2021-07-01 02:22:00,961 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-07-01 02:22:04,366 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-07-01 02:22:07.067  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-07-01 02:22:18.052 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-07-01 02:22:19.047  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-07-01 02:22:19.663  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-07-01 02:22:31.661  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 32.613 seconds (JVM running for 39.176) 2021-07-01 02:34:24.163  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-01 02:34:24.251 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-01 02:34:24.364 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-07-01 02:34:24.369 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-01 02:34:24.447  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-07-01 02:34:24.451  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-01 02:34:24.455  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-01 02:34:24.456  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-01 02:34:24.456  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-01 02:34:24.463  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-01 02:34:24.548  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-01 02:34:24.652  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-01 02:34:24.659  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-01 02:34:24.661  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-01 02:34:24.753  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-01 02:34:26.056  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-01 02:34:26.059  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-01 02:34:26.060 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-01 02:34:26.146 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-01 02:34:26.148  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1660 2021-07-01 02:34:26.149  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-01 02:34:26.152  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-01 02:34:26.153  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-01 02:34:26.160  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-01 02:34:26.161  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-01 02:34:26.161 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-01 02:34:26.162 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-01 02:34:26.162 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-01 02:34:26.252 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-01 02:34:26.253 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-01 02:34:26.253 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-01 02:34:26.259 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-01 02:34:26.447 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 91444908449136056856217249581993925705551034847 IssuerDN: UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 01 02:18:36 UTC 2021 Final Date: Tue Jul 01 02:18:36 UTC 2031 SubjectDN: UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [64:6b:7a:f0:b4:ba:f6:e6:06:e2:9d:b7:33:6c:2a:d5:78:6a:a8:f3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2a708ea1531697bea3d37f91a34e39c2a67c413c c72db172e13e88787c89ceb140f0f0bf3a6959b6 75076b607e0c98cac948b74aefe8e0df9f870f5e dc545aafb810d545a546b6afc013b5e616750763 c985ce4c085f0c1379a593c37cb2c8e9a11fa759 0d30cdda2f060a905c52bfa5c55563f4333c35f9 0814ce688fe3145f010bbb279a5a569874212f36 317bf3bf6d2adfb1f5ace295ef8cd6380093f44b 59e4503b19eb1c195dd6fe26364a3d4ebc2f014b 6d6cf7b1b420ab74b2074d2744414e78d8416aad fbdf7ca687e4521f330b1c3506859532721cbbe8 47ab90a9d137e61ec93b4c5b06176c8c489ce537 3ba18b86f7e672070324fa203e696a5ca07024b0 42f8f7ba4c3a4c7fec4eb73f05c24fdb5281aedd a27855c42ba93d219e45921977b040d55d24ca7b b2c0bd77f30d749bb975641f3426ca872f682a8f c899d9da6280aea277ef1bf0384dc2a7f297c4a0 3f5ba2dd78acc85525b1d70f2c7fab26b79791ef 9c3959033ab80dcff35c26bfb46a4d4d42b176d5 560419c6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6e:08:d7:0d:ca:f4:24:c6:36:60:7d:89:03:87:c7:80:28:42:09:42] modulus: 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 public exponent: 10001 ] 2021-07-01 03:33:08.977  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-01 03:33:08.979 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-01 03:33:08.980 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-07-01 03:33:08.981 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-01 03:33:08.982  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-07-01 03:33:08.982  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-01 03:33:08.983  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-01 03:33:08.983  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-01 03:33:08.984  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-01 03:33:09.051  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-01 03:33:09.052  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-01 03:33:09.052  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-01 03:33:09.056  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-01 03:33:09.246  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-01 03:33:09.247  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-01 03:33:09.247 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-01 03:33:09.250 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-01 03:33:09.250  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1660 2021-07-01 03:33:09.251  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-01 03:33:09.255  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-01 03:33:09.255  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-01 03:33:09.256  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-01 03:33:09.256  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-01 03:33:09.257 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-01 03:33:09.257 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-01 03:33:09.257 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-01 03:33:09.259 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-01 03:33:09.259 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-01 03:33:09.259 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-01 03:33:09.261 