17.775  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-05-12 09:01:31.993  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 38.505 seconds (JVM running for 45.828)
2021-05-12 09:09:23.677  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-12 09:09:23.685 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-12 09:09:23.799 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-12 09:09:23.802 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-12 09:09:23.884  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-12 09:09:23.887  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-12 09:09:23.891  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-12 09:09:23.891  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-12 09:09:23.891  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-12 09:09:23.980  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-12 09:09:23.983  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-12 09:09:24.185  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-12 09:09:24.273  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-12 09:09:24.273  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-12 09:09:24.287  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-12 09:09:25.686  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-12 09:09:25.780  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-12 09:09:25.781 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-12 09:09:25.790 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-12 09:09:25.870  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1636
2021-05-12 09:09:25.871  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-12 09:09:25.879  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-12 09:09:25.880  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-12 09:09:25.978  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-12 09:09:25.979  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-12 09:09:25.980 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-12 09:09:25.981 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-12 09:09:25.981 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-12 09:09:26.081 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-12 09:09:26.082 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-12 09:09:26.082 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-12 09:09:26.172 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-12 09:09:26.288 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 659705308442952710648631285744921418773812089631
             IssuerDN: UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 12 08:56:46 UTC 2021
           Final Date: Mon May 12 08:56:45 UTC 2031
            SubjectDN: UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3b:db:14:99:1d:2d:38:3c:fb:a1:fc:cb:25:1e:53:ce:95:d5:49:09]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 190e9775db83d020caf2d18a3ca47cba136b8a34
                       1f64a4dbf1760c25ae5e8b7b20ab12c151ca8d93
                       785b4b35881d2fa40712d929ec21282e4cc9308d
                       886d6da595eaca4e23240b76027c29574ac9cd36
                       0c678d23ffdf862d94d5d71be79aaef32e885966
                       b4ee8986c2bb163eaae4792bfa4a915185f495f1
                       bd38c7c5ec989e1dadd6aee48c049bbca9955f27
                       2ba27ecb4420780f3bf236d34f5cfc797c597558
                       1268c6c88746970ebe4bdf72ea6de0628cdf22e1
                       cd6bb4bcb108285b072f67ab3f541da95463c8ba
                       b8f32e3093644a3863b6178104613cdc93e7dea4
                       c2d6147146bb246d42b0bded8636502a445c3eb7
                       e60d7c9799fc8108e0f9120df1c82618d4a33967
                       503244205bded67e76f5e02516b25c91eb5964ea
                       c23c461b84b796efa28e801db26bde58b18e5abf
                       8fa3a66fdef5e18dde9366f5a2758a7f44b3fb53
                       0de9846ecfa17f5fcfa292bf918c80c637561c78
                       18ce6860f42e1b8d00b46f113932ee2e689f484f
                       8bce48a70fe9c3bc959207740b8e3bc248dd377a
                       f95da339
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [54:40:2f:6d:38:16:02:28:78:6d:87:de:f9:43:38:be:60:54:41:5b]
            modulus: 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
    public exponent: 10001

] 
2021-05-12 09:43:15.882  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-12 09:43:15.884 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-12 09:43:15.886 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-12 09:43:15.887 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-12 09:43:15.888  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-12 09:43:15.888  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-12 09:43:15.889  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-12 09:43:15.889  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-12 09:43:15.889  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-12 09:43:15.894  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-12 09:43:15.895  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-12 09:43:15.895  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-12 09:43:15.977  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-12 09:43:16.154  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-12 09:43:16.155  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-12 09:43:16.171 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-12 09:43:16.174 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-12 09:43:16.175  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1636
2021-05-12 09:43:16.176  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-12 09:43:16.182  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-12 09:43:16.183  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-12 09:43:16.184  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-12 09:43:16.184  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-12 09:43:16.185 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-12 09:43:16.186 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-12 09:43:16.186 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-12 09:43:16.187 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-12 09:43:16.187 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-12 09:43:16.187 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-12 09:43:16.188 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-12 09:43:16.192 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 659705308442952710648631285744921418773812089631
             IssuerDN: UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 12 08:56:46 UTC 2021
           Final Date: Mon May 12 08:56:45 UTC 2031
            SubjectDN: UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3b:db:14:99:1d:2d:38:3c:fb:a1:fc:cb:25:1e:53:ce:95:d5:49:09]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 190e9775db83d020caf2d18a3ca47cba136b8a34
