2021-05-28 09:39:34,938 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-05-28 09:39:39,334 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-05-28 09:39:42.639  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-05-28 09:39:55.645 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-05-28 09:39:57.138  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-05-28 09:39:57.935  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-05-28 09:40:12.543  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 40.111 seconds (JVM running for 48.011) 2021-05-28 09:54:43.039  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-28 09:54:43.125 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-28 09:54:43.231 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-28 09:54:43.235 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-28 09:54:43.326  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-28 09:54:43.329  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-28 09:54:43.334  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-28 09:54:43.335  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 09:54:43.336  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-28 09:54:43.343  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-28 09:54:43.346  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-28 09:54:43.544  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-28 09:54:43.626  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 09:54:43.627  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 09:54:43.823  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-28 09:54:45.339  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-28 09:54:45.342  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-28 09:54:45.423 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-28 09:54:45.436 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-28 09:54:45.438  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1645 2021-05-28 09:54:45.438  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-28 09:54:45.523  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-28 09:54:45.524  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-28 09:54:45.531  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-28 09:54:45.532  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-28 09:54:45.533 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 09:54:45.534 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 09:54:45.534 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 09:54:45.629 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 09:54:45.630 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 09:54:45.631 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 09:54:45.637 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-28 09:54:45.742 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336345454089392970900159137318025890604535387461 IssuerDN: UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 28 09:34:55 UTC 2021 Final Date: Wed May 28 09:34:54 UTC 2031 SubjectDN: UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [05:5c:0a:3a:d6:39:9a:a8:e4:62:ae:24:bc:5d:15:4f:6a:fe:1b:84] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 238d3be12979e73c192777a0f5dedf13cdc2f755 c6990833bceaaabecffdcc8651ea5dcea009b975 b2a3dfe4d45bdd7a2b55d5f31f5e051bb334b38d 93290453b6fceaa81e47c0c44cca13d8ca3571ce df9ddee565cad800bf4683217be31fdfa4102b4f ce720aa63f9160ae0654fe239f1ab06e0d52459a 315de476269ab3f84d792b17a4d171ec3c2fc08d c9232fc265581583c3b414eaebe27cc3e6fafdbe 9e1d1a2a28c0bd7f0189aee7d95bdbcc5f87bd2e 126d47cdc9171388ed12d8df47509861715b65ab d2529478f8d66f0fd0f5d280e7da615acf519f06 f04bbea9b914e353e79c273b39d0ef5b1e738b6c 3976cfeab5ceba7a7c7ddfecb048bc09d2af95c6 2ee5a9064de80f7ed2ed5d88b3a4434a7775fb19 019607a1a23cc7228fce7776f9205237d0c1ca96 61b7db5eab376a9507e6376536073c4bd23a1f06 7595fbafc44f61c1c05c6e24befc4b08fcbeb0d5 de2b47c1b5aa164bedb016985017f9065de20df4 0c1390d80b31381c850c44739dc0d39d632e5e73 738c1820 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [59:72:a1:6c:2a:95:0c:db:e3:09:fe:a4:66:86:42:77:37:e8:11:fa] modulus: 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 public exponent: 10001 ] 2021-05-28 11:23:17.202  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-28 11:23:17.206 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-28 11:23:17.209 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-28 11:23:17.211 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-28 11:23:17.212  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-28 11:23:17.213  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-28 11:23:17.213  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-28 11:23:17.214  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-28 11:23:17.223  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-28 11:23:17.233  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-28 11:23:17.234  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 11:23:17.235  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 11:23:17.237  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-28 11:23:17.430  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-28 11:23:17.431  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-28 11:23:17.432 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-28 11:23:17.435 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-28 11:23:17.436  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1645 2021-05-28 11:23:17.436  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-28 11:23:17.439  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-28 11:23:17.439  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-28 11:23:17.440  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-28 11:23:17.440  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-28 11:23:17.441 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 11:23:17.441 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 11:23:17.441 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 11:23:17.443 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 11:23:17.443 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 11:23:17.443 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 