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-01 03:33:09.347 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 91444908449136056856217249581993925705551034847 IssuerDN: UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 01 02:18:36 UTC 2021 Final Date: Tue Jul 01 02:18:36 UTC 2031 SubjectDN: UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [64:6b:7a:f0:b4:ba:f6:e6:06:e2:9d:b7:33:6c:2a:d5:78:6a:a8:f3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2a708ea1531697bea3d37f91a34e39c2a67c413c c72db172e13e88787c89ceb140f0f0bf3a6959b6 75076b607e0c98cac948b74aefe8e0df9f870f5e dc545aafb810d545a546b6afc013b5e616750763 c985ce4c085f0c1379a593c37cb2c8e9a11fa759 0d30cdda2f060a905c52bfa5c55563f4333c35f9 0814ce688fe3145f010bbb279a5a569874212f36 317bf3bf6d2adfb1f5ace295ef8cd6380093f44b 59e4503b19eb1c195dd6fe26364a3d4ebc2f014b 6d6cf7b1b420ab74b2074d2744414e78d8416aad fbdf7ca687e4521f330b1c3506859532721cbbe8 47ab90a9d137e61ec93b4c5b06176c8c489ce537 3ba18b86f7e672070324fa203e696a5ca07024b0 42f8f7ba4c3a4c7fec4eb73f05c24fdb5281aedd a27855c42ba93d219e45921977b040d55d24ca7b b2c0bd77f30d749bb975641f3426ca872f682a8f c899d9da6280aea277ef1bf0384dc2a7f297c4a0 3f5ba2dd78acc85525b1d70f2c7fab26b79791ef 9c3959033ab80dcff35c26bfb46a4d4d42b176d5 560419c6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [eb:37:9d:23:d4:6c:a6:d9:dd:ff:53:43:03:64:bf:4a:f2:67:ad:a7] modulus: 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 public exponent: 10001 ] 2021-07-01 03:34:58.754  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-01 03:34:58.754 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-01 03:34:58.755 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-07-01 03:34:58.756 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-01 03:34:58.756  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-07-01 03:34:58.757  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-01 03:34:58.757  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-01 03:34:58.758  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-01 03:34:58.758  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-01 03:34:58.766  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-01 03:34:58.766  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-01 03:34:58.767  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-01 03:34:58.769  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-01 03:34:58.868  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-01 03:34:58.869  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-01 03:34:58.869 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-01 03:34:58.870 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-01 03:34:58.871  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1660 2021-07-01 03:34:58.871  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-01 03:34:58.874  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-01 03:34:58.875  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-01 03:34:58.875  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-01 03:34:58.876  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-01 03:34:58.876 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-01 03:34:58.877 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-01 03:34:58.877 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-01 03:34:58.878 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-01 03:34:58.878 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-01 03:34:58.878 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-01 03:34:58.879 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-01 03:34:58.950 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 91444908449136056856217249581993925705551034847 IssuerDN: UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 01 02:18:36 UTC 2021 Final Date: Tue Jul 01 02:18:36 UTC 2031 SubjectDN: UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [64:6b:7a:f0:b4:ba:f6:e6:06:e2:9d:b7:33:6c:2a:d5:78:6a:a8:f3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2a708ea1531697bea3d37f91a34e39c2a67c413c c72db172e13e88787c89ceb140f0f0bf3a6959b6 75076b607e0c98cac948b74aefe8e0df9f870f5e dc545aafb810d545a546b6afc013b5e616750763 c985ce4c085f0c1379a593c37cb2c8e9a11fa759 0d30cdda2f060a905c52bfa5c55563f4333c35f9 0814ce688fe3145f010bbb279a5a569874212f36 317bf3bf6d2adfb1f5ace295ef8cd6380093f44b 59e4503b19eb1c195dd6fe26364a3d4ebc2f014b 6d6cf7b1b420ab74b2074d2744414e78d8416aad fbdf7ca687e4521f330b1c3506859532721cbbe8 47ab90a9d137e61ec93b4c5b06176c8c489ce537 3ba18b86f7e672070324fa203e696a5ca07024b0 42f8f7ba4c3a4c7fec4eb73f05c24fdb5281aedd a27855c42ba93d219e45921977b040d55d24ca7b b2c0bd77f30d749bb975641f3426ca872f682a8f c899d9da6280aea277ef1bf0384dc2a7f297c4a0 3f5ba2dd78acc85525b1d70f2c7fab26b79791ef 9c3959033ab80dcff35c26bfb46a4d4d42b176d5 560419c6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c7:96:40:a8:b2:3b:02:65:8b:41:09:93:6b:aa:b9:a1:06:a2:9e:5f] modulus: 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 public exponent: 10001 ] 2021-07-01 03:36:27.186  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-01 03:36:27.187 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-01 03:36:27.188 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-07-01 03:36:27.189 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-01 03:36:27.190  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-07-01 03:36:27.191  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-01 03:36:27.191  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-01 03:36:27.195  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-01 03:36:27.195  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-01 03:36:27.199  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-01 03:36:27.200  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-01 03:36:27.200  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-01 03:36:27.202  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-01 03:36:27.363  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-01 03:36:27.364  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-01 03:36:27.364 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-01 03:36:27.366 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-01 03:36:27.367  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1660 2021-07-01 03:36:27.367  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-01 