                       1f64a4dbf1760c25ae5e8b7b20ab12c151ca8d93
                       785b4b35881d2fa40712d929ec21282e4cc9308d
                       886d6da595eaca4e23240b76027c29574ac9cd36
                       0c678d23ffdf862d94d5d71be79aaef32e885966
                       b4ee8986c2bb163eaae4792bfa4a915185f495f1
                       bd38c7c5ec989e1dadd6aee48c049bbca9955f27
                       2ba27ecb4420780f3bf236d34f5cfc797c597558
                       1268c6c88746970ebe4bdf72ea6de0628cdf22e1
                       cd6bb4bcb108285b072f67ab3f541da95463c8ba
                       b8f32e3093644a3863b6178104613cdc93e7dea4
                       c2d6147146bb246d42b0bded8636502a445c3eb7
                       e60d7c9799fc8108e0f9120df1c82618d4a33967
                       503244205bded67e76f5e02516b25c91eb5964ea
                       c23c461b84b796efa28e801db26bde58b18e5abf
                       8fa3a66fdef5e18dde9366f5a2758a7f44b3fb53
                       0de9846ecfa17f5fcfa292bf918c80c637561c78
                       18ce6860f42e1b8d00b46f113932ee2e689f484f
                       8bce48a70fe9c3bc959207740b8e3bc248dd377a
                       f95da339
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8a:68:48:8b:e6:31:60:d5:25:af:4f:7e:43:71:7d:a2:74:60:02:ee]
            modulus: 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
    public exponent: 10001

] 
2021-05-12 09:44:19.156  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-12 09:44:19.157 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-12 09:44:19.159 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-12 09:44:19.160 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-12 09:44:19.162  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-12 09:44:19.163  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-12 09:44:19.163  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-12 09:44:19.163  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-12 09:44:19.164  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-12 09:44:19.171  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-12 09:44:19.172  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-12 09:44:19.172  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-12 09:44:19.173  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-12 09:44:19.271  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-12 09:44:19.272  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-12 09:44:19.273 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-12 09:44:19.277 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-12 09:44:19.279  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1636
2021-05-12 09:44:19.279  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-12 09:44:19.283  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-12 09:44:19.284  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-12 09:44:19.284  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-12 09:44:19.285  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-12 09:44:19.285 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-12 09:44:19.286 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-12 09:44:19.286 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-12 09:44:19.287 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-12 09:44:19.287 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-12 09:44:19.287 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-12 09:44:19.371 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-12 09:44:19.377 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 659705308442952710648631285744921418773812089631
             IssuerDN: UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 12 08:56:46 UTC 2021
           Final Date: Mon May 12 08:56:45 UTC 2031
            SubjectDN: UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3b:db:14:99:1d:2d:38:3c:fb:a1:fc:cb:25:1e:53:ce:95:d5:49:09]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 190e9775db83d020caf2d18a3ca47cba136b8a34
                       1f64a4dbf1760c25ae5e8b7b20ab12c151ca8d93
                       785b4b35881d2fa40712d929ec21282e4cc9308d
                       886d6da595eaca4e23240b76027c29574ac9cd36
                       0c678d23ffdf862d94d5d71be79aaef32e885966
                       b4ee8986c2bb163eaae4792bfa4a915185f495f1
                       bd38c7c5ec989e1dadd6aee48c049bbca9955f27
                       2ba27ecb4420780f3bf236d34f5cfc797c597558
                       1268c6c88746970ebe4bdf72ea6de0628cdf22e1
                       cd6bb4bcb108285b072f67ab3f541da95463c8ba
                       b8f32e3093644a3863b6178104613cdc93e7dea4
                       c2d6147146bb246d42b0bded8636502a445c3eb7
                       e60d7c9799fc8108e0f9120df1c82618d4a33967
                       503244205bded67e76f5e02516b25c91eb5964ea
                       c23c461b84b796efa28e801db26bde58b18e5abf
                       8fa3a66fdef5e18dde9366f5a2758a7f44b3fb53
                       0de9846ecfa17f5fcfa292bf918c80c637561c78
                       18ce6860f42e1b8d00b46f113932ee2e689f484f
                       8bce48a70fe9c3bc959207740b8e3bc248dd377a
                       f95da339
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [af:bc:41:1e:c5:9a:e3:4a:57:90:31:44:79:6c:b5:f3:85:fe:10:b2]
            modulus: 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
    public exponent: 10001

] 
2021-05-12 09:47:31.649  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-12 09:47:31.651 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-12 09:47:31.652 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-12 09:47:31.653 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-12 09:47:31.653  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-12 09:47:31.654  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-12 09:47:31.654  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-12 09:47:31.654  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-12 09:47:31.655  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-12 09:47:31.662  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-12 09:47:31.662  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-12 09:47:31.663  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-12 09:47:31.664  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-12 09:47:31.733  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-12 09:47:31.734  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-12 09:47:31.734 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-12 09:47:31.772 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-12 09:47:31.773  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1636