11:23:17.524 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-28 11:23:17.531 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336345454089392970900159137318025890604535387461 IssuerDN: UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 28 09:34:55 UTC 2021 Final Date: Wed May 28 09:34:54 UTC 2031 SubjectDN: UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [05:5c:0a:3a:d6:39:9a:a8:e4:62:ae:24:bc:5d:15:4f:6a:fe:1b:84] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 238d3be12979e73c192777a0f5dedf13cdc2f755 c6990833bceaaabecffdcc8651ea5dcea009b975 b2a3dfe4d45bdd7a2b55d5f31f5e051bb334b38d 93290453b6fceaa81e47c0c44cca13d8ca3571ce df9ddee565cad800bf4683217be31fdfa4102b4f ce720aa63f9160ae0654fe239f1ab06e0d52459a 315de476269ab3f84d792b17a4d171ec3c2fc08d c9232fc265581583c3b414eaebe27cc3e6fafdbe 9e1d1a2a28c0bd7f0189aee7d95bdbcc5f87bd2e 126d47cdc9171388ed12d8df47509861715b65ab d2529478f8d66f0fd0f5d280e7da615acf519f06 f04bbea9b914e353e79c273b39d0ef5b1e738b6c 3976cfeab5ceba7a7c7ddfecb048bc09d2af95c6 2ee5a9064de80f7ed2ed5d88b3a4434a7775fb19 019607a1a23cc7228fce7776f9205237d0c1ca96 61b7db5eab376a9507e6376536073c4bd23a1f06 7595fbafc44f61c1c05c6e24befc4b08fcbeb0d5 de2b47c1b5aa164bedb016985017f9065de20df4 0c1390d80b31381c850c44739dc0d39d632e5e73 738c1820 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a3:46:16:f2:7f:8e:ed:b2:32:7b:ad:57:b2:37:96:ac:27:19:97:9e] modulus: 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 public exponent: 10001 ] 2021-05-28 11:25:19.438  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-28 11:25:19.439 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-28 11:25:19.441 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-05-28 11:25:19.442 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-28 11:25:19.442  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-05-28 11:25:19.443  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-28 11:25:19.443  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-28 11:25:19.444  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-28 11:25:19.444  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-28 11:25:19.451  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-28 11:25:19.452  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 11:25:19.452  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 11:25:19.523  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-28 11:25:19.618  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-28 11:25:19.618  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-28 11:25:19.623 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-28 11:25:19.625 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-28 11:25:19.626  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1645 2021-05-28 11:25:19.626  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-28 11:25:19.631  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-28 11:25:19.632  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-28 11:25:19.632  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-28 11:25:19.633  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-28 11:25:19.633 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 11:25:19.633 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 11:25:19.634 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 11:25:19.634 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 11:25:19.635 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 11:25:19.635 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 11:25:19.636 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-28 11:25:19.638 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336345454089392970900159137318025890604535387461 IssuerDN: UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 28 09:34:55 UTC 2021 Final Date: Wed May 28 09:34:54 UTC 2031 SubjectDN: UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [05:5c:0a:3a:d6:39:9a:a8:e4:62:ae:24:bc:5d:15:4f:6a:fe:1b:84] modulus: b47df941d4362de54b663f1f04b863dc7c197049b83dfccfda72645abe73ba1d92ad14d0ace41cdc87c2c9a2b15330cce4ff10772208f3a9c9c9a04a326744edda9b4e1e0e0ddf018be8303a6fe444952ab99faf4ffa7ab6b238b49ad6050afbd5e6835f4bf90f31af75083051d6abe4b47f655e6d5292aeaf145e3d7d89f9db794e29e9f01462ee2c62e1995ae1c3e9d80a907cde3f2ede9b2817528a5db3a524008fd757e5fa7a99b6b4249741571c036832cbe2ff1a868a1f4f0da2775c8a59e54232283d0ac9472095ca1e25673abcac1a422c7e2c53d7ee96f1a4cb252602f7c268bfa430fc3f85f05a09a31e287bdb2d3bf0d52c6599fb85dbafa20f42d912bab0499ad8c48a0c0fd62c0c56aad95d97c52ce67b6ff22099594cc8c0e940f444a80d628f5ae603561183f4e30ac7652b6affd23f9d10407788baab9e4be6f3df832be354af802f6a53f0b822fe54425993a7362f7f7cba1d8fc155b21c79a18bb9dbaeac7695b6c313dcc877d2a753cfa1ffe2cbf99510e4f576b309c9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 238d3be12979e73c192777a0f5dedf13cdc2f755 c6990833bceaaabecffdcc8651ea5dcea009b975 b2a3dfe4d45bdd7a2b55d5f31f5e051bb334b38d 93290453b6fceaa81e47c0c44cca13d8ca3571ce df9ddee565cad800bf4683217be31fdfa4102b4f ce720aa63f9160ae0654fe239f1ab06e0d52459a 315de476269ab3f84d792b17a4d171ec3c2fc08d c9232fc265581583c3b414eaebe27cc3e6fafdbe 9e1d1a2a28c0bd7f0189aee7d95bdbcc5f87bd2e 126d47cdc9171388ed12d8df47509861715b65ab d2529478f8d66f0fd0f5d280e7da615acf519f06 f04bbea9b914e353e79c273b39d0ef5b1e738b6c 3976cfeab5ceba7a7c7ddfecb048bc09d2af95c6 2ee5a9064de80f7ed2ed5d88b3a4434a7775fb19 019607a1a23cc7228fce7776f9205237d0c1ca96 61b7db5eab376a9507e6376536073c4bd23a1f06 7595fbafc44f61c1c05c6e24befc4b08fcbeb0d5 de2b47c1b5aa164bedb016985017f9065de20df4 0c1390d80b31381c850c44739dc0d39d632e5e73 738c1820 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [79:8d:f4:00:68:1a:11:a7:32:de:f2:e1:92:0c:1f:ba:ff:15:c0:5e] modulus: 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 public exponent: 10001 ] 2021-05-28 11:28:34.732  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-28 11:28:34.734 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-28 11:28:34.735 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-05-28 11:28:34.736 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-28 11:28:34.736  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-05-28 11:28:34.737  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-28 