03:36:27.368  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-01 03:36:27.369  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-01 03:36:27.369  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-01 03:36:27.369  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-01 03:36:27.370 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-01 03:36:27.370 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-01 03:36:27.370 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-01 03:36:27.371 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-01 03:36:27.371 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-01 03:36:27.371 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-01 03:36:27.372 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-01 03:36:27.375 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 91444908449136056856217249581993925705551034847 IssuerDN: UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 01 02:18:36 UTC 2021 Final Date: Tue Jul 01 02:18:36 UTC 2031 SubjectDN: UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [64:6b:7a:f0:b4:ba:f6:e6:06:e2:9d:b7:33:6c:2a:d5:78:6a:a8:f3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2a708ea1531697bea3d37f91a34e39c2a67c413c c72db172e13e88787c89ceb140f0f0bf3a6959b6 75076b607e0c98cac948b74aefe8e0df9f870f5e dc545aafb810d545a546b6afc013b5e616750763 c985ce4c085f0c1379a593c37cb2c8e9a11fa759 0d30cdda2f060a905c52bfa5c55563f4333c35f9 0814ce688fe3145f010bbb279a5a569874212f36 317bf3bf6d2adfb1f5ace295ef8cd6380093f44b 59e4503b19eb1c195dd6fe26364a3d4ebc2f014b 6d6cf7b1b420ab74b2074d2744414e78d8416aad fbdf7ca687e4521f330b1c3506859532721cbbe8 47ab90a9d137e61ec93b4c5b06176c8c489ce537 3ba18b86f7e672070324fa203e696a5ca07024b0 42f8f7ba4c3a4c7fec4eb73f05c24fdb5281aedd a27855c42ba93d219e45921977b040d55d24ca7b b2c0bd77f30d749bb975641f3426ca872f682a8f c899d9da6280aea277ef1bf0384dc2a7f297c4a0 3f5ba2dd78acc85525b1d70f2c7fab26b79791ef 9c3959033ab80dcff35c26bfb46a4d4d42b176d5 560419c6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9b:f4:05:f1:5d:64:9e:15:ad:40:73:ff:4d:d9:66:3a:d5:21:71:36] modulus: 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 public exponent: 10001 ] 2021-07-01 03:38:01.574  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-01 03:38:01.575 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-01 03:38:01.577 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-07-01 03:38:01.578 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-01 03:38:01.578  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-07-01 03:38:01.579  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-01 03:38:01.580  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-01 03:38:01.580  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-01 03:38:01.581  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-01 03:38:01.586  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-01 03:38:01.587  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-01 03:38:01.587  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-01 03:38:01.589  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-01 03:38:01.740  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-01 03:38:01.741  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-01 03:38:01.741 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-01 03:38:01.742 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-01 03:38:01.743  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1660 2021-07-01 03:38:01.743  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-01 03:38:01.744  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-01 03:38:01.745  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-01 03:38:01.745  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-01 03:38:01.745  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-01 03:38:01.746 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-01 03:38:01.746 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-01 03:38:01.746 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-01 03:38:01.747 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-01 03:38:01.747 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-01 03:38:01.747 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-01 03:38:01.748 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-01 03:38:01.751 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 91444908449136056856217249581993925705551034847 IssuerDN: UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 01 02:18:36 UTC 2021 Final Date: Tue Jul 01 02:18:36 UTC 2031 SubjectDN: UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [64:6b:7a:f0:b4:ba:f6:e6:06:e2:9d:b7:33:6c:2a:d5:78:6a:a8:f3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2a708ea1531697bea3d37f91a34e39c2a67c413c c72db172e13e88787c89ceb140f0f0bf3a6959b6 75076b607e0c98cac948b74aefe8e0df9f870f5e dc545aafb810d545a546b6afc013b5e616750763 c985ce4c085f0c1379a593c37cb2c8e9a11fa759 0d30cdda2f060a905c52bfa5c55563f4333c35f9 0814ce688fe3145f010bbb279a5a569874212f36 317bf3bf6d2adfb1f5ace295ef8cd6380093f44b 59e4503b19eb1c195dd6fe26364a3d4ebc2f014b 6d6cf7b1b420ab74b2074d2744414e78d8416aad fbdf7ca687e4521f330b1c3506859532721cbbe8 47ab90a9d137e61ec93b4c5b06176c8c489ce537 3ba18b86f7e672070324fa203e696a5ca07024b0 42f8f7ba4c3a4c7fec4eb73f05c24fdb5281aedd a27855c42ba93d219e45921977b040d55d24ca7b b2c0bd77f30d749bb975641f3426ca872f682a8f c899d9da6280aea277ef1bf0384dc2a7f297c4a0 3f5ba2dd78acc85525b1d70f2c7fab26b79791ef 9c3959033ab80dcff35c26bfb46a4d4d42b176d5 560419c6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b7:83:95:8b:8f:4e:a8:24:59:e5:c8:21:6e:be:6a:e6:68:d1:c0:d1] modulus: 884c68e145166804879264410c8ad272800a05ecc9722be37e13c834ccb3c58e676ae9241d7803f6df3ebb712ebd855826f299117a7d92d7f85e118bb5b8c250e854a7ed2e327264eb4e102e2371e703ad40e0ac9f63f71a6b6a857c680760ccd37d7cdfa6f02c29bb933aa8b437ebbde92a0071b3454247bd4451f4b2b06593f7c2d9675790a7a0a1f6535747bb036bdffe8986e155738c7c4c2817fd074f089ff715170edfc0b333ffeacd8ab5049f1465ab883ce42090b2572e381b426396a5f325d073a4b64e1df31f80311f365e4394d05576bc9afbfa0c5520549c1a7791e9e2eb0a23bf980b30a4c256c25a32631c4ae6eaa4757b088a70324614f669 public exponent: 10001 ] 2021-07-01 03:38:27.351  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-01 03:38:27.352 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-01 03:38:27.353 