2021-05-12 09:47:31.774  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-12 09:47:31.775  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-12 09:47:31.776  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-12 09:47:31.776  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-12 09:47:31.776  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-12 09:47:31.777 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-12 09:47:31.777 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-12 09:47:31.777 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-12 09:47:31.778 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-12 09:47:31.778 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-12 09:47:31.778 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-12 09:47:31.779 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-12 09:47:31.782 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 659705308442952710648631285744921418773812089631
             IssuerDN: UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 12 08:56:46 UTC 2021
           Final Date: Mon May 12 08:56:45 UTC 2031
            SubjectDN: UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3b:db:14:99:1d:2d:38:3c:fb:a1:fc:cb:25:1e:53:ce:95:d5:49:09]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 190e9775db83d020caf2d18a3ca47cba136b8a34
                       1f64a4dbf1760c25ae5e8b7b20ab12c151ca8d93
                       785b4b35881d2fa40712d929ec21282e4cc9308d
                       886d6da595eaca4e23240b76027c29574ac9cd36
                       0c678d23ffdf862d94d5d71be79aaef32e885966
                       b4ee8986c2bb163eaae4792bfa4a915185f495f1
                       bd38c7c5ec989e1dadd6aee48c049bbca9955f27
                       2ba27ecb4420780f3bf236d34f5cfc797c597558
                       1268c6c88746970ebe4bdf72ea6de0628cdf22e1
                       cd6bb4bcb108285b072f67ab3f541da95463c8ba
                       b8f32e3093644a3863b6178104613cdc93e7dea4
                       c2d6147146bb246d42b0bded8636502a445c3eb7
                       e60d7c9799fc8108e0f9120df1c82618d4a33967
                       503244205bded67e76f5e02516b25c91eb5964ea
                       c23c461b84b796efa28e801db26bde58b18e5abf
                       8fa3a66fdef5e18dde9366f5a2758a7f44b3fb53
                       0de9846ecfa17f5fcfa292bf918c80c637561c78
                       18ce6860f42e1b8d00b46f113932ee2e689f484f
                       8bce48a70fe9c3bc959207740b8e3bc248dd377a
                       f95da339
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b9:f8:50:93:c5:a7:6b:78:26:dd:c9:8c:d0:91:94:42:33:af:61:af]
            modulus: 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
    public exponent: 10001

] 
2021-05-12 09:48:16.736  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-12 09:48:16.738 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-12 09:48:16.740 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-12 09:48:16.741 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-12 09:48:16.741  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-12 09:48:16.742  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-12 09:48:16.742  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-12 09:48:16.743  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-12 09:48:16.743  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-12 09:48:16.770  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-12 09:48:16.771  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-12 09:48:16.771  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-12 09:48:16.773  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-12 09:48:16.839  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-12 09:48:16.870  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-12 09:48:16.871 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-12 09:48:16.873 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-12 09:48:16.874  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1636
2021-05-12 09:48:16.875  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-12 09:48:16.877  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-12 09:48:16.878  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-12 09:48:16.879  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-12 09:48:16.879  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-12 09:48:16.879 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-12 09:48:16.880 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-12 09:48:16.880 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-12 09:48:16.881 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-12 09:48:16.881 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-12 09:48:16.882 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-12 09:48:16.882 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-12 09:48:16.885 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 659705308442952710648631285744921418773812089631
             IssuerDN: UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 12 08:56:46 UTC 2021
           Final Date: Mon May 12 08:56:45 UTC 2031
            SubjectDN: UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3b:db:14:99:1d:2d:38:3c:fb:a1:fc:cb:25:1e:53:ce:95:d5:49:09]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 190e9775db83d020caf2d18a3ca47cba136b8a34
                       1f64a4dbf1760c25ae5e8b7b20ab12c151ca8d93
                       785b4b35881d2fa40712d929ec21282e4cc9308d
                       886d6da595eaca4e23240b76027c29574ac9cd36
                       0c678d23ffdf862d94d5d71be79aaef32e885966
                       b4ee8986c2bb163eaae4792bfa4a915185f495f1
                       bd38c7c5ec989e1dadd6aee48c049bbca9955f27
                       2ba27ecb4420780f3bf236d34f5cfc797c597558
                       1268c6c88746970ebe4bdf72ea6de0628cdf22e1
                       cd6bb4bcb108285b072f67ab3f541da95463c8ba
                       b8f32e3093644a3863b6178104613cdc93e7dea4
                       c2d6147146bb246d42b0bded8636502a445c3eb7
                       e60d7c9799fc8108e0f9120df1c82618d4a33967
                       503244205bded67e76f5e02516b25c91eb5964ea
                       c23c461b84b796efa28e801db26bde58b18e5abf
                       8fa3a66fdef5e18dde9366f5a2758a7f44b3fb53
                       0de9846ecfa17f5fcfa292bf918c80c637561c78
                       18ce6860f42e1b8d00b46f113932ee2e689f484f
                       8bce48a70fe9c3bc959207740b8e3bc248dd377a
                       f95da339
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [28:33:ef:0f:e1:7e:c4:83:41:a2:32:52:92:b5:cd:8c:3c:39:b2:b1]
            modulus: 9b8a4cb5540a5466ea71e2c43b381f8ff8524a23ac22111ac73ac801fb917c8ecd6285aa4051460760fb0c690cae180e0210a63bbab60b973160657ea24d86087355371b417ec48deee78f74e1c7b6c5c548d06c710afa9d8178b35bcf9c759922f93b9536159c6add7c186e84e3e517a63ca31435fdf9c25ff6e8e9a78d931c39de52c459d574222527d633f80c0c3d389b692a098f615883c05b7bc7aeafc58f04732ac86aa87b8ff01cbbe494a28a20cd5cf1cd085355226ee070ae1f74a349e620ee6ed504cc17efb45a7301a6034c11ba102dfbb359ffb348ece121d2b5a3eece92cb3c07c61b803783254518b98fb65347d11935ee03a4e203e7393fb3
