Results

By type

          2021-05-05 09:35:18,171 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-05-05 09:35:21,567 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-05-05 09:35:24.070  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-05-05 09:35:34.172 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-05-05 09:35:35.079  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-05-05 09:35:35.774  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-05-05 09:35:47.174  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 30.91 seconds (JVM running for 37.247)
2021-05-05 09:47:59.270  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 09:47:59.279 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 09:47:59.403 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-05 09:47:59.464 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 09:47:59.564  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-05 09:47:59.569  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 09:47:59.575  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 09:47:59.575  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 09:47:59.576  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 09:47:59.666  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 09:47:59.670  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 09:47:59.868  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 09:47:59.873  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 09:47:59.874  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 09:47:59.961  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 09:48:00.956  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 09:48:00.959  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 09:48:00.959 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 09:48:00.964 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 09:48:01.287  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1627
2021-05-05 09:48:01.288  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 09:48:01.292  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 09:48:01.292  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 09:48:01.363  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 09:48:01.365  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 09:48:01.366 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 09:48:01.366 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 09:48:01.367 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 09:48:01.377 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 09:48:01.378 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 09:48:01.378 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 09:48:01.384 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 09:48:01.480 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 346385566726625223712388886969089262072978522882
             IssuerDN: UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 09:27:56 UTC 2021
           Final Date: Mon May 05 09:27:56 UTC 2031
            SubjectDN: UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:03:99:53:69:76:f7:01:a3:ca:42:99:97:fd:44:a2:e7:83:68:5a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 836f723a38cce952fa4db687994f77cecfe0f5fe
                       61b5f1242714faaf0260beffc878b89b9cfe228b
                       835dba2c02ba4e49200954998f2ca3afb2e6dada
                       95f67fd2904e88511ece95905a00afe92c839f31
                       567bac73c2213c76b30594cf66553078220dd38b
                       4718c0932adff34d3e940f64d287e89ad5599dbf
                       c8347d1e60fb50c91a947372664e237a453e55b2
                       b47c0dcc237faddaf862b854e326657b8f0d1557
                       f07cc30a5347830fcd0c8ce6b135c214cc6b06fa
                       9bb7be68e4b28755f3116510330ba2c9b6b1b922
                       12fe8b6f9b42d170673ecd63412366b6592bfbe3
                       e408cf6edfeb211cda9e489e7c33b31178b2e939
                       e749855eee400ecb578a9668dd301ec23313957a
                       c1e525421aa1531d57e9f081d32d354f37eafdb5
                       4220504cedd2fd646cda5e6d462cad54bb008681
                       1c6bc6e8f00792f33a0e581b810fd5c0d1c46ffa
                       bb6bd85597df725040b9709cabbcc2627eba3719
                       a1484b0cd95b575bb3f04d63a62837294c555fea
                       a60339a3de0467341bfed8141e11c57a18394caf
                       3bb99d80
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [92:e8:f1:0e:f8:71:32:ee:bd:94:52:e8:50:cf:46:80:aa:9f:b5:24]
            modulus: 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
    public exponent: 10001

] 
2021-05-05 10:53:38.236  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 10:53:38.238 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 10:53:38.241 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-05 10:53:38.242 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 10:53:38.243  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-05 10:53:38.243  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 10:53:38.244  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 10:53:38.245  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 10:53:38.245  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 10:53:38.257  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 10:53:38.259  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 10:53:38.259  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 10:53:38.266  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 10:53:38.399  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 10:53:38.399  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 10:53:38.400 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 10:53:38.462 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 10:53:38.463  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1627