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-07-01 03:38:27.354 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-01 03:38:27.354  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-07-01 03:38:27.355  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-01 03:38:27.355  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-01 03:38:27.355  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-01 03:38:27.356  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-01 03:38:27.361  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-01 03:38:27.362  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-01 03:38:27.362  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-01 03:38:27.363  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-01 03:38:27.494  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-01 03:38:27.545  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-01 03:38:27.546 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-01 03:38:27.548 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-01 03:38:27.549  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1660 2021-07-01 03:38:27.550  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-01 03:38:27.551  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-01 03:38:27.552  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-01 03:38:27.552  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-01 03:38:27.552  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-01 03:38:27.553 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-01 03:38:27.553 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-01 03:38:27.553 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-01 03:38:27.554 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-01 03:38:27.554 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-01 03:38:27.555 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-01 03:38:27.555 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-01 03:38:27.558 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 91444908449136056856217249581993925705551034847 IssuerDN: UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 01 02:18:36 UTC 2021 Final Date: Tue Jul 01 02:18:36 UTC 2031 SubjectDN: UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [64:6b:7a:f0:b4:ba:f6:e6:06:e2:9d:b7:33:6c:2a:d5:78:6a:a8:f3] modulus: bd64a6f794ab358f3dc034146b95618b25b6b004174952463a3e6353449feb2bd3a7166b85e0a2b284de5c43c4a911caa119f39a2d150ca0a6d0d5a7d3ffc8dc68ab868f6b2226137c0f7ca16425660c84d4788182d6e8a5cffb68766a3e8db6983cc58423c338e3b97e90333c4281e88d3faedc843af7b1e2217b183475f5228364aab6f9c4ceb4d352dd7ed6c6c5d3fa08efdad219dcdce0398f8c14e6373fa0fff27800c9037b138c0f7999da047da03b00c292cbddfd05b5841d961045e44555f041ebc5c0987d7d855ca41b18b321fd03e987d92554a88158ebef7d3700086da0883f242133b468426b3be9df2979f9a05f4be375c30d2d36449461256c7724b2fb0fb0378e7f46830540aa30e3b2417f323eeda5f43c603ea52f3864158b7c535f6dccea7e1d781f3bd8abc07d584e9265b0006a1e7f31b03626ca325de2f9ea591fa94605a692e1f2b8b4f76c654c6ffcafada821fca4c9518d9ddab6d197e57a12da07f65c63223b14f78d24747207843a44e33372116b12e6b5ecd5 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2a708ea1531697bea3d37f91a34e39c2a67c413c c72db172e13e88787c89ceb140f0f0bf3a6959b6 75076b607e0c98cac948b74aefe8e0df9f870f5e dc545aafb810d545a546b6afc013b5e616750763 c985ce4c085f0c1379a593c37cb2c8e9a11fa759 0d30cdda2f060a905c52bfa5c55563f4333c35f9 0814ce688fe3145f010bbb279a5a569874212f36 317bf3bf6d2adfb1f5ace295ef8cd6380093f44b 59e4503b19eb1c195dd6fe26364a3d4ebc2f014b 6d6cf7b1b420ab74b2074d2744414e78d8416aad fbdf7ca687e4521f330b1c3506859532721cbbe8 47ab90a9d137e61ec93b4c5b06176c8c489ce537 3ba18b86f7e672070324fa203e696a5ca07024b0 42f8f7ba4c3a4c7fec4eb73f05c24fdb5281aedd a27855c42ba93d219e45921977b040d55d24ca7b b2c0bd77f30d749bb975641f3426ca872f682a8f c899d9da6280aea277ef1bf0384dc2a7f297c4a0 3f5ba2dd78acc85525b1d70f2c7fab26b79791ef 9c3959033ab80dcff35c26bfb46a4d4d42b176d5 560419c6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c0:0c:10:2d:e6:e6:20:08:c5:87:43:69:fc:e1:ab:ea:67:a0:06:34] modulus: 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 public exponent: 10001 ] 2021-07-01 03:38:50.023  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-01 03:38:50.024 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-01 03:38:50.025 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-07-01 03:38:50.025 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-01 03:38:50.026  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-07-01 03:38:50.027  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-01 03:38:50.027  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-01 03:38:50.028  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-01 03:38:50.028  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-01 03:38:50.032  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-01 03:38:50.033  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-01 03:38:50.033  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-01 03:38:50.035  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-01 03:38:50.138  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-01 03:38:50.139  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-01 03:38:50.139 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-01 03:38:50.141 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-01 03:38:50.142  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1660 2021-07-01 03:38:50.142  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-01 03:38:50.143  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-01 03:38:50.144  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-01 03:38:50.144  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-01 03:38:50.146  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-01 03:38:50.146 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-01 03:38:50.146 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-01 03:38:50.147 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-01 03:38:50.148 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-01 03:38:50.148 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-01 03:38:50.148 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-01 03:38:50.149 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-01 03:38:50.151 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 