    public exponent: 10001

] 
2021-05-12 09:48:29.423  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-12 09:48:29.424 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-12 09:48:29.426 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-12 09:48:29.426 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-12 09:48:29.427  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-12 09:48:29.427  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-12 09:48:29.427  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-12 09:48:29.428  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-12 09:48:29.428  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-12 09:48:29.433  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-12 09:48:29.433  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-12 09:48:29.433  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-12 09:48:29.434  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-12 09:48:29.492  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-12 09:48:29.493  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-12 09:48:29.493 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-12 09:48:29.495 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-12 09:48:29.495  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1636
2021-05-12 09:48:29.496  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-12 09:48:29.498  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-12 09:48:29.498  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-12 09:48:29.499  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-12 09:48:29.499  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-12 09:48:29.499 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-12 09:48:29.500 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-12 09:48:29.500 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-12 09:48:29.501 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-12 09:48:29.502 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-12 09:48:29.502 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-12 09:48:29.570 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-12 09:48:29.574 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 659705308442952710648631285744921418773812089631
             IssuerDN: UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 12 08:56:46 UTC 2021
           Final Date: Mon May 12 08:56:45 UTC 2031
            SubjectDN: UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3b:db:14:99:1d:2d:38:3c:fb:a1:fc:cb:25:1e:53:ce:95:d5:49:09]
            modulus: ef13e7df2264dcd88394f7af4f25b648297c4257cc1c2c1966b913a1cb7b3f7ea3a7dfcd647e0577df1563c6479c10148b05955e29d11499b45371f0cd255c8c3af6c8376ffd8758940b9d007288c621ce055d00fd73e237c097c5c9ea807cc53b3a151335398638294f569857312c6d12b5bb4cca7f60be06b13c5dce705e53d4bb90e6dda3a46942a3862f2bcd175d2b9d175525d3b87cd6aba14cba21d9c81b14cf2d42ce0a9dc066999345de880a37ce8360c1ed41dfea9d3c2d665c070911a971cb21493a78aca2304f11d8cd0a65a0d9075de434c5e7ad5775d33c5ba1cbec163c8e083119a191eb9e46494c1a901a3c18bbb599a78aa8d759cd6e563f568d3fdaca42a2ee6c4543c3778381601683ca3ea0970a0ceb9661e3d163e164aa99d35642d96c8f4afac289413b1212212c868ca64bb8783c9f86727238c55236db389e81bdee6f44ddd7a01f29994bcf932ad11737a556ac621f6fc6731fe8171f9891be5729a9a72b14b7fe5fb0e42358abf853c2b08b2650c799109ffe77
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 190e9775db83d020caf2d18a3ca47cba136b8a34
                       1f64a4dbf1760c25ae5e8b7b20ab12c151ca8d93
                       785b4b35881d2fa40712d929ec21282e4cc9308d
                       886d6da595eaca4e23240b76027c29574ac9cd36
                       0c678d23ffdf862d94d5d71be79aaef32e885966
                       b4ee8986c2bb163eaae4792bfa4a915185f495f1
                       bd38c7c5ec989e1dadd6aee48c049bbca9955f27
                       2ba27ecb4420780f3bf236d34f5cfc797c597558
                       1268c6c88746970ebe4bdf72ea6de0628cdf22e1
                       cd6bb4bcb108285b072f67ab3f541da95463c8ba
                       b8f32e3093644a3863b6178104613cdc93e7dea4
                       c2d6147146bb246d42b0bded8636502a445c3eb7
                       e60d7c9799fc8108e0f9120df1c82618d4a33967
                       503244205bded67e76f5e02516b25c91eb5964ea
                       c23c461b84b796efa28e801db26bde58b18e5abf
                       8fa3a66fdef5e18dde9366f5a2758a7f44b3fb53
                       0de9846ecfa17f5fcfa292bf918c80c637561c78
                       18ce6860f42e1b8d00b46f113932ee2e689f484f
                       8bce48a70fe9c3bc959207740b8e3bc248dd377a
                       f95da339
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [32:ea:42:51:72:de:bc:9d:d3:a4:4a:d3:2d:fb:f1:68:77:7e:e5:e8]
            modulus: 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
    public exponent: 10001

] 
2021-05-12 09:49:19.621  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-12 09:49:19.622 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-12 09:49:19.624 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-12 09:49:19.625 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-12 09:49:19.625  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-12 09:49:19.626  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-12 09:49:19.627  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-12 09:49:19.627  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-12 09:49:19.627  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-12 09:49:19.631  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-12 09:49:19.632  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-12 09:49:19.632  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-12 09:49:19.633  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-12 09:49:19.741  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-12 09:49:19.742  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-12 09:49:19.742 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-12 09:49:19.744 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-12 09:49:19.745  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1636
2021-05-12 09:49:19.745  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-12 09:49:19.747  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-12 09:49:19.748  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-12 09:49:19.748  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-12 09:49:19.749  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-12 09:49:19.749 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-12 09:49:19.750 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-12 09:49:19.750 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-12 09:49:19.750 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-12 09:49:19.751 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-12 09:49:19.751 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-12 09:49:19.770 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-12 09:49:19.776 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 659705308442952710648631285744921418773812089631