2021-05-05 10:53:38.463  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 10:53:38.466  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 10:53:38.467  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 10:53:38.468  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 10:53:38.468  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 10:53:38.469 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 10:53:38.469 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 10:53:38.469 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 10:53:38.471 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 10:53:38.471 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 10:53:38.471 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 10:53:38.473 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 10:53:38.560 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 346385566726625223712388886969089262072978522882
             IssuerDN: UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 09:27:56 UTC 2021
           Final Date: Mon May 05 09:27:56 UTC 2031
            SubjectDN: UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:03:99:53:69:76:f7:01:a3:ca:42:99:97:fd:44:a2:e7:83:68:5a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 836f723a38cce952fa4db687994f77cecfe0f5fe
                       61b5f1242714faaf0260beffc878b89b9cfe228b
                       835dba2c02ba4e49200954998f2ca3afb2e6dada
                       95f67fd2904e88511ece95905a00afe92c839f31
                       567bac73c2213c76b30594cf66553078220dd38b
                       4718c0932adff34d3e940f64d287e89ad5599dbf
                       c8347d1e60fb50c91a947372664e237a453e55b2
                       b47c0dcc237faddaf862b854e326657b8f0d1557
                       f07cc30a5347830fcd0c8ce6b135c214cc6b06fa
                       9bb7be68e4b28755f3116510330ba2c9b6b1b922
                       12fe8b6f9b42d170673ecd63412366b6592bfbe3
                       e408cf6edfeb211cda9e489e7c33b31178b2e939
                       e749855eee400ecb578a9668dd301ec23313957a
                       c1e525421aa1531d57e9f081d32d354f37eafdb5
                       4220504cedd2fd646cda5e6d462cad54bb008681
                       1c6bc6e8f00792f33a0e581b810fd5c0d1c46ffa
                       bb6bd85597df725040b9709cabbcc2627eba3719
                       a1484b0cd95b575bb3f04d63a62837294c555fea
                       a60339a3de0467341bfed8141e11c57a18394caf
                       3bb99d80
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ca:90:6d:f6:bb:fa:3f:64:0a:dd:84:5b:a3:6b:bf:2f:3c:65:d5:2c]
            modulus: 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
    public exponent: 10001

] 
2021-05-05 10:55:07.575  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 10:55:07.576 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 10:55:07.578 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-05 10:55:07.578 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 10:55:07.579  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-05 10:55:07.580  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 10:55:07.580  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 10:55:07.581  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 10:55:07.582  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 10:55:07.586  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 10:55:07.587  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 10:55:07.587  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 10:55:07.588  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 10:55:07.744  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 10:55:07.745  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 10:55:07.745 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 10:55:07.747 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 10:55:07.747  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1627
2021-05-05 10:55:07.748  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 10:55:07.749  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 10:55:07.750  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 10:55:07.751  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 10:55:07.751  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 10:55:07.752 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 10:55:07.752 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 10:55:07.752 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 10:55:07.753 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 10:55:07.754 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 10:55:07.754 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 10:55:07.755 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 10:55:07.760 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 346385566726625223712388886969089262072978522882
             IssuerDN: UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 09:27:56 UTC 2021
           Final Date: Mon May 05 09:27:56 UTC 2031
            SubjectDN: UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:03:99:53:69:76:f7:01:a3:ca:42:99:97:fd:44:a2:e7:83:68:5a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 836f723a38cce952fa4db687994f77cecfe0f5fe
                       61b5f1242714faaf0260beffc878b89b9cfe228b
                       835dba2c02ba4e49200954998f2ca3afb2e6dada
                       95f67fd2904e88511ece95905a00afe92c839f31
                       567bac73c2213c76b30594cf66553078220dd38b
                       4718c0932adff34d3e940f64d287e89ad5599dbf
                       c8347d1e60fb50c91a947372664e237a453e55b2
                       b47c0dcc237faddaf862b854e326657b8f0d1557
                       f07cc30a5347830fcd0c8ce6b135c214cc6b06fa
                       9bb7be68e4b28755f3116510330ba2c9b6b1b922
                       12fe8b6f9b42d170673ecd63412366b6592bfbe3
                       e408cf6edfeb211cda9e489e7c33b31178b2e939
                       e749855eee400ecb578a9668dd301ec23313957a
                       c1e525421aa1531d57e9f081d32d354f37eafdb5
                       4220504cedd2fd646cda5e6d462cad54bb008681
                       1c6bc6e8f00792f33a0e581b810fd5c0d1c46ffa
                       bb6bd85597df725040b9709cabbcc2627eba3719
                       a1484b0cd95b575bb3f04d63a62837294c555fea
                       a60339a3de0467341bfed8141e11c57a18394caf
                       3bb99d80
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [29:1b:ae:d2:2c:b6:63:27:2d:a0:0b:62:d4:c0:0a:73:62:7a:25:58]
            modulus: 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