11:28:34.737  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-28 11:28:34.738  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-28 11:28:34.738  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-28 11:28:34.747  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-28 11:28:34.747  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 11:28:34.748  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 11:28:34.749  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-28 11:28:34.907  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-28 11:28:34.907  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-28 11:28:34.908 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-28 11:28:34.909 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-28 11:28:34.910  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1645 2021-05-28 11:28:34.911  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-28 11:28:34.913  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-28 11:28:34.913  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-28 11:28:34.914  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-28 11:28:34.914  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-28 11:28:34.915 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 11:28:34.923 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 11:28:34.923 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 11:28:34.924 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 11:28:34.924 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 11:28:34.924 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 11:28:34.925 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-28 11:28:34.928 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336345454089392970900159137318025890604535387461 IssuerDN: UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 28 09:34:55 UTC 2021 Final Date: Wed May 28 09:34:54 UTC 2031 SubjectDN: UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [05:5c:0a:3a:d6:39:9a:a8:e4:62:ae:24:bc:5d:15:4f:6a:fe:1b:84] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 238d3be12979e73c192777a0f5dedf13cdc2f755 c6990833bceaaabecffdcc8651ea5dcea009b975 b2a3dfe4d45bdd7a2b55d5f31f5e051bb334b38d 93290453b6fceaa81e47c0c44cca13d8ca3571ce df9ddee565cad800bf4683217be31fdfa4102b4f ce720aa63f9160ae0654fe239f1ab06e0d52459a 315de476269ab3f84d792b17a4d171ec3c2fc08d c9232fc265581583c3b414eaebe27cc3e6fafdbe 9e1d1a2a28c0bd7f0189aee7d95bdbcc5f87bd2e 126d47cdc9171388ed12d8df47509861715b65ab d2529478f8d66f0fd0f5d280e7da615acf519f06 f04bbea9b914e353e79c273b39d0ef5b1e738b6c 3976cfeab5ceba7a7c7ddfecb048bc09d2af95c6 2ee5a9064de80f7ed2ed5d88b3a4434a7775fb19 019607a1a23cc7228fce7776f9205237d0c1ca96 61b7db5eab376a9507e6376536073c4bd23a1f06 7595fbafc44f61c1c05c6e24befc4b08fcbeb0d5 de2b47c1b5aa164bedb016985017f9065de20df4 0c1390d80b31381c850c44739dc0d39d632e5e73 738c1820 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1b:1d:28:c6:ab:8c:a6:53:46:3a:1f:2c:43:1f:c9:9d:fe:a7:f8:e9] modulus: 8d6b917079ced312765392a0a0ae23a556f113f889f6ea568e0fe8bcf93c334388915024697de125df63a2b30c755891a06498c2131ddbe131ceadb6002f825f643ea5832430fac0b45d29dbdc51d177e07727b685ec35220e2609de575db479504f43557bfe0038dac8cbbd5dfeedf752ce7fee282b0ef9d8849ef106cab7a0e49ec65ecf01b7636fe1ada6b4ccde8b280fed86c63e1c44d853c11cd8c4771587fb2290d8bcd39a7fcae7ecc17a17c6380da27f8649ee9b02617895667e33e01ba0680a7204fe29c80cb1c350175beaae5c45993440c2dd3c1e73db556eb9d0bf9e15dbb9ed69e809d042897f323556fa79991d8dd3698c102d1f337b109c73 public exponent: 10001 ] 2021-05-28 11:28:43.338  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-28 11:28:43.339 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-28 11:28:43.341 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-28 11:28:43.342 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-28 11:28:43.342  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-28 11:28:43.343  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-28 11:28:43.344  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-28 11:28:43.344  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-28 11:28:43.345  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-28 11:28:43.350  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-28 11:28:43.350  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 11:28:43.350  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 11:28:43.424  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-28 11:28:43.495  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-28 11:28:43.496  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-28 11:28:43.496 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-28 11:28:43.498 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-28 11:28:43.523  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1645 2021-05-28 11:28:43.524  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-28 11:28:43.526  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-28 11:28:43.526  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-28 11:28:43.527  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-28 11:28:43.528  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-28 11:28:43.529 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 11:28:43.529 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 11:28:43.529 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 11:28:43.530 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 11:28:43.530 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 11:28:43.531 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 11:28:43.531 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-28 11:28:43.535 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336345454089392970900159137318025890604535387461 IssuerDN: UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 28 09:34:55 UTC 2021 Final Date: Wed May 28 09:34:54 UTC 2031 SubjectDN: UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [05:5c:0a:3a:d6:39:9a:a8:e4:62:ae:24:bc:5d:15:4f:6a:fe:1b:84] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 238d3be12979e73c192777a0f5dedf13cdc2f755 c6990833bceaaabecffdcc8651ea5dcea009b975 b2a3dfe4d45bdd7a2b55d5f31f5e051bb334b38d 93290453b6fceaa81e47c0c44cca13d8ca3571ce