             IssuerDN: UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 12 08:56:46 UTC 2021
           Final Date: Mon May 12 08:56:45 UTC 2031
            SubjectDN: UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3b:db:14:99:1d:2d:38:3c:fb:a1:fc:cb:25:1e:53:ce:95:d5:49:09]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 190e9775db83d020caf2d18a3ca47cba136b8a34
                       1f64a4dbf1760c25ae5e8b7b20ab12c151ca8d93
                       785b4b35881d2fa40712d929ec21282e4cc9308d
                       886d6da595eaca4e23240b76027c29574ac9cd36
                       0c678d23ffdf862d94d5d71be79aaef32e885966
                       b4ee8986c2bb163eaae4792bfa4a915185f495f1
                       bd38c7c5ec989e1dadd6aee48c049bbca9955f27
                       2ba27ecb4420780f3bf236d34f5cfc797c597558
                       1268c6c88746970ebe4bdf72ea6de0628cdf22e1
                       cd6bb4bcb108285b072f67ab3f541da95463c8ba
                       b8f32e3093644a3863b6178104613cdc93e7dea4
                       c2d6147146bb246d42b0bded8636502a445c3eb7
                       e60d7c9799fc8108e0f9120df1c82618d4a33967
                       503244205bded67e76f5e02516b25c91eb5964ea
                       c23c461b84b796efa28e801db26bde58b18e5abf
                       8fa3a66fdef5e18dde9366f5a2758a7f44b3fb53
                       0de9846ecfa17f5fcfa292bf918c80c637561c78
                       18ce6860f42e1b8d00b46f113932ee2e689f484f
                       8bce48a70fe9c3bc959207740b8e3bc248dd377a
                       f95da339
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [75:8b:28:ef:7a:b8:ef:d2:53:27:c4:f7:96:e8:13:8e:80:c6:98:6e]
            modulus: 99837dfecbcdbfdad2eea8dcdfa3598712007c3e666ca8498c53dba26ea70f7e9dab324fe077143ac9861fdd689900f04e696ea84c142d790af5ad3983819312d8a6e2c963b72f3ca10101296c42db92aec9592deacbaebe525d8ae9d0389a973d86db4e7933cf7ec2c4ad55621fe22d8ef68881e46916ad12c065567e891355fdf4046f1c480a3e8e44686e0fe5765402f578b4d7c742c9f1882a87170ead8d37e78965add4ce692307f120c25754d3d967520f826f73ec8f8a5e6d1f784f2ab6d81cbd06d1ddc4733d2f9fb48a0fe7a3204c9777241541747a131b6bf822b08a7fc4341e798ff7dff4102e766c05f4ba5168b7161735ad6fe7a9da08cbdec9
    public exponent: 10001

] 
2021-05-12 09:49:26.974  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-12 09:49:26.975 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-12 09:49:26.978 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-12 09:49:26.979 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-12 09:49:26.979  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-12 09:49:26.980  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-12 09:49:26.981  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-12 09:49:26.981  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-12 09:49:26.982  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-12 09:49:26.987  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-12 09:49:26.987  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-12 09:49:26.988  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-12 09:49:26.989  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-12 09:49:27.170  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-12 09:49:27.171  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-12 09:49:27.171 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-12 09:49:27.173 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-12 09:49:27.174  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1636
2021-05-12 09:49:27.174  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-12 09:49:27.177  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-12 09:49:27.178  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-12 09:49:27.179  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-12 09:49:27.179  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-12 09:49:27.179 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-12 09:49:27.180 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-12 09:49:27.180 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-12 09:49:27.181 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-12 09:49:27.182 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-12 09:49:27.182 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-12 09:49:27.183 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-12 09:49:27.186 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 659705308442952710648631285744921418773812089631
             IssuerDN: UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 12 08:56:46 UTC 2021
           Final Date: Mon May 12 08:56:45 UTC 2031
            SubjectDN: UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3b:db:14:99:1d:2d:38:3c:fb:a1:fc:cb:25:1e:53:ce:95:d5:49:09]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 190e9775db83d020caf2d18a3ca47cba136b8a34
                       1f64a4dbf1760c25ae5e8b7b20ab12c151ca8d93
                       785b4b35881d2fa40712d929ec21282e4cc9308d
                       886d6da595eaca4e23240b76027c29574ac9cd36
                       0c678d23ffdf862d94d5d71be79aaef32e885966
                       b4ee8986c2bb163eaae4792bfa4a915185f495f1
                       bd38c7c5ec989e1dadd6aee48c049bbca9955f27
                       2ba27ecb4420780f3bf236d34f5cfc797c597558
                       1268c6c88746970ebe4bdf72ea6de0628cdf22e1
                       cd6bb4bcb108285b072f67ab3f541da95463c8ba
                       b8f32e3093644a3863b6178104613cdc93e7dea4
                       c2d6147146bb246d42b0bded8636502a445c3eb7
                       e60d7c9799fc8108e0f9120df1c82618d4a33967
                       503244205bded67e76f5e02516b25c91eb5964ea
                       c23c461b84b796efa28e801db26bde58b18e5abf
                       8fa3a66fdef5e18dde9366f5a2758a7f44b3fb53
                       0de9846ecfa17f5fcfa292bf918c80c637561c78
                       18ce6860f42e1b8d00b46f113932ee2e689f484f
                       8bce48a70fe9c3bc959207740b8e3bc248dd377a
                       f95da339
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ea:24:a0:7c:4d:46:08:81:cb:85:37:5e:b8:db:13:e1:7d:51:69:53]
            modulus: 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
    public exponent: 10001

] 