    public exponent: 10001

] 
2021-05-05 10:58:18.126  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 10:58:18.127 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 10:58:18.129 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-05 10:58:18.130 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 10:58:18.130  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-05 10:58:18.131  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 10:58:18.132  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 10:58:18.133  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 10:58:18.133  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 10:58:18.140  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 10:58:18.141  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 10:58:18.142  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 10:58:18.144  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 10:58:18.259  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 10:58:18.260  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 10:58:18.260 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 10:58:18.261 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 10:58:18.262  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1627
2021-05-05 10:58:18.262  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 10:58:18.263  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 10:58:18.264  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 10:58:18.264  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 10:58:18.264  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 10:58:18.265 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 10:58:18.265 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 10:58:18.265 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 10:58:18.266 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 10:58:18.266 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 10:58:18.266 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 10:58:18.267 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 10:58:18.270 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 346385566726625223712388886969089262072978522882
             IssuerDN: UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 09:27:56 UTC 2021
           Final Date: Mon May 05 09:27:56 UTC 2031
            SubjectDN: UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:03:99:53:69:76:f7:01:a3:ca:42:99:97:fd:44:a2:e7:83:68:5a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 836f723a38cce952fa4db687994f77cecfe0f5fe
                       61b5f1242714faaf0260beffc878b89b9cfe228b
                       835dba2c02ba4e49200954998f2ca3afb2e6dada
                       95f67fd2904e88511ece95905a00afe92c839f31
                       567bac73c2213c76b30594cf66553078220dd38b
                       4718c0932adff34d3e940f64d287e89ad5599dbf
                       c8347d1e60fb50c91a947372664e237a453e55b2
                       b47c0dcc237faddaf862b854e326657b8f0d1557
                       f07cc30a5347830fcd0c8ce6b135c214cc6b06fa
                       9bb7be68e4b28755f3116510330ba2c9b6b1b922
                       12fe8b6f9b42d170673ecd63412366b6592bfbe3
                       e408cf6edfeb211cda9e489e7c33b31178b2e939
                       e749855eee400ecb578a9668dd301ec23313957a
                       c1e525421aa1531d57e9f081d32d354f37eafdb5
                       4220504cedd2fd646cda5e6d462cad54bb008681
                       1c6bc6e8f00792f33a0e581b810fd5c0d1c46ffa
                       bb6bd85597df725040b9709cabbcc2627eba3719
                       a1484b0cd95b575bb3f04d63a62837294c555fea
                       a60339a3de0467341bfed8141e11c57a18394caf
                       3bb99d80
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fb:72:30:79:62:6a:e7:b8:08:c7:81:8d:0f:ab:c0:0f:5e:a3:f8:51]
            modulus: 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
    public exponent: 10001

] 
2021-05-05 10:58:23.315  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 10:58:23.317 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 10:58:23.318 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-05 10:58:23.319 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 10:58:23.320  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-05 10:58:23.321  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 10:58:23.321  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 10:58:23.322  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 10:58:23.322  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 10:58:23.331  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 10:58:23.331  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 10:58:23.332  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 10:58:23.334  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 10:58:23.434  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 10:58:23.435  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 10:58:23.435 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 10:58:23.437 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 10:58:23.438  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1627
2021-05-05 10:58:23.438  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 10:58:23.459  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 10:58:23.460  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 10:58:23.460  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 10:58:23.461  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 10:58:23.461 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 10:58:23.461 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 10:58:23.462 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 10:58:23.463 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 10:58:23.463 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 10:58:23.464 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 10:58:23.465 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 10:58:23.469 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 346385566726625223712388886969089262072978522882
             IssuerDN: UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 09:27:56 UTC 2021