df9ddee565cad800bf4683217be31fdfa4102b4f ce720aa63f9160ae0654fe239f1ab06e0d52459a 315de476269ab3f84d792b17a4d171ec3c2fc08d c9232fc265581583c3b414eaebe27cc3e6fafdbe 9e1d1a2a28c0bd7f0189aee7d95bdbcc5f87bd2e 126d47cdc9171388ed12d8df47509861715b65ab d2529478f8d66f0fd0f5d280e7da615acf519f06 f04bbea9b914e353e79c273b39d0ef5b1e738b6c 3976cfeab5ceba7a7c7ddfecb048bc09d2af95c6 2ee5a9064de80f7ed2ed5d88b3a4434a7775fb19 019607a1a23cc7228fce7776f9205237d0c1ca96 61b7db5eab376a9507e6376536073c4bd23a1f06 7595fbafc44f61c1c05c6e24befc4b08fcbeb0d5 de2b47c1b5aa164bedb016985017f9065de20df4 0c1390d80b31381c850c44739dc0d39d632e5e73 738c1820 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f6:b3:ff:97:fe:dd:6f:49:0f:df:3a:c1:8f:e5:a5:2b:4e:08:e1:c1] modulus: 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 public exponent: 10001 ] 2021-05-28 11:28:53.452  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-28 11:28:53.453 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-28 11:28:53.455 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-28 11:28:53.455 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-28 11:28:53.456  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-28 11:28:53.456  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-28 11:28:53.457  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-28 11:28:53.457  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-28 11:28:53.457  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-28 11:28:53.462  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-28 11:28:53.463  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 11:28:53.463  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 11:28:53.464  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-28 11:28:53.530  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-28 11:28:53.531  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-28 11:28:53.531 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-28 11:28:53.533 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-28 11:28:53.534  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1645 2021-05-28 11:28:53.534  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-28 11:28:53.536  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-28 11:28:53.536  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-28 11:28:53.537  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-28 11:28:53.537  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-28 11:28:53.537 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 11:28:53.538 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 11:28:53.538 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 11:28:53.538 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 11:28:53.539 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 11:28:53.539 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 11:28:53.540 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-28 11:28:53.542 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336345454089392970900159137318025890604535387461 IssuerDN: UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 28 09:34:55 UTC 2021 Final Date: Wed May 28 09:34:54 UTC 2031 SubjectDN: UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [05:5c:0a:3a:d6:39:9a:a8:e4:62:ae:24:bc:5d:15:4f:6a:fe:1b:84] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 238d3be12979e73c192777a0f5dedf13cdc2f755 c6990833bceaaabecffdcc8651ea5dcea009b975 b2a3dfe4d45bdd7a2b55d5f31f5e051bb334b38d 93290453b6fceaa81e47c0c44cca13d8ca3571ce df9ddee565cad800bf4683217be31fdfa4102b4f ce720aa63f9160ae0654fe239f1ab06e0d52459a 315de476269ab3f84d792b17a4d171ec3c2fc08d c9232fc265581583c3b414eaebe27cc3e6fafdbe 9e1d1a2a28c0bd7f0189aee7d95bdbcc5f87bd2e 126d47cdc9171388ed12d8df47509861715b65ab d2529478f8d66f0fd0f5d280e7da615acf519f06 f04bbea9b914e353e79c273b39d0ef5b1e738b6c 3976cfeab5ceba7a7c7ddfecb048bc09d2af95c6 2ee5a9064de80f7ed2ed5d88b3a4434a7775fb19 019607a1a23cc7228fce7776f9205237d0c1ca96 61b7db5eab376a9507e6376536073c4bd23a1f06 7595fbafc44f61c1c05c6e24befc4b08fcbeb0d5 de2b47c1b5aa164bedb016985017f9065de20df4 0c1390d80b31381c850c44739dc0d39d632e5e73 738c1820 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [29:3f:cd:df:0c:81:1e:06:77:36:ab:6a:27:ed:cf:a0:84:3f:fa:45] modulus: 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 public exponent: 10001 ] 2021-05-28 11:29:33.125  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-28 11:29:33.126 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-28 11:29:33.127 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-05-28 11:29:33.128 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-28 11:29:33.128  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-05-28 11:29:33.129  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-28 11:29:33.130  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-28 11:29:33.131  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-28 11:29:33.131  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-28 11:29:33.136  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-28 11:29:33.137  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 11:29:33.138  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 11:29:33.139  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-28 11:29:33.295  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-28 11:29:33.323  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-28 11:29:33.325 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-28 11:29:33.328 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-28 11:29:33.329  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1645 2021-05-28 11:29:33.329  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-28 11:29:33.331  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-28 11:29:33.331  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-28 11:29:33.332  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-28 11:29:33.332  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-28 11:29:33.332 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 11:29:33.333 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 11:29:33.333 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 11:29:33.334 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 