91444908449136056856217249581993925705551034847 IssuerDN: UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 01 02:18:36 UTC 2021 Final Date: Tue Jul 01 02:18:36 UTC 2031 SubjectDN: UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [64:6b:7a:f0:b4:ba:f6:e6:06:e2:9d:b7:33:6c:2a:d5:78:6a:a8:f3] modulus: bd64a6f794ab358f3dc034146b95618b25b6b004174952463a3e6353449feb2bd3a7166b85e0a2b284de5c43c4a911caa119f39a2d150ca0a6d0d5a7d3ffc8dc68ab868f6b2226137c0f7ca16425660c84d4788182d6e8a5cffb68766a3e8db6983cc58423c338e3b97e90333c4281e88d3faedc843af7b1e2217b183475f5228364aab6f9c4ceb4d352dd7ed6c6c5d3fa08efdad219dcdce0398f8c14e6373fa0fff27800c9037b138c0f7999da047da03b00c292cbddfd05b5841d961045e44555f041ebc5c0987d7d855ca41b18b321fd03e987d92554a88158ebef7d3700086da0883f242133b468426b3be9df2979f9a05f4be375c30d2d36449461256c7724b2fb0fb0378e7f46830540aa30e3b2417f323eeda5f43c603ea52f3864158b7c535f6dccea7e1d781f3bd8abc07d584e9265b0006a1e7f31b03626ca325de2f9ea591fa94605a692e1f2b8b4f76c654c6ffcafada821fca4c9518d9ddab6d197e57a12da07f65c63223b14f78d24747207843a44e33372116b12e6b5ecd5 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2a708ea1531697bea3d37f91a34e39c2a67c413c c72db172e13e88787c89ceb140f0f0bf3a6959b6 75076b607e0c98cac948b74aefe8e0df9f870f5e dc545aafb810d545a546b6afc013b5e616750763 c985ce4c085f0c1379a593c37cb2c8e9a11fa759 0d30cdda2f060a905c52bfa5c55563f4333c35f9 0814ce688fe3145f010bbb279a5a569874212f36 317bf3bf6d2adfb1f5ace295ef8cd6380093f44b 59e4503b19eb1c195dd6fe26364a3d4ebc2f014b 6d6cf7b1b420ab74b2074d2744414e78d8416aad fbdf7ca687e4521f330b1c3506859532721cbbe8 47ab90a9d137e61ec93b4c5b06176c8c489ce537 3ba18b86f7e672070324fa203e696a5ca07024b0 42f8f7ba4c3a4c7fec4eb73f05c24fdb5281aedd a27855c42ba93d219e45921977b040d55d24ca7b b2c0bd77f30d749bb975641f3426ca872f682a8f c899d9da6280aea277ef1bf0384dc2a7f297c4a0 3f5ba2dd78acc85525b1d70f2c7fab26b79791ef 9c3959033ab80dcff35c26bfb46a4d4d42b176d5 560419c6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f3:86:f5:cc:d2:d1:ae:e4:2f:80:0f:9a:76:05:49:58:1c:b0:d0:c6] modulus: 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 public exponent: 10001 ] 2021-07-01 03:38:51.478  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-01 03:38:51.478 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-01 03:38:51.479 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-07-01 03:38:51.480 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-01 03:38:51.480  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-07-01 03:38:51.481  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-01 03:38:51.481  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-01 03:38:51.481  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-01 03:38:51.482  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-01 03:38:51.485  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-01 03:38:51.486  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-01 03:38:51.486  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-01 03:38:51.487  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-01 03:38:51.545  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-01 03:38:51.545  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-01 03:38:51.545 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-01 03:38:51.546 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-01 03:38:51.547  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1660 2021-07-01 03:38:51.547  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-01 03:38:51.549  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-01 03:38:51.550  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-01 03:38:51.550  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-01 03:38:51.550  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-01 03:38:51.550 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-01 03:38:51.551 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-01 03:38:51.551 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-01 03:38:51.551 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-01 03:38:51.552 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-01 03:38:51.552 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-01 03:38:51.553 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-01 03:38:51.555 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 91444908449136056856217249581993925705551034847 IssuerDN: UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 01 02:18:36 UTC 2021 Final Date: Tue Jul 01 02:18:36 UTC 2031 SubjectDN: UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [64:6b:7a:f0:b4:ba:f6:e6:06:e2:9d:b7:33:6c:2a:d5:78:6a:a8:f3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2a708ea1531697bea3d37f91a34e39c2a67c413c c72db172e13e88787c89ceb140f0f0bf3a6959b6 75076b607e0c98cac948b74aefe8e0df9f870f5e dc545aafb810d545a546b6afc013b5e616750763 c985ce4c085f0c1379a593c37cb2c8e9a11fa759 0d30cdda2f060a905c52bfa5c55563f4333c35f9 0814ce688fe3145f010bbb279a5a569874212f36 317bf3bf6d2adfb1f5ace295ef8cd6380093f44b 59e4503b19eb1c195dd6fe26364a3d4ebc2f014b 6d6cf7b1b420ab74b2074d2744414e78d8416aad fbdf7ca687e4521f330b1c3506859532721cbbe8 47ab90a9d137e61ec93b4c5b06176c8c489ce537 3ba18b86f7e672070324fa203e696a5ca07024b0 42f8f7ba4c3a4c7fec4eb73f05c24fdb5281aedd a27855c42ba93d219e45921977b040d55d24ca7b b2c0bd77f30d749bb975641f3426ca872f682a8f c899d9da6280aea277ef1bf0384dc2a7f297c4a0 3f5ba2dd78acc85525b1d70f2c7fab26b79791ef 9c3959033ab80dcff35c26bfb46a4d4d42b176d5 560419c6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [91:04:eb:2b:b5:c9:11:23:78:cd:cf:2a:e0:05:e7:dd:9d:43:da:73] modulus: 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 public exponent: 10001 ] 2021-07-01 03:40:30.797  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-01 03:40:30.798 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-01 03:40:30.799 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-07-01 03:40:30.799 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-01 03:40:30.800  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-07-01 03:40:30.800  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-01 03:40:30.800  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-01 03:40:30.801  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-01 03:40:30.801  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-01 03:40:30.805  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-01 