           Final Date: Mon May 05 09:27:56 UTC 2031
            SubjectDN: UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:03:99:53:69:76:f7:01:a3:ca:42:99:97:fd:44:a2:e7:83:68:5a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 836f723a38cce952fa4db687994f77cecfe0f5fe
                       61b5f1242714faaf0260beffc878b89b9cfe228b
                       835dba2c02ba4e49200954998f2ca3afb2e6dada
                       95f67fd2904e88511ece95905a00afe92c839f31
                       567bac73c2213c76b30594cf66553078220dd38b
                       4718c0932adff34d3e940f64d287e89ad5599dbf
                       c8347d1e60fb50c91a947372664e237a453e55b2
                       b47c0dcc237faddaf862b854e326657b8f0d1557
                       f07cc30a5347830fcd0c8ce6b135c214cc6b06fa
                       9bb7be68e4b28755f3116510330ba2c9b6b1b922
                       12fe8b6f9b42d170673ecd63412366b6592bfbe3
                       e408cf6edfeb211cda9e489e7c33b31178b2e939
                       e749855eee400ecb578a9668dd301ec23313957a
                       c1e525421aa1531d57e9f081d32d354f37eafdb5
                       4220504cedd2fd646cda5e6d462cad54bb008681
                       1c6bc6e8f00792f33a0e581b810fd5c0d1c46ffa
                       bb6bd85597df725040b9709cabbcc2627eba3719
                       a1484b0cd95b575bb3f04d63a62837294c555fea
                       a60339a3de0467341bfed8141e11c57a18394caf
                       3bb99d80
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [98:01:a6:9f:74:11:38:c6:08:4b:b2:56:d6:d3:3d:99:55:f4:8b:65]
            modulus: 8cd5b0b04d7905cc54ae8ca8baa061809f1d5b98ed67759de180a806438fd011d4c3447fd3733914a7140755f0babf1bbd488c6abe478e38d3025fa013e272e986ef1e262e60e850ddeb3e9fc59dbe2d69f2359dd15bc7575dfbc967f58fbab2d8ec0056e6c71d45eee2f002e3efa02d3cb2a914d081512053cedd6c6ffbfd1454d235fe8f3f77e5de71d27c698ec21f389923b6bfa0403eba98ec1ed87e91c9ae7c463fb62bd966fd7d0e6888ab5f005aae4f61eb2a0f221cc592ad3223e394f872cc02db00fd2d63500186ee37d5885a82ea93bb563bbb74bb15e6ed6d5fcfb6f3930c90f9455791a263c728b6d409aece60a6fad92b02ca49959bf7a440cf
    public exponent: 10001

] 
2021-05-05 10:58:51.271  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 10:58:51.272 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 10:58:51.272 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-05 10:58:51.273 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 10:58:51.273  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-05 10:58:51.274  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 10:58:51.274  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 10:58:51.275  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 10:58:51.275  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 10:58:51.279  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 10:58:51.279  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 10:58:51.280  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 10:58:51.281  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 10:58:51.378  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 10:58:51.378  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 10:58:51.379 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 10:58:51.380 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 10:58:51.380  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1627
2021-05-05 10:58:51.381  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 10:58:51.382  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 10:58:51.382  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 10:58:51.383  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 10:58:51.383  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 10:58:51.383 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 10:58:51.384 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 10:58:51.384 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 10:58:51.385 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 10:58:51.385 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 10:58:51.385 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 10:58:51.386 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 10:58:51.389 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 346385566726625223712388886969089262072978522882
             IssuerDN: UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 09:27:56 UTC 2021
           Final Date: Mon May 05 09:27:56 UTC 2031
            SubjectDN: UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:03:99:53:69:76:f7:01:a3:ca:42:99:97:fd:44:a2:e7:83:68:5a]
            modulus: a1e000e5633f23a06b54e705b13f6330c2930e43c6d518f1d52dd0995c4b562c52b6e97cb66f5a4d0cc7c6fcfa517e55b1daf42b87d368cdd6689a633730535126a2871bca9350c82e16f410cce02bc0cb33d09abd08528b6a57c1ecdc7a903e806b565c4bae1f682bd87e23829368a3d3de8794d0bae3c2caf0c2bc59a03f4aec5c038aa1944390a1724cacb0ae3e185725e04451df785974e053ac441d2b64143a2ed835a965462c8dc7f00419e166e0373d923a89f9243a0754f60cdd937110b4dc30745a3d8210126a75885ec3ed0ae66e3abcc00454ee393bae5f270433f26cb451396a44d6d23917ad0dc75b2a375138174ea0e4106ef0862497b36f79950335e30fdcb975c61f332430b0bcbc441324a08172de152427831219911e9a1d3526e74d4ca5abe4f415b0a931e51ce68c4f40fa594aab01ea2ed6f251849b43496a36c871ac83817fffeda0a2ab9bf35c2a5adc84e64f97e27fcac6a1fb960ffdb724f7734a0661b855100c3ada7a6ae9379d35d06667e0b855e0ee570845
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 836f723a38cce952fa4db687994f77cecfe0f5fe
                       61b5f1242714faaf0260beffc878b89b9cfe228b
                       835dba2c02ba4e49200954998f2ca3afb2e6dada
                       95f67fd2904e88511ece95905a00afe92c839f31
                       567bac73c2213c76b30594cf66553078220dd38b
                       4718c0932adff34d3e940f64d287e89ad5599dbf
                       c8347d1e60fb50c91a947372664e237a453e55b2
                       b47c0dcc237faddaf862b854e326657b8f0d1557
                       f07cc30a5347830fcd0c8ce6b135c214cc6b06fa
                       9bb7be68e4b28755f3116510330ba2c9b6b1b922
                       12fe8b6f9b42d170673ecd63412366b6592bfbe3
                       e408cf6edfeb211cda9e489e7c33b31178b2e939
                       e749855eee400ecb578a9668dd301ec23313957a
                       c1e525421aa1531d57e9f081d32d354f37eafdb5