11:29:33.334 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 11:29:33.335 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 11:29:33.336 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-28 11:29:33.339 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336345454089392970900159137318025890604535387461 IssuerDN: UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 28 09:34:55 UTC 2021 Final Date: Wed May 28 09:34:54 UTC 2031 SubjectDN: UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [05:5c:0a:3a:d6:39:9a:a8:e4:62:ae:24:bc:5d:15:4f:6a:fe:1b:84] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 238d3be12979e73c192777a0f5dedf13cdc2f755 c6990833bceaaabecffdcc8651ea5dcea009b975 b2a3dfe4d45bdd7a2b55d5f31f5e051bb334b38d 93290453b6fceaa81e47c0c44cca13d8ca3571ce df9ddee565cad800bf4683217be31fdfa4102b4f ce720aa63f9160ae0654fe239f1ab06e0d52459a 315de476269ab3f84d792b17a4d171ec3c2fc08d c9232fc265581583c3b414eaebe27cc3e6fafdbe 9e1d1a2a28c0bd7f0189aee7d95bdbcc5f87bd2e 126d47cdc9171388ed12d8df47509861715b65ab d2529478f8d66f0fd0f5d280e7da615acf519f06 f04bbea9b914e353e79c273b39d0ef5b1e738b6c 3976cfeab5ceba7a7c7ddfecb048bc09d2af95c6 2ee5a9064de80f7ed2ed5d88b3a4434a7775fb19 019607a1a23cc7228fce7776f9205237d0c1ca96 61b7db5eab376a9507e6376536073c4bd23a1f06 7595fbafc44f61c1c05c6e24befc4b08fcbeb0d5 de2b47c1b5aa164bedb016985017f9065de20df4 0c1390d80b31381c850c44739dc0d39d632e5e73 738c1820 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [86:13:c3:ea:42:b7:be:d1:81:d7:18:16:8e:11:f2:96:04:86:78:3e] modulus: 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 public exponent: 10001 ] 2021-05-28 11:31:18.185  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-28 11:31:18.187 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-28 11:31:18.188 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-05-28 11:31:18.188 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-28 11:31:18.189  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-05-28 11:31:18.189  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-28 11:31:18.189  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-28 11:31:18.190  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-28 11:31:18.190  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-28 11:31:18.194  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-28 11:31:18.195  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 11:31:18.195  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 11:31:18.197  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-28 11:31:18.273  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-28 11:31:18.273  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-28 11:31:18.274 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-28 11:31:18.324 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-28 11:31:18.324  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1645 2021-05-28 11:31:18.325  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-28 11:31:18.328  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-28 11:31:18.329  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-28 11:31:18.329  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-28 11:31:18.330  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-28 11:31:18.330 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 11:31:18.331 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 11:31:18.331 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 11:31:18.331 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 11:31:18.331 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 11:31:18.332 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 11:31:18.332 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-28 11:31:18.335 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336345454089392970900159137318025890604535387461 IssuerDN: UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 28 09:34:55 UTC 2021 Final Date: Wed May 28 09:34:54 UTC 2031 SubjectDN: UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [05:5c:0a:3a:d6:39:9a:a8:e4:62:ae:24:bc:5d:15:4f:6a:fe:1b:84] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 238d3be12979e73c192777a0f5dedf13cdc2f755 c6990833bceaaabecffdcc8651ea5dcea009b975 b2a3dfe4d45bdd7a2b55d5f31f5e051bb334b38d 93290453b6fceaa81e47c0c44cca13d8ca3571ce df9ddee565cad800bf4683217be31fdfa4102b4f ce720aa63f9160ae0654fe239f1ab06e0d52459a 315de476269ab3f84d792b17a4d171ec3c2fc08d c9232fc265581583c3b414eaebe27cc3e6fafdbe 9e1d1a2a28c0bd7f0189aee7d95bdbcc5f87bd2e 126d47cdc9171388ed12d8df47509861715b65ab d2529478f8d66f0fd0f5d280e7da615acf519f06 f04bbea9b914e353e79c273b39d0ef5b1e738b6c 3976cfeab5ceba7a7c7ddfecb048bc09d2af95c6 2ee5a9064de80f7ed2ed5d88b3a4434a7775fb19 019607a1a23cc7228fce7776f9205237d0c1ca96 61b7db5eab376a9507e6376536073c4bd23a1f06 7595fbafc44f61c1c05c6e24befc4b08fcbeb0d5 de2b47c1b5aa164bedb016985017f9065de20df4 0c1390d80b31381c850c44739dc0d39d632e5e73 738c1820 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e7:24:e2:59:52:9a:37:26:c1:69:35:11:36:2c:0c:18:b7:c9:ec:25] modulus: e3413fb4f72eb4bc58e6a479c1058ddd83536f0f5a4371010298b680656225108fb26ae4bc184f7a495addb3137d801c52ce0468106a884b8b0d07b18261eab856673524fbbf8cfaece534d5e06a2f714a1e7ca53f6785ce9d21eb32a83ccb2237762998ac61b2624fbff4c6c4215ead91400491926e87071ae1a6b1b408f664749488397a98bb2860b7133e169659ba0ae72cffe5d48eb0a29c7cfa9a6752409581388c412869d821ced3943842f3cf6628ed4785196879ea2baca35561e09dc952461283fa52b596e0c0eda2eab9269f951c7d8a57141b7cf9bcc7938e7f7b103103eb3f6d33e297ea1f5c66abc5869a0257b5766e41660ba235b8ae83d10b public exponent: 10001 ] 2021-05-28 11:31:26.730  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-28 11:31:26.732 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-28 11:31:26.733 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-05-28 11:31:26.733 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-28 11:31:26.733  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-05-28 11:31:26.734  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-28 11:31:26.734  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-28 11:31:26.734  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-28 11:31:26.735  