2021-05-12 09:51:14.703  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-12 09:51:14.705 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-12 09:51:14.706 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-12 09:51:14.706 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-12 09:51:14.707  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-12 09:51:14.707  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-12 09:51:14.707  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-12 09:51:14.708  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-12 09:51:14.708  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-12 09:51:14.713  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-12 09:51:14.714  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-12 09:51:14.714  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-12 09:51:14.715  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-12 09:51:14.835  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-12 09:51:14.835  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-12 09:51:14.836 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-12 09:51:14.837 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-12 09:51:14.838  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1636
2021-05-12 09:51:14.838  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-12 09:51:14.839  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-12 09:51:14.839  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-12 09:51:14.840  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-12 09:51:14.840  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-12 09:51:14.840 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-12 09:51:14.840 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-12 09:51:14.840 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-12 09:51:14.841 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-12 09:51:14.841 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-12 09:51:14.841 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-12 09:51:14.842 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-12 09:51:14.871 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 659705308442952710648631285744921418773812089631
             IssuerDN: UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 12 08:56:46 UTC 2021
           Final Date: Mon May 12 08:56:45 UTC 2031
            SubjectDN: UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3b:db:14:99:1d:2d:38:3c:fb:a1:fc:cb:25:1e:53:ce:95:d5:49:09]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 190e9775db83d020caf2d18a3ca47cba136b8a34
                       1f64a4dbf1760c25ae5e8b7b20ab12c151ca8d93
                       785b4b35881d2fa40712d929ec21282e4cc9308d
                       886d6da595eaca4e23240b76027c29574ac9cd36
                       0c678d23ffdf862d94d5d71be79aaef32e885966
                       b4ee8986c2bb163eaae4792bfa4a915185f495f1
                       bd38c7c5ec989e1dadd6aee48c049bbca9955f27
                       2ba27ecb4420780f3bf236d34f5cfc797c597558
                       1268c6c88746970ebe4bdf72ea6de0628cdf22e1
                       cd6bb4bcb108285b072f67ab3f541da95463c8ba
                       b8f32e3093644a3863b6178104613cdc93e7dea4
                       c2d6147146bb246d42b0bded8636502a445c3eb7
                       e60d7c9799fc8108e0f9120df1c82618d4a33967
                       503244205bded67e76f5e02516b25c91eb5964ea
                       c23c461b84b796efa28e801db26bde58b18e5abf
                       8fa3a66fdef5e18dde9366f5a2758a7f44b3fb53
                       0de9846ecfa17f5fcfa292bf918c80c637561c78
                       18ce6860f42e1b8d00b46f113932ee2e689f484f
                       8bce48a70fe9c3bc959207740b8e3bc248dd377a
                       f95da339
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [93:f3:7b:b1:b5:84:51:b8:89:4c:f7:8a:24:97:ed:87:78:d9:cd:c9]
            modulus: a3b8f0b0f1e7fa9a1bcb197376d0035cd19be7649440bd2cd88abdb4d8b7e41bba2d8811456fe4810a8162b28aacd776f555049c475fba12c29e8ee440bedd3aee8a465ba341a48ee88b7e3654d5ab8d0d4a1bb6a4aa154255119653a8b6180391428ce7417c8de15ab7efbc7094fa1d02ce9815b208855192dc61cf0eadcc1b9d714f7e5a9477ed4c488225218155b3458ee3e93bf8a0bd8365c2fb92370811c9adef36c67438ddf504b525538321c14ef21f967e3144ad2ade8f01050d314c3d934d03145bb4101d303a3461cba07f4dea75ea834f4c2d7e27e76100ff281339dede82fb69f9219af5c7531519b9c3fc4548b9e535b68b3eb6c8fd41b93827
    public exponent: 10001

] 
2021-05-12 09:52:55.777  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-12 09:52:55.778 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-12 09:52:55.780 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-12 09:52:55.781 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-12 09:52:55.781  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-12 09:52:55.782  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-12 09:52:55.782  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-12 09:52:55.782  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-12 09:52:55.782  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-12 09:52:55.786  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-12 09:52:55.787  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-12 09:52:55.787  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-12 09:52:55.791  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-12 09:52:55.947  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-12 09:52:55.947  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-12 09:52:55.948 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-12 09:52:55.972 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-12 09:52:55.973  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1636
2021-05-12 09:52:55.973  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-12 09:52:55.976  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-12 09:52:55.977  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-12 09:52:55.978  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-12 09:52:55.978  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-12 09:52:55.979 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-12 09:52:55.979 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-12 09:52:55.980 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-12 09:52:55.981 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-12 09:52:55.982 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-12 09:52:55.982 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-12 09:52:55.983 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-12 09:52:55.985 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 659705308442952710648631285744921418773812089631
             IssuerDN: UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 12 08:56:46 UTC 2021
           Final Date: Mon May 12 08:56:45 UTC 2031
            SubjectDN: UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3b:db:14:99:1d:2d:38:3c:fb:a1:fc:cb:25:1e:53:ce:95:d5:49:09]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 190e9775db83d020caf2d18a3ca47cba136b8a34
                       1f64a4dbf1760c25ae5e8b7b20ab12c151ca8d93
                       785b4b35881d2fa40712d929ec21282e4cc9308d