                       4220504cedd2fd646cda5e6d462cad54bb008681
                       1c6bc6e8f00792f33a0e581b810fd5c0d1c46ffa
                       bb6bd85597df725040b9709cabbcc2627eba3719
                       a1484b0cd95b575bb3f04d63a62837294c555fea
                       a60339a3de0467341bfed8141e11c57a18394caf
                       3bb99d80
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [57:9e:bb:06:6f:dc:f3:9e:dd:8e:97:a7:77:23:51:6f:2d:01:71:b7]
            modulus: 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
    public exponent: 10001

] 
2021-05-05 10:59:31.779  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 10:59:31.780 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 10:59:31.781 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-05 10:59:31.782 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 10:59:31.782  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-05 10:59:31.783  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 10:59:31.783  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 10:59:31.784  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 10:59:31.784  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 10:59:31.789  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 10:59:31.789  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 10:59:31.789  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 10:59:31.790  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 10:59:31.867  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 10:59:31.868  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 10:59:31.868 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 10:59:31.869 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 10:59:31.870  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1627
2021-05-05 10:59:31.870  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 10:59:31.871  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 10:59:31.872  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 10:59:31.872  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 10:59:31.872  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 10:59:31.873 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 10:59:31.873 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 10:59:31.873 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 10:59:31.874 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 10:59:31.875 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 10:59:31.875 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 10:59:31.875 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 10:59:31.878 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 346385566726625223712388886969089262072978522882
             IssuerDN: UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 09:27:56 UTC 2021
           Final Date: Mon May 05 09:27:56 UTC 2031
            SubjectDN: UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:03:99:53:69:76:f7:01:a3:ca:42:99:97:fd:44:a2:e7:83:68:5a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 836f723a38cce952fa4db687994f77cecfe0f5fe
                       61b5f1242714faaf0260beffc878b89b9cfe228b
                       835dba2c02ba4e49200954998f2ca3afb2e6dada
                       95f67fd2904e88511ece95905a00afe92c839f31
                       567bac73c2213c76b30594cf66553078220dd38b
                       4718c0932adff34d3e940f64d287e89ad5599dbf
                       c8347d1e60fb50c91a947372664e237a453e55b2
                       b47c0dcc237faddaf862b854e326657b8f0d1557
                       f07cc30a5347830fcd0c8ce6b135c214cc6b06fa
                       9bb7be68e4b28755f3116510330ba2c9b6b1b922
                       12fe8b6f9b42d170673ecd63412366b6592bfbe3
                       e408cf6edfeb211cda9e489e7c33b31178b2e939
                       e749855eee400ecb578a9668dd301ec23313957a
                       c1e525421aa1531d57e9f081d32d354f37eafdb5
                       4220504cedd2fd646cda5e6d462cad54bb008681
                       1c6bc6e8f00792f33a0e581b810fd5c0d1c46ffa
                       bb6bd85597df725040b9709cabbcc2627eba3719
                       a1484b0cd95b575bb3f04d63a62837294c555fea
                       a60339a3de0467341bfed8141e11c57a18394caf
                       3bb99d80
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d3:49:c9:0e:83:c0:f2:92:63:e8:7e:13:9e:fe:dd:5b:f7:7c:26:02]
            modulus: 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
    public exponent: 10001

] 
2021-05-05 11:00:43.287  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 11:00:43.288 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 11:00:43.291 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-05 11:00:43.292 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 11:00:43.292  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-05 11:00:43.293  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 11:00:43.293  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 11:00:43.293  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 11:00:43.293  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 11:00:43.361  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 11:00:43.362  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 11:00:43.363  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 11:00:43.364  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 11:00:43.466  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 11:00:43.467  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 11:00:43.467 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 11:00:43.469 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 11:00:43.469  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1627
2021-05-05 11:00:43.469  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 11:00:43.471  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 11:00:43.472  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 11:00:43.472  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 11:00:43.473  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 11:00:43.473 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 11:00:43.474 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 11:00:43.474 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 11:00:43.474 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 11:00:43.475 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 11:00:43.475 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 11:00:43.476 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 11:00:43.479 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 346385566726625223712388886969089262072978522882