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-28 11:31:26.739  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-28 11:31:26.740  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 11:31:26.740  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 11:31:26.741  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-28 11:31:26.823  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-28 11:31:26.824  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-28 11:31:26.825 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-28 11:31:26.827 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-28 11:31:26.828  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1645 2021-05-28 11:31:26.828  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-28 11:31:26.830  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-28 11:31:26.831  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-28 11:31:26.831  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-28 11:31:26.831  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-28 11:31:26.832 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 11:31:26.832 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 11:31:26.832 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 11:31:26.832 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 11:31:26.833 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 11:31:26.833 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 11:31:26.833 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-28 11:31:26.836 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336345454089392970900159137318025890604535387461 IssuerDN: UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 28 09:34:55 UTC 2021 Final Date: Wed May 28 09:34:54 UTC 2031 SubjectDN: UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [05:5c:0a:3a:d6:39:9a:a8:e4:62:ae:24:bc:5d:15:4f:6a:fe:1b:84] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 238d3be12979e73c192777a0f5dedf13cdc2f755 c6990833bceaaabecffdcc8651ea5dcea009b975 b2a3dfe4d45bdd7a2b55d5f31f5e051bb334b38d 93290453b6fceaa81e47c0c44cca13d8ca3571ce df9ddee565cad800bf4683217be31fdfa4102b4f ce720aa63f9160ae0654fe239f1ab06e0d52459a 315de476269ab3f84d792b17a4d171ec3c2fc08d c9232fc265581583c3b414eaebe27cc3e6fafdbe 9e1d1a2a28c0bd7f0189aee7d95bdbcc5f87bd2e 126d47cdc9171388ed12d8df47509861715b65ab d2529478f8d66f0fd0f5d280e7da615acf519f06 f04bbea9b914e353e79c273b39d0ef5b1e738b6c 3976cfeab5ceba7a7c7ddfecb048bc09d2af95c6 2ee5a9064de80f7ed2ed5d88b3a4434a7775fb19 019607a1a23cc7228fce7776f9205237d0c1ca96 61b7db5eab376a9507e6376536073c4bd23a1f06 7595fbafc44f61c1c05c6e24befc4b08fcbeb0d5 de2b47c1b5aa164bedb016985017f9065de20df4 0c1390d80b31381c850c44739dc0d39d632e5e73 738c1820 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2c:37:4c:9c:b1:6b:92:4d:87:14:a3:1a:df:1e:3c:75:3a:e9:6b:b1] modulus: 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 public exponent: 10001 ] 2021-05-28 11:32:59.497  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-28 11:32:59.519 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-28 11:32:59.520 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-28 11:32:59.521 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-28 11:32:59.521  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-28 11:32:59.521  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-28 11:32:59.521  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-28 11:32:59.522  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-28 11:32:59.522  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-28 11:32:59.526  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-28 11:32:59.526  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 11:32:59.526  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 11:32:59.528  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-28 11:32:59.601  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-28 11:32:59.623  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-28 11:32:59.624 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-28 11:32:59.627 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-28 11:32:59.628  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1645 2021-05-28 11:32:59.628  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-28 11:32:59.630  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-28 11:32:59.630  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-28 11:32:59.631  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-28 11:32:59.631  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-28 11:32:59.631 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 11:32:59.632 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 11:32:59.632 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 11:32:59.633 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 11:32:59.633 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 11:32:59.633 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 11:32:59.634 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-28 11:32:59.637 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336345454089392970900159137318025890604535387461 IssuerDN: UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 28 09:34:55 UTC 2021 Final Date: Wed May 28 09:34:54 UTC 2031 SubjectDN: UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [05:5c:0a:3a:d6:39:9a:a8:e4:62:ae:24:bc:5d:15:4f:6a:fe:1b:84] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 238d3be12979e73c192777a0f5dedf13cdc2f755 c6990833bceaaabecffdcc8651ea5dcea009b975 b2a3dfe4d45bdd7a2b55d5f31f5e051bb334b38d 93290453b6fceaa81e47c0c44cca13d8ca3571ce df9ddee565cad800bf4683217be31fdfa4102b4f ce720aa63f9160ae0654fe239f1ab06e0d52459a 315de476269ab3f84d792b17a4d171ec3c2fc08d c9232fc265581583c3b414eaebe27cc3e6fafdbe 9e1d1a2a28c0bd7f0189aee7d95bdbcc5f87bd2e 126d47cdc9171388ed12d8df47509861715b65ab d2529478f8d66f0fd0f5d280e7da615acf519f06 f04bbea9b914e353e79c273b39d0ef5b1e738b6c 3976cfeab5ceba7a7c7ddfecb048bc09d2af95c6 2ee5a9064de80f7ed2ed5d88b3a4434a7775fb19 019607a1a23cc7228fce7776f9205237d0c1ca96 61b7db5eab376a9507e6376536073c4bd23a1f06 7595fbafc44f61c1c05c6e24befc4b08fcbeb0d5 de2b47c1b5aa164bedb016985017f9065de20df4 0c1390d80b31381c850c44739dc0d39d632e5e73 738c1820 