                       886d6da595eaca4e23240b76027c29574ac9cd36
                       0c678d23ffdf862d94d5d71be79aaef32e885966
                       b4ee8986c2bb163eaae4792bfa4a915185f495f1
                       bd38c7c5ec989e1dadd6aee48c049bbca9955f27
                       2ba27ecb4420780f3bf236d34f5cfc797c597558
                       1268c6c88746970ebe4bdf72ea6de0628cdf22e1
                       cd6bb4bcb108285b072f67ab3f541da95463c8ba
                       b8f32e3093644a3863b6178104613cdc93e7dea4
                       c2d6147146bb246d42b0bded8636502a445c3eb7
                       e60d7c9799fc8108e0f9120df1c82618d4a33967
                       503244205bded67e76f5e02516b25c91eb5964ea
                       c23c461b84b796efa28e801db26bde58b18e5abf
                       8fa3a66fdef5e18dde9366f5a2758a7f44b3fb53
                       0de9846ecfa17f5fcfa292bf918c80c637561c78
                       18ce6860f42e1b8d00b46f113932ee2e689f484f
                       8bce48a70fe9c3bc959207740b8e3bc248dd377a
                       f95da339
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [24:17:3e:1b:42:25:e0:fb:d4:09:ed:e3:91:71:5c:64:32:ed:9b:24]
            modulus: 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
    public exponent: 10001

] 
2021-05-12 09:56:07.504  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-12 09:56:07.507 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-12 09:56:07.509 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-12 09:56:07.510 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-12 09:56:07.510  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-12 09:56:07.511  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-12 09:56:07.511  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-12 09:56:07.512  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-12 09:56:07.512  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-12 09:56:07.516  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-12 09:56:07.517  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-12 09:56:07.517  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-12 09:56:07.518  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-12 09:56:07.638  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-12 09:56:07.639  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-12 09:56:07.639 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-12 09:56:07.641 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-12 09:56:07.642  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1636
2021-05-12 09:56:07.642  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-12 09:56:07.643  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-12 09:56:07.644  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-12 09:56:07.671  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-12 09:56:07.672  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-12 09:56:07.672 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-12 09:56:07.672 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-12 09:56:07.673 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-12 09:56:07.674 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-12 09:56:07.675 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-12 09:56:07.675 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-12 09:56:07.676 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-12 09:56:07.678 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 659705308442952710648631285744921418773812089631
             IssuerDN: UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 12 08:56:46 UTC 2021
           Final Date: Mon May 12 08:56:45 UTC 2031
            SubjectDN: UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3b:db:14:99:1d:2d:38:3c:fb:a1:fc:cb:25:1e:53:ce:95:d5:49:09]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 190e9775db83d020caf2d18a3ca47cba136b8a34
                       1f64a4dbf1760c25ae5e8b7b20ab12c151ca8d93
                       785b4b35881d2fa40712d929ec21282e4cc9308d
                       886d6da595eaca4e23240b76027c29574ac9cd36
                       0c678d23ffdf862d94d5d71be79aaef32e885966
                       b4ee8986c2bb163eaae4792bfa4a915185f495f1
                       bd38c7c5ec989e1dadd6aee48c049bbca9955f27
                       2ba27ecb4420780f3bf236d34f5cfc797c597558
                       1268c6c88746970ebe4bdf72ea6de0628cdf22e1
                       cd6bb4bcb108285b072f67ab3f541da95463c8ba
                       b8f32e3093644a3863b6178104613cdc93e7dea4
                       c2d6147146bb246d42b0bded8636502a445c3eb7
                       e60d7c9799fc8108e0f9120df1c82618d4a33967
                       503244205bded67e76f5e02516b25c91eb5964ea
                       c23c461b84b796efa28e801db26bde58b18e5abf
                       8fa3a66fdef5e18dde9366f5a2758a7f44b3fb53
                       0de9846ecfa17f5fcfa292bf918c80c637561c78
                       18ce6860f42e1b8d00b46f113932ee2e689f484f
                       8bce48a70fe9c3bc959207740b8e3bc248dd377a
                       f95da339
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [51:d0:cf:2d:74:ca:8b:34:0e:6c:d1:73:64:d4:92:55:60:0d:a1:72]
            modulus: 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
    public exponent: 10001

] 
2021-05-12 09:57:53.956  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-12 09:57:53.957 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-12 09:57:53.958 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-12 09:57:53.959 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-12 09:57:53.959  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-12 09:57:53.960  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-12 09:57:53.960  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-12 09:57:53.960  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-12 09:57:53.960  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-12 09:57:53.965  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-12 09:57:53.965  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-12 09:57:53.966  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-12 09:57:53.967  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-12 09:57:54.039  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-12 09:57:54.041  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-12 09:57:54.041 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-12 09:57:54.045 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-12 09:57:54.046  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1636