             IssuerDN: UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 09:27:56 UTC 2021
           Final Date: Mon May 05 09:27:56 UTC 2031
            SubjectDN: UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:03:99:53:69:76:f7:01:a3:ca:42:99:97:fd:44:a2:e7:83:68:5a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 836f723a38cce952fa4db687994f77cecfe0f5fe
                       61b5f1242714faaf0260beffc878b89b9cfe228b
                       835dba2c02ba4e49200954998f2ca3afb2e6dada
                       95f67fd2904e88511ece95905a00afe92c839f31
                       567bac73c2213c76b30594cf66553078220dd38b
                       4718c0932adff34d3e940f64d287e89ad5599dbf
                       c8347d1e60fb50c91a947372664e237a453e55b2
                       b47c0dcc237faddaf862b854e326657b8f0d1557
                       f07cc30a5347830fcd0c8ce6b135c214cc6b06fa
                       9bb7be68e4b28755f3116510330ba2c9b6b1b922
                       12fe8b6f9b42d170673ecd63412366b6592bfbe3
                       e408cf6edfeb211cda9e489e7c33b31178b2e939
                       e749855eee400ecb578a9668dd301ec23313957a
                       c1e525421aa1531d57e9f081d32d354f37eafdb5
                       4220504cedd2fd646cda5e6d462cad54bb008681
                       1c6bc6e8f00792f33a0e581b810fd5c0d1c46ffa
                       bb6bd85597df725040b9709cabbcc2627eba3719
                       a1484b0cd95b575bb3f04d63a62837294c555fea
                       a60339a3de0467341bfed8141e11c57a18394caf
                       3bb99d80
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b0:fa:69:97:13:30:b5:8f:a3:47:e3:cb:94:3c:44:28:85:ef:79:b5]
            modulus: 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
    public exponent: 10001

] 
2021-05-05 11:01:42.861  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 11:01:42.862 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 11:01:42.863 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-05 11:01:42.863 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 11:01:42.864  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-05 11:01:42.865  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 11:01:42.865  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 11:01:42.865  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 11:01:42.866  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 11:01:42.870  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 11:01:42.870  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 11:01:42.871  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 11:01:42.872  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 11:01:42.972  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 11:01:42.973  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 11:01:42.973 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 11:01:42.974 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 11:01:42.975  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1627
2021-05-05 11:01:42.975  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 11:01:42.977  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 11:01:42.977  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 11:01:42.977  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 11:01:42.977  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 11:01:42.978 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 11:01:42.978 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 11:01:42.978 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 11:01:42.979 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 11:01:42.979 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 11:01:42.979 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 11:01:42.980 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 11:01:42.982 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 346385566726625223712388886969089262072978522882
             IssuerDN: UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 09:27:56 UTC 2021
           Final Date: Mon May 05 09:27:56 UTC 2031
            SubjectDN: UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:03:99:53:69:76:f7:01:a3:ca:42:99:97:fd:44:a2:e7:83:68:5a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 836f723a38cce952fa4db687994f77cecfe0f5fe
                       61b5f1242714faaf0260beffc878b89b9cfe228b
                       835dba2c02ba4e49200954998f2ca3afb2e6dada
                       95f67fd2904e88511ece95905a00afe92c839f31
                       567bac73c2213c76b30594cf66553078220dd38b
                       4718c0932adff34d3e940f64d287e89ad5599dbf
                       c8347d1e60fb50c91a947372664e237a453e55b2
                       b47c0dcc237faddaf862b854e326657b8f0d1557
                       f07cc30a5347830fcd0c8ce6b135c214cc6b06fa
                       9bb7be68e4b28755f3116510330ba2c9b6b1b922
                       12fe8b6f9b42d170673ecd63412366b6592bfbe3
                       e408cf6edfeb211cda9e489e7c33b31178b2e939
                       e749855eee400ecb578a9668dd301ec23313957a
                       c1e525421aa1531d57e9f081d32d354f37eafdb5
                       4220504cedd2fd646cda5e6d462cad54bb008681
                       1c6bc6e8f00792f33a0e581b810fd5c0d1c46ffa
                       bb6bd85597df725040b9709cabbcc2627eba3719
                       a1484b0cd95b575bb3f04d63a62837294c555fea
                       a60339a3de0467341bfed8141e11c57a18394caf
                       3bb99d80
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f2:80:20:08:cc:60:16:c9:85:ec:6d:ff:d9:aa:69:e3:88:03:fc:f1]
            modulus: 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
    public exponent: 10001

] 