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [29:cb:8b:74:a4:a4:2e:33:82:b0:70:39:96:77:d1:27:80:18:11:49] modulus: 8e80e23a4fe4eaf450019cf49e02895b6b1d6a0092f636bf1c7bda8da56247580f736dd5e64b7a4cb30171e9390656f3b4e30056978936dfc5562d5d7adfaecf1cc7a5a962729b4d02d0bf0835978c0900205b75c00d3e293d6f42ed50900169d5ef3048033333eee66268e25823d1579ce22df3b448fc91d9433c3c4f573c735469ed8dcee9a30376bf427619e417a32fc91e0656a2c8f9d7959a82140fe32fa6792248ccdfdcf7f41bd4f7b5ef68e6ca9df13884de07579f39ffa2596a6e140c821bc7e593fb904e06a8d286b6632ce16e295ac811f0d802679bd87726b3d8fb026f7b0a6d93f547e80bc60f5b0cc69cb4e262e99007d12e8fb568fe57182d public exponent: 10001 ] 2021-05-28 11:36:09.711  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-28 11:36:09.713 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-28 11:36:09.715 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-28 11:36:09.715 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-28 11:36:09.715  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-28 11:36:09.716  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-28 11:36:09.716  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-28 11:36:09.717  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-28 11:36:09.717  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-28 11:36:09.722  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-28 11:36:09.722  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 11:36:09.722  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 11:36:09.724  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-28 11:36:09.817  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-28 11:36:09.817  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-28 11:36:09.817 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-28 11:36:09.818 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-28 11:36:09.823  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1645 2021-05-28 11:36:09.823  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-28 11:36:09.825  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-28 11:36:09.825  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-28 11:36:09.826  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-28 11:36:09.826  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-28 11:36:09.826 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 11:36:09.827 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 11:36:09.827 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 11:36:09.828 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 11:36:09.828 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 11:36:09.828 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 11:36:09.829 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-28 11:36:09.832 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336345454089392970900159137318025890604535387461 IssuerDN: UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 28 09:34:55 UTC 2021 Final Date: Wed May 28 09:34:54 UTC 2031 SubjectDN: UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [05:5c:0a:3a:d6:39:9a:a8:e4:62:ae:24:bc:5d:15:4f:6a:fe:1b:84] modulus: b47df941d4362de54b663f1f04b863dc7c197049b83dfccfda72645abe73ba1d92ad14d0ace41cdc87c2c9a2b15330cce4ff10772208f3a9c9c9a04a326744edda9b4e1e0e0ddf018be8303a6fe444952ab99faf4ffa7ab6b238b49ad6050afbd5e6835f4bf90f31af75083051d6abe4b47f655e6d5292aeaf145e3d7d89f9db794e29e9f01462ee2c62e1995ae1c3e9d80a907cde3f2ede9b2817528a5db3a524008fd757e5fa7a99b6b4249741571c036832cbe2ff1a868a1f4f0da2775c8a59e54232283d0ac9472095ca1e25673abcac1a422c7e2c53d7ee96f1a4cb252602f7c268bfa430fc3f85f05a09a31e287bdb2d3bf0d52c6599fb85dbafa20f42d912bab0499ad8c48a0c0fd62c0c56aad95d97c52ce67b6ff22099594cc8c0e940f444a80d628f5ae603561183f4e30ac7652b6affd23f9d10407788baab9e4be6f3df832be354af802f6a53f0b822fe54425993a7362f7f7cba1d8fc155b21c79a18bb9dbaeac7695b6c313dcc877d2a753cfa1ffe2cbf99510e4f576b309c9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 238d3be12979e73c192777a0f5dedf13cdc2f755 c6990833bceaaabecffdcc8651ea5dcea009b975 b2a3dfe4d45bdd7a2b55d5f31f5e051bb334b38d 93290453b6fceaa81e47c0c44cca13d8ca3571ce df9ddee565cad800bf4683217be31fdfa4102b4f ce720aa63f9160ae0654fe239f1ab06e0d52459a 315de476269ab3f84d792b17a4d171ec3c2fc08d c9232fc265581583c3b414eaebe27cc3e6fafdbe 9e1d1a2a28c0bd7f0189aee7d95bdbcc5f87bd2e 126d47cdc9171388ed12d8df47509861715b65ab d2529478f8d66f0fd0f5d280e7da615acf519f06 f04bbea9b914e353e79c273b39d0ef5b1e738b6c 3976cfeab5ceba7a7c7ddfecb048bc09d2af95c6 2ee5a9064de80f7ed2ed5d88b3a4434a7775fb19 019607a1a23cc7228fce7776f9205237d0c1ca96 61b7db5eab376a9507e6376536073c4bd23a1f06 7595fbafc44f61c1c05c6e24befc4b08fcbeb0d5 de2b47c1b5aa164bedb016985017f9065de20df4 0c1390d80b31381c850c44739dc0d39d632e5e73 738c1820 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7e:78:74:d6:ee:a0:59:e8:97:6e:58:00:8c:08:1b:a7:45:69:23:4e] modulus: 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 public exponent: 10001 ] 2021-05-28 11:38:04.016  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-28 11:38:04.017 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-28 11:38:04.020 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-28 11:38:04.020 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-28 11:38:04.021  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-28 11:38:04.021  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-28 11:38:04.021  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-28 11:38:04.022  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-28 11:38:04.022  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-28 11:38:04.029  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-28 11:38:04.029  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 11:38:04.030  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 11:38:04.031  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-28 11:38:04.126  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-28 11:38:04.126  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-28 11:38:04.127 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-28 11:38:04.128 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-28 11:38:04.128  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1645 2021-05-28 11:38:04.129  