03:40:30.805  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-01 03:40:30.806  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-01 03:40:30.807  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-01 03:40:30.910  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-01 03:40:30.911  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-01 03:40:30.911 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-01 03:40:30.915 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-01 03:40:30.915  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1660 2021-07-01 03:40:30.916  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-01 03:40:30.917  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-01 03:40:30.917  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-01 03:40:30.917  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-01 03:40:30.918  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-01 03:40:30.918 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-01 03:40:30.919 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-01 03:40:30.919 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-01 03:40:30.920 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-01 03:40:30.920 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-01 03:40:30.920 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-01 03:40:30.923 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-01 03:40:30.927 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 91444908449136056856217249581993925705551034847 IssuerDN: UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 01 02:18:36 UTC 2021 Final Date: Tue Jul 01 02:18:36 UTC 2031 SubjectDN: UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [64:6b:7a:f0:b4:ba:f6:e6:06:e2:9d:b7:33:6c:2a:d5:78:6a:a8:f3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2a708ea1531697bea3d37f91a34e39c2a67c413c c72db172e13e88787c89ceb140f0f0bf3a6959b6 75076b607e0c98cac948b74aefe8e0df9f870f5e dc545aafb810d545a546b6afc013b5e616750763 c985ce4c085f0c1379a593c37cb2c8e9a11fa759 0d30cdda2f060a905c52bfa5c55563f4333c35f9 0814ce688fe3145f010bbb279a5a569874212f36 317bf3bf6d2adfb1f5ace295ef8cd6380093f44b 59e4503b19eb1c195dd6fe26364a3d4ebc2f014b 6d6cf7b1b420ab74b2074d2744414e78d8416aad fbdf7ca687e4521f330b1c3506859532721cbbe8 47ab90a9d137e61ec93b4c5b06176c8c489ce537 3ba18b86f7e672070324fa203e696a5ca07024b0 42f8f7ba4c3a4c7fec4eb73f05c24fdb5281aedd a27855c42ba93d219e45921977b040d55d24ca7b b2c0bd77f30d749bb975641f3426ca872f682a8f c899d9da6280aea277ef1bf0384dc2a7f297c4a0 3f5ba2dd78acc85525b1d70f2c7fab26b79791ef 9c3959033ab80dcff35c26bfb46a4d4d42b176d5 560419c6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3e:1f:34:3a:cb:91:fb:5c:2e:2e:87:13:1f:c9:d5:0b:11:08:e6:91] modulus: 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 public exponent: 10001 ] 2021-07-01 03:41:44.229  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-01 03:41:44.231 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-01 03:41:44.232 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-07-01 03:41:44.233 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-01 03:41:44.233  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-07-01 03:41:44.234  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-01 03:41:44.234  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-01 03:41:44.235  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-01 03:41:44.235  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-01 03:41:44.240  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-01 03:41:44.241  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-01 03:41:44.241  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-01 03:41:44.242  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-01 03:41:44.345  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-01 03:41:44.346  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-01 03:41:44.346 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-01 03:41:44.347 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-01 03:41:44.347  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1660 2021-07-01 03:41:44.348  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-01 03:41:44.349  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-01 03:41:44.349  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-01 03:41:44.349  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-01 03:41:44.350  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-01 03:41:44.350 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-01 03:41:44.350 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-01 03:41:44.350 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-01 03:41:44.351 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-01 03:41:44.351 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-01 03:41:44.351 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-01 03:41:44.352 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-01 03:41:44.354 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 91444908449136056856217249581993925705551034847 IssuerDN: UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 01 02:18:36 UTC 2021 Final Date: Tue Jul 01 02:18:36 UTC 2031 SubjectDN: UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [64:6b:7a:f0:b4:ba:f6:e6:06:e2:9d:b7:33:6c:2a:d5:78:6a:a8:f3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2a708ea1531697bea3d37f91a34e39c2a67c413c c72db172e13e88787c89ceb140f0f0bf3a6959b6 75076b607e0c98cac948b74aefe8e0df9f870f5e dc545aafb810d545a546b6afc013b5e616750763 c985ce4c085f0c1379a593c37cb2c8e9a11fa759 0d30cdda2f060a905c52bfa5c55563f4333c35f9 0814ce688fe3145f010bbb279a5a569874212f36 317bf3bf6d2adfb1f5ace295ef8cd6380093f44b 59e4503b19eb1c195dd6fe26364a3d4ebc2f014b 6d6cf7b1b420ab74b2074d2744414e78d8416aad fbdf7ca687e4521f330b1c3506859532721cbbe8 47ab90a9d137e61ec93b4c5b06176c8c489ce537 3ba18b86f7e672070324fa203e696a5ca07024b0 42f8f7ba4c3a4c7fec4eb73f05c24fdb5281aedd a27855c42ba93d219e45921977b040d55d24ca7b b2c0bd77f30d749bb975641f3426ca872f682a8f c899d9da6280aea277ef1bf0384dc2a7f297c4a0 3f5ba2dd78acc85525b1d70f2c7fab26b79791ef 9c3959033ab80dcff35c26bfb46a4d4d42b176d5 560419c6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e8:01:35:0f:7b:78:73:2e:fb:0c:e9:33:24:a9:e7:a8:20:5f:ed:8a] modulus: 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 