2021-05-05 11:04:33.580  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 11:04:33.581 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 11:04:33.583 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-05 11:04:33.583 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 11:04:33.584  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-05 11:04:33.584  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 11:04:33.585  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 11:04:33.585  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 11:04:33.585  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 11:04:33.589  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 11:04:33.589  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 11:04:33.590  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 11:04:33.591  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 11:04:33.666  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 11:04:33.667  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 11:04:33.667 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 11:04:33.668 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 11:04:33.669  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1627
2021-05-05 11:04:33.669  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 11:04:33.670  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 11:04:33.671  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 11:04:33.671  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 11:04:33.671  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 11:04:33.672 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 11:04:33.672 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 11:04:33.672 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 11:04:33.673 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 11:04:33.673 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 11:04:33.673 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 11:04:33.674 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 11:04:33.676 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 346385566726625223712388886969089262072978522882
             IssuerDN: UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 09:27:56 UTC 2021
           Final Date: Mon May 05 09:27:56 UTC 2031
            SubjectDN: UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:03:99:53:69:76:f7:01:a3:ca:42:99:97:fd:44:a2:e7:83:68:5a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 836f723a38cce952fa4db687994f77cecfe0f5fe
                       61b5f1242714faaf0260beffc878b89b9cfe228b
                       835dba2c02ba4e49200954998f2ca3afb2e6dada
                       95f67fd2904e88511ece95905a00afe92c839f31
                       567bac73c2213c76b30594cf66553078220dd38b
                       4718c0932adff34d3e940f64d287e89ad5599dbf
                       c8347d1e60fb50c91a947372664e237a453e55b2
                       b47c0dcc237faddaf862b854e326657b8f0d1557
                       f07cc30a5347830fcd0c8ce6b135c214cc6b06fa
                       9bb7be68e4b28755f3116510330ba2c9b6b1b922
                       12fe8b6f9b42d170673ecd63412366b6592bfbe3
                       e408cf6edfeb211cda9e489e7c33b31178b2e939
                       e749855eee400ecb578a9668dd301ec23313957a
                       c1e525421aa1531d57e9f081d32d354f37eafdb5
                       4220504cedd2fd646cda5e6d462cad54bb008681
                       1c6bc6e8f00792f33a0e581b810fd5c0d1c46ffa
                       bb6bd85597df725040b9709cabbcc2627eba3719
                       a1484b0cd95b575bb3f04d63a62837294c555fea
                       a60339a3de0467341bfed8141e11c57a18394caf
                       3bb99d80
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a9:36:9c:a8:fc:30:34:87:2c:cd:95:8b:13:da:38:33:87:8b:b5:98]
            modulus: 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
    public exponent: 10001

] 
2021-05-05 11:07:30.173  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 11:07:30.174 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 11:07:30.175 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-05 11:07:30.176 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 11:07:30.176  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-05 11:07:30.177  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 11:07:30.177  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 11:07:30.178  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 11:07:30.178  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 11:07:30.182  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 11:07:30.183  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 11:07:30.183  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 11:07:30.185  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 11:07:30.260  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 11:07:30.261  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 11:07:30.261 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 11:07:30.262 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 11:07:30.263  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1627
2021-05-05 11:07:30.263  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 11:07:30.264  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 11:07:30.265  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 11:07:30.265  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 11:07:30.265  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 11:07:30.266 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 11:07:30.266 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 11:07:30.266 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 11:07:30.267 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 11:07:30.267 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 11:07:30.267 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 11:07:30.268 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 11:07:30.271 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 346385566726625223712388886969089262072978522882
             IssuerDN: UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 09:27:56 UTC 2021
           Final Date: Mon May 05 09:27:56 UTC 2031