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-28 11:38:04.130  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-28 11:38:04.130  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-28 11:38:04.131  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-28 11:38:04.131  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-28 11:38:04.131 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 11:38:04.131 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 11:38:04.132 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 11:38:04.132 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 11:38:04.132 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 11:38:04.133 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 11:38:04.133 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-28 11:38:04.136 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336345454089392970900159137318025890604535387461 IssuerDN: UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 28 09:34:55 UTC 2021 Final Date: Wed May 28 09:34:54 UTC 2031 SubjectDN: UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [05:5c:0a:3a:d6:39:9a:a8:e4:62:ae:24:bc:5d:15:4f:6a:fe:1b:84] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 238d3be12979e73c192777a0f5dedf13cdc2f755 c6990833bceaaabecffdcc8651ea5dcea009b975 b2a3dfe4d45bdd7a2b55d5f31f5e051bb334b38d 93290453b6fceaa81e47c0c44cca13d8ca3571ce df9ddee565cad800bf4683217be31fdfa4102b4f ce720aa63f9160ae0654fe239f1ab06e0d52459a 315de476269ab3f84d792b17a4d171ec3c2fc08d c9232fc265581583c3b414eaebe27cc3e6fafdbe 9e1d1a2a28c0bd7f0189aee7d95bdbcc5f87bd2e 126d47cdc9171388ed12d8df47509861715b65ab d2529478f8d66f0fd0f5d280e7da615acf519f06 f04bbea9b914e353e79c273b39d0ef5b1e738b6c 3976cfeab5ceba7a7c7ddfecb048bc09d2af95c6 2ee5a9064de80f7ed2ed5d88b3a4434a7775fb19 019607a1a23cc7228fce7776f9205237d0c1ca96 61b7db5eab376a9507e6376536073c4bd23a1f06 7595fbafc44f61c1c05c6e24befc4b08fcbeb0d5 de2b47c1b5aa164bedb016985017f9065de20df4 0c1390d80b31381c850c44739dc0d39d632e5e73 738c1820 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [00:41:6e:21:01:c3:82:2f:20:9f:40:05:a1:20:c9:0e:50:65:03:77] modulus: 9f79a1b6a793059cc4d01bb005b26478f2010da902c52b901ec9f060fa600f193240f977f398fe669f48cf8eb995bdf07510372cb47ed7f3cd30208fa24e2daaa50d545d94ab7d97ee69d110066ccb48e83c4faad5fa08edd33361b10849e76528360e51dcecb59b602c01dad1447c29679fc72fb69c532df03a8e92ccb1d2e71bfc88a822dcc066fb40937ded198e4bdac34c031e1b0d76bb92cb9048d1e2e97d1b393132b8c407a2adc4b9df835349cdd5e56c0cd12d5bcdf7bc593bf49ae854d3c168142f51b5037a8fce4310891cf4bffe4699a05ac2b52187b3149ed35dacdfc93347ce292997752bb5f93738a6b80c01d5f0b624c2473e402022354df7 public exponent: 10001 ] 2021-05-28 11:39:43.093  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-28 11:39:43.094 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-28 11:39:43.095 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-28 11:39:43.096 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-28 11:39:43.096  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-28 11:39:43.096  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-28 11:39:43.096  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-28 11:39:43.097  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-28 11:39:43.097  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-28 11:39:43.100  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-28 11:39:43.101  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 11:39:43.101  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-28 11:39:43.102  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-28 11:39:43.165  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-28 11:39:43.165  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-28 11:39:43.165 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-28 11:39:43.167 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-28 11:39:43.167  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1645 2021-05-28 11:39:43.168  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-28 11:39:43.169  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-28 11:39:43.169  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-28 11:39:43.170  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-28 11:39:43.170  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-28 11:39:43.170 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 11:39:43.170 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 11:39:43.171 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 11:39:43.171 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-28 11:39:43.171 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-28 11:39:43.172 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-28 11:39:43.172 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-28 11:39:43.176 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336345454089392970900159137318025890604535387461 IssuerDN: UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri May 28 09:34:55 UTC 2021 Final Date: Wed May 28 09:34:54 UTC 2031 SubjectDN: UID=c-0ppch0kcbj10ecpdi,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [05:5c:0a:3a:d6:39:9a:a8:e4:62:ae:24:bc:5d:15:4f:6a:fe:1b:84] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 238d3be12979e73c192777a0f5dedf13cdc2f755 c6990833bceaaabecffdcc8651ea5dcea009b975 b2a3dfe4d45bdd7a2b55d5f31f5e051bb334b38d 93290453b6fceaa81e47c0c44cca13d8ca3571ce df9ddee565cad800bf4683217be31fdfa4102b4f ce720aa63f9160ae0654fe239f1ab06e0d52459a 315de476269ab3f84d792b17a4d171ec3c2fc08d c9232fc265581583c3b414eaebe27cc3e6fafdbe 9e1d1a2a28c0bd7f0189aee7d95bdbcc5f87bd2e 126d47cdc9171388ed12d8df47509861715b65ab d2529478f8d66f0fd0f5d280e7da615acf519f06 f04bbea9b914e353e79c273b39d0ef5b1e738b6c 3976cfeab5ceba7a7c7ddfecb048bc09d2af95c6 2ee5a9064de80f7ed2ed5d88b3a4434a7775fb19 019607a1a23cc7228fce7776f9205237d0c1ca96 61b7db5eab376a9507e6376536073c4bd23a1f06 7595fbafc44f61c1c05c6e24befc4b08fcbeb0d5 de2b47c1b5aa164bedb016985017f9065de20df4 0c1390d80b31381c850c44739dc0d39d632e5e73 738c1820 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [30:4a:ea:8b:d6:fd:6e:ae:fc:24:20:6e:07:ea:5b:35:d9:06:f1:18] modulus: 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 public exponent: 10001 ]