2021-05-12 09:57:54.047  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-12 09:57:54.048  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-12 09:57:54.048  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-12 09:57:54.049  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-12 09:57:54.049  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-12 09:57:54.049 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-12 09:57:54.049 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-12 09:57:54.049 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-12 09:57:54.050 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-12 09:57:54.050 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-12 09:57:54.050 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-12 09:57:54.051 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-12 09:57:54.054 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 659705308442952710648631285744921418773812089631
             IssuerDN: UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 12 08:56:46 UTC 2021
           Final Date: Mon May 12 08:56:45 UTC 2031
            SubjectDN: UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3b:db:14:99:1d:2d:38:3c:fb:a1:fc:cb:25:1e:53:ce:95:d5:49:09]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 190e9775db83d020caf2d18a3ca47cba136b8a34
                       1f64a4dbf1760c25ae5e8b7b20ab12c151ca8d93
                       785b4b35881d2fa40712d929ec21282e4cc9308d
                       886d6da595eaca4e23240b76027c29574ac9cd36
                       0c678d23ffdf862d94d5d71be79aaef32e885966
                       b4ee8986c2bb163eaae4792bfa4a915185f495f1
                       bd38c7c5ec989e1dadd6aee48c049bbca9955f27
                       2ba27ecb4420780f3bf236d34f5cfc797c597558
                       1268c6c88746970ebe4bdf72ea6de0628cdf22e1
                       cd6bb4bcb108285b072f67ab3f541da95463c8ba
                       b8f32e3093644a3863b6178104613cdc93e7dea4
                       c2d6147146bb246d42b0bded8636502a445c3eb7
                       e60d7c9799fc8108e0f9120df1c82618d4a33967
                       503244205bded67e76f5e02516b25c91eb5964ea
                       c23c461b84b796efa28e801db26bde58b18e5abf
                       8fa3a66fdef5e18dde9366f5a2758a7f44b3fb53
                       0de9846ecfa17f5fcfa292bf918c80c637561c78
                       18ce6860f42e1b8d00b46f113932ee2e689f484f
                       8bce48a70fe9c3bc959207740b8e3bc248dd377a
                       f95da339
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c9:fd:2c:7f:71:c8:19:54:fc:24:36:54:e9:b1:0a:59:12:ab:b8:cc]
            modulus: 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
    public exponent: 10001

] 
2021-05-12 09:59:34.286  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-12 09:59:34.288 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-12 09:59:34.289 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-12 09:59:34.289 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-12 09:59:34.290  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-12 09:59:34.290  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-12 09:59:34.290  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-12 09:59:34.290  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-12 09:59:34.291  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-12 09:59:34.295  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-12 09:59:34.296  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-12 09:59:34.296  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-12 09:59:34.297  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-12 09:59:34.372  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-12 09:59:34.373  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-12 09:59:34.373 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-12 09:59:34.375 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-12 09:59:34.376  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1636
2021-05-12 09:59:34.376  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-12 09:59:34.379  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-12 09:59:34.379  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-12 09:59:34.380  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-12 09:59:34.380  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-12 09:59:34.380 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-12 09:59:34.381 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-12 09:59:34.381 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-12 09:59:34.381 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-12 09:59:34.382 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-12 09:59:34.382 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-12 09:59:34.383 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-12 09:59:34.386 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 659705308442952710648631285744921418773812089631
             IssuerDN: UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 12 08:56:46 UTC 2021
           Final Date: Mon May 12 08:56:45 UTC 2031
            SubjectDN: UID=c-0xrzc5bx6v0wjcwax,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3b:db:14:99:1d:2d:38:3c:fb:a1:fc:cb:25:1e:53:ce:95:d5:49:09]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 190e9775db83d020caf2d18a3ca47cba136b8a34
                       1f64a4dbf1760c25ae5e8b7b20ab12c151ca8d93
                       785b4b35881d2fa40712d929ec21282e4cc9308d
                       886d6da595eaca4e23240b76027c29574ac9cd36
                       0c678d23ffdf862d94d5d71be79aaef32e885966
                       b4ee8986c2bb163eaae4792bfa4a915185f495f1
                       bd38c7c5ec989e1dadd6aee48c049bbca9955f27
                       2ba27ecb4420780f3bf236d34f5cfc797c597558
                       1268c6c88746970ebe4bdf72ea6de0628cdf22e1
                       cd6bb4bcb108285b072f67ab3f541da95463c8ba
                       b8f32e3093644a3863b6178104613cdc93e7dea4
                       c2d6147146bb246d42b0bded8636502a445c3eb7
                       e60d7c9799fc8108e0f9120df1c82618d4a33967
                       503244205bded67e76f5e02516b25c91eb5964ea
                       c23c461b84b796efa28e801db26bde58b18e5abf
                       8fa3a66fdef5e18dde9366f5a2758a7f44b3fb53
                       0de9846ecfa17f5fcfa292bf918c80c637561c78
                       18ce6860f42e1b8d00b46f113932ee2e689f484f
                       8bce48a70fe9c3bc959207740b8e3bc248dd377a
                       f95da339
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [dd:b3:fb:bf:bb:1a:5a:75:e4:46:5c:6d:e8:91:8f:80:f1:12:82:a9]
            modulus: b17817b6ef2e58b0310679b5abb3bfdf03bc4199eae30eb144f6dbb6ea99306ba3ed331268ba61064119cfd1246b9d0c37b95420a1cce3bcc6a8e0deb3b944baaeebe670775bf882c0cc86cf8c93e4e0dab93674ffc4445e4edd54c276a00e950c8bd49ebbecee0510a6127c34c9a3fe029ef0addcda3ac26a61955b197ffaf1e78ae2f8be017501d74b1e21d4b8f8b871f1846369a7736fbd43efb6224d1631153a699da7b108106541ef142fb0bc55748eb12bfe6e8373ed41f388bd4e7f5b187b9e94f0593a286917882ad7514e16240702e2a3c0f263e2849325484e4a48cac3001b72c3af73aa9801531786d7709672a124b22b7fda8f789409d3c3beff
    public exponent: 10001

]