public exponent: 10001 ] 2021-07-01 03:44:49.991  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-01 03:44:49.992 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-01 03:44:49.993 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-07-01 03:44:49.993 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-01 03:44:49.993  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-07-01 03:44:49.994  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-01 03:44:49.994  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-01 03:44:49.994  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-01 03:44:49.995  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-01 03:44:49.999  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-01 03:44:49.999  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-01 03:44:50.000  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-01 03:44:50.001  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-01 03:44:50.099  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-01 03:44:50.099  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-01 03:44:50.099 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-01 03:44:50.100 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-01 03:44:50.101  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1660 2021-07-01 03:44:50.101  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-01 03:44:50.102  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-01 03:44:50.102  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-01 03:44:50.103  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-01 03:44:50.103  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-01 03:44:50.103 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-01 03:44:50.103 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-01 03:44:50.104 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-01 03:44:50.104 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-01 03:44:50.104 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-01 03:44:50.105 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-01 03:44:50.105 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-01 03:44:50.108 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 91444908449136056856217249581993925705551034847 IssuerDN: UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 01 02:18:36 UTC 2021 Final Date: Tue Jul 01 02:18:36 UTC 2031 SubjectDN: UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [64:6b:7a:f0:b4:ba:f6:e6:06:e2:9d:b7:33:6c:2a:d5:78:6a:a8:f3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2a708ea1531697bea3d37f91a34e39c2a67c413c c72db172e13e88787c89ceb140f0f0bf3a6959b6 75076b607e0c98cac948b74aefe8e0df9f870f5e dc545aafb810d545a546b6afc013b5e616750763 c985ce4c085f0c1379a593c37cb2c8e9a11fa759 0d30cdda2f060a905c52bfa5c55563f4333c35f9 0814ce688fe3145f010bbb279a5a569874212f36 317bf3bf6d2adfb1f5ace295ef8cd6380093f44b 59e4503b19eb1c195dd6fe26364a3d4ebc2f014b 6d6cf7b1b420ab74b2074d2744414e78d8416aad fbdf7ca687e4521f330b1c3506859532721cbbe8 47ab90a9d137e61ec93b4c5b06176c8c489ce537 3ba18b86f7e672070324fa203e696a5ca07024b0 42f8f7ba4c3a4c7fec4eb73f05c24fdb5281aedd a27855c42ba93d219e45921977b040d55d24ca7b b2c0bd77f30d749bb975641f3426ca872f682a8f c899d9da6280aea277ef1bf0384dc2a7f297c4a0 3f5ba2dd78acc85525b1d70f2c7fab26b79791ef 9c3959033ab80dcff35c26bfb46a4d4d42b176d5 560419c6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b3:f4:cd:66:77:be:64:96:b3:a8:09:59:f7:20:86:e2:de:20:a8:0b] modulus: 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 public exponent: 10001 ] 2021-07-01 03:46:34.758  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-01 03:46:34.759 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-01 03:46:34.760 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-07-01 03:46:34.761 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-01 03:46:34.761  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-07-01 03:46:34.761  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-01 03:46:34.762  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-01 03:46:34.762  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-01 03:46:34.762  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-01 03:46:34.767  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-01 03:46:34.767  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-01 03:46:34.768  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-01 03:46:34.769  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-01 03:46:34.850  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-01 03:46:34.850  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-01 03:46:34.850 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-01 03:46:34.851 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-01 03:46:34.852  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1660 2021-07-01 03:46:34.852  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-01 03:46:34.853  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-01 03:46:34.853  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-01 03:46:34.854  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-01 03:46:34.854  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-01 03:46:34.854 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-01 03:46:34.854 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-01 03:46:34.854 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-01 03:46:34.855 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-01 03:46:34.855 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-01 03:46:34.855 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-01 03:46:34.856 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-01 03:46:34.859 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 91444908449136056856217249581993925705551034847 IssuerDN: UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 01 02:18:36 UTC 2021 Final Date: Tue Jul 01 02:18:36 UTC 2031 SubjectDN: UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [64:6b:7a:f0:b4:ba:f6:e6:06:e2:9d:b7:33:6c:2a:d5:78:6a:a8:f3] modulus: bd64a6f794ab358f3dc034146b95618b25b6b004174952463a3e6353449feb2bd3a7166b85e0a2b284de5c43c4a911caa119f39a2d150ca0a6d0d5a7d3ffc8dc68ab868f6b2226137c0f7ca16425660c84d4788182d6e8a5cffb68766a3e8db6983cc58423c338e3b97e90333c4281e88d3faedc843af7b1e2217b183475f5228364aab6f9c4ceb4d352dd7ed6c6c5d3fa08efdad219dcdce0398f8c14e6373fa0fff27800c9037b138c0f7999da047da03b00c292cbddfd05b5841d961045e44555f041ebc5c0987d7d855ca41b18b321fd03e987d92554a88158ebef7d3700086da0883f242133b468426b3be9df2979f9a05f4be375c30d2d36449461256c7724b2fb0fb0378e7f46830540aa30e3b2417f323eeda5f43c603ea52f3864158b7c535f6dccea7e1d781f3bd8abc07d584e9265b0006a1e7f31b03626ca325de2f9ea591fa94605a692e1f2b8b4f76c654c6ffcafada821fca4c9518d9ddab6d197e57a12da07f65c63223b14f78d24747207843a44e33372116b12e6b5ecd5 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2a708ea1531697bea3d37f91a34e39c2a67c413c c72db172e13e88787c89ceb140f0f0bf3a6959b6 75076b607e0c98cac948b74aefe8e0df9f870f5e dc545aafb810d545a546b6afc013b5e616750763 c985ce4c085f0c1379a593c37cb2c8e9a11fa759 0d30cdda2f060a905c52bfa5c55563f4333c35f9 0814ce688fe3145f010bbb279a5a569874212f36 317bf3bf6d2adfb1f5ace295ef8cd6380093f44b 59e4503b19eb1c195dd6fe26364a3d4ebc2f014b 6d6cf7b1b420ab74b2074d2744414e78d8416aad fbdf7ca687e4521f330b1c3506859532721cbbe8 47ab90a9d137e61ec93b4c5b06176c8c489ce537 3ba18b86f7e672070324fa203e696a5ca07024b0 42f8f7ba4c3a4c7fec4eb73f05c24fdb5281aedd a27855c42ba93d219e45921977b040d55d24ca7b b2c0bd77f30d749bb975641f3426ca872f682a8f c899d9da6280aea277ef1bf0384dc2a7f297c4a0 3f5ba2dd78acc85525b1d70f2c7fab26b79791ef 9c3959033ab80dcff35c26bfb46a4d4d42b176d5 560419c6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ed:0f:17:a4:7a:c2:be:fc:b8:44:16:10:d5:b0:f2:27:a8:10:d8:1f] modulus: 8f79ba93435487e2963df64f3c48d6494f9a8c971fb5f1a3e9f5f8708db0631f7732c39c685137176aa7345e5aeb8e719644f54261a97ac93e2eb969885071fac5dcec7402895c56acd3673726288fbaffd733fa775d1236f40d4a11a3cc9143839b2d8b193c429deab8bc3516feb98600ee81ad2e4145ca477cc64b11059b6faf8b98f6fedc62d66cb9d74761cee6edc4f6952aad3bdcfe6258bb603df208e30fd7c49d3777a1039d1c836bb0680c63327fbcba56b656c3fb092a480af76c43ad0ed6c5e2b1cf159fd272b4d6c22907ef56a83abd5d4887c89f90db93f252448c0020c4559cff11b4fc06584963fb39f468e0bb04930f4b43dab2eb186e0ef5 public exponent: 10001 ] 2021-07-01 03:48:06.062  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-01 03:48:06.063 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-01 03:48:06.064 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-07-01 03:48:06.065 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-01 03:48:06.065  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-07-01 03:48:06.066  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-01 03:48:06.066  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-01 03:48:06.066  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-01 03:48:06.066  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-01 03:48:06.071  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-01 03:48:06.071  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-01 03:48:06.071  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-01 03:48:06.072  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-01 03:48:06.163  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-01 03:48:06.164  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-01 03:48:06.164 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-01 03:48:06.165 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-01 03:48:06.165  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1660 2021-07-01 03:48:06.166  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-01 03:48:06.167  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-01 03:48:06.167  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-01 03:48:06.167  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-01 03:48:06.168  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-01 03:48:06.168 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-01 03:48:06.168 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-01 03:48:06.168 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-01 03:48:06.169 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-01 03:48:06.169 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-01 03:48:06.169 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-01 03:48:06.170 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-01 03:48:06.172 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 91444908449136056856217249581993925705551034847 IssuerDN: UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 01 02:18:36 UTC 2021 Final Date: Tue Jul 01 02:18:36 UTC 2031 SubjectDN: UID=c-0b5358a567230db3b,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [64:6b:7a:f0:b4:ba:f6:e6:06:e2:9d:b7:33:6c:2a:d5:78:6a:a8:f3] modulus: bd64a6f794ab358f3dc034146b95618b25b6b004174952463a3e6353449feb2bd3a7166b85e0a2b284de5c43c4a911caa119f39a2d150ca0a6d0d5a7d3ffc8dc68ab868f6b2226137c0f7ca16425660c84d4788182d6e8a5cffb68766a3e8db6983cc58423c338e3b97e90333c4281e88d3faedc843af7b1e2217b183475f5228364aab6f9c4ceb4d352dd7ed6c6c5d3fa08efdad219dcdce0398f8c14e6373fa0fff27800c9037b138c0f7999da047da03b00c292cbddfd05b5841d961045e44555f041ebc5c0987d7d855ca41b18b321fd03e987d92554a88158ebef7d3700086da0883f242133b468426b3be9df2979f9a05f4be375c30d2d36449461256c7724b2fb0fb0378e7f46830540aa30e3b2417f323eeda5f43c603ea52f3864158b7c535f6dccea7e1d781f3bd8abc07d584e9265b0006a1e7f31b03626ca325de2f9ea591fa94605a692e1f2b8b4f76c654c6ffcafada821fca4c9518d9ddab6d197e57a12da07f65c63223b14f78d24747207843a44e33372116b12e6b5ecd5 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2a708ea1531697bea3d37f91a34e39c2a67c413c c72db172e13e88787c89ceb140f0f0bf3a6959b6 75076b607e0c98cac948b74aefe8e0df9f870f5e dc545aafb810d545a546b6afc013b5e616750763 c985ce4c085f0c1379a593c37cb2c8e9a11fa759 0d30cdda2f060a905c52bfa5c55563f4333c35f9 0814ce688fe3145f010bbb279a5a569874212f36 317bf3bf6d2adfb1f5ace295ef8cd6380093f44b 59e4503b19eb1c195dd6fe26364a3d4ebc2f014b 6d6cf7b1b420ab74b2074d2744414e78d8416aad fbdf7ca687e4521f330b1c3506859532721cbbe8 47ab90a9d137e61ec93b4c5b06176c8c489ce537 3ba18b86f7e672070324fa203e696a5ca07024b0 42f8f7ba4c3a4c7fec4eb73f05c24fdb5281aedd a27855c42ba93d219e45921977b040d55d24ca7b b2c0bd77f30d749bb975641f3426ca872f682a8f c899d9da6280aea277ef1bf0384dc2a7f297c4a0 3f5ba2dd78acc85525b1d70f2c7fab26b79791ef 9c3959033ab80dcff35c26bfb46a4d4d42b176d5 560419c6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6e:33:82:e8:e1:24:2a:01:84:34:b9:ac:83:4e:6a:6c:0a:f4:ea:43] modulus: 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 public exponent: 10001 ]