            SubjectDN: UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:03:99:53:69:76:f7:01:a3:ca:42:99:97:fd:44:a2:e7:83:68:5a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 836f723a38cce952fa4db687994f77cecfe0f5fe
                       61b5f1242714faaf0260beffc878b89b9cfe228b
                       835dba2c02ba4e49200954998f2ca3afb2e6dada
                       95f67fd2904e88511ece95905a00afe92c839f31
                       567bac73c2213c76b30594cf66553078220dd38b
                       4718c0932adff34d3e940f64d287e89ad5599dbf
                       c8347d1e60fb50c91a947372664e237a453e55b2
                       b47c0dcc237faddaf862b854e326657b8f0d1557
                       f07cc30a5347830fcd0c8ce6b135c214cc6b06fa
                       9bb7be68e4b28755f3116510330ba2c9b6b1b922
                       12fe8b6f9b42d170673ecd63412366b6592bfbe3
                       e408cf6edfeb211cda9e489e7c33b31178b2e939
                       e749855eee400ecb578a9668dd301ec23313957a
                       c1e525421aa1531d57e9f081d32d354f37eafdb5
                       4220504cedd2fd646cda5e6d462cad54bb008681
                       1c6bc6e8f00792f33a0e581b810fd5c0d1c46ffa
                       bb6bd85597df725040b9709cabbcc2627eba3719
                       a1484b0cd95b575bb3f04d63a62837294c555fea
                       a60339a3de0467341bfed8141e11c57a18394caf
                       3bb99d80
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ac:0e:79:ec:73:50:ed:6c:99:4f:7a:8f:44:1f:3d:a5:34:90:5b:34]
            modulus: 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
    public exponent: 10001

] 
2021-05-05 11:09:41.625  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 11:09:41.626 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 11:09:41.628 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-05 11:09:41.629 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 11:09:41.629  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-05 11:09:41.630  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 11:09:41.630  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 11:09:41.630  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 11:09:41.631  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 11:09:41.638  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 11:09:41.639  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 11:09:41.639  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 11:09:41.641  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 11:09:41.745  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 11:09:41.745  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 11:09:41.745 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 11:09:41.746 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 11:09:41.747  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1627
2021-05-05 11:09:41.747  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 11:09:41.748  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 11:09:41.748  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 11:09:41.749  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 11:09:41.749  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 11:09:41.749 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 11:09:41.749 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 11:09:41.749 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 11:09:41.750 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 11:09:41.750 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 11:09:41.750 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 11:09:41.751 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 11:09:41.753 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 346385566726625223712388886969089262072978522882
             IssuerDN: UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 09:27:56 UTC 2021
           Final Date: Mon May 05 09:27:56 UTC 2031
            SubjectDN: UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:03:99:53:69:76:f7:01:a3:ca:42:99:97:fd:44:a2:e7:83:68:5a]
            modulus: a1e000e5633f23a06b54e705b13f6330c2930e43c6d518f1d52dd0995c4b562c52b6e97cb66f5a4d0cc7c6fcfa517e55b1daf42b87d368cdd6689a633730535126a2871bca9350c82e16f410cce02bc0cb33d09abd08528b6a57c1ecdc7a903e806b565c4bae1f682bd87e23829368a3d3de8794d0bae3c2caf0c2bc59a03f4aec5c038aa1944390a1724cacb0ae3e185725e04451df785974e053ac441d2b64143a2ed835a965462c8dc7f00419e166e0373d923a89f9243a0754f60cdd937110b4dc30745a3d8210126a75885ec3ed0ae66e3abcc00454ee393bae5f270433f26cb451396a44d6d23917ad0dc75b2a375138174ea0e4106ef0862497b36f79950335e30fdcb975c61f332430b0bcbc441324a08172de152427831219911e9a1d3526e74d4ca5abe4f415b0a931e51ce68c4f40fa594aab01ea2ed6f251849b43496a36c871ac83817fffeda0a2ab9bf35c2a5adc84e64f97e27fcac6a1fb960ffdb724f7734a0661b855100c3ada7a6ae9379d35d06667e0b855e0ee570845
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 836f723a38cce952fa4db687994f77cecfe0f5fe
                       61b5f1242714faaf0260beffc878b89b9cfe228b
                       835dba2c02ba4e49200954998f2ca3afb2e6dada
                       95f67fd2904e88511ece95905a00afe92c839f31
                       567bac73c2213c76b30594cf66553078220dd38b
                       4718c0932adff34d3e940f64d287e89ad5599dbf
                       c8347d1e60fb50c91a947372664e237a453e55b2
                       b47c0dcc237faddaf862b854e326657b8f0d1557
                       f07cc30a5347830fcd0c8ce6b135c214cc6b06fa
                       9bb7be68e4b28755f3116510330ba2c9b6b1b922
                       12fe8b6f9b42d170673ecd63412366b6592bfbe3
                       e408cf6edfeb211cda9e489e7c33b31178b2e939
                       e749855eee400ecb578a9668dd301ec23313957a
                       c1e525421aa1531d57e9f081d32d354f37eafdb5
                       4220504cedd2fd646cda5e6d462cad54bb008681
                       1c6bc6e8f00792f33a0e581b810fd5c0d1c46ffa
                       bb6bd85597df725040b9709cabbcc2627eba3719
                       a1484b0cd95b575bb3f04d63a62837294c555fea
                       a60339a3de0467341bfed8141e11c57a18394caf
                       3bb99d80
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fb:c4:08:a2:d7:a3:73:bb:00:f5:67:b3:18:e0:e4:1e:24:e4:aa:23]
            modulus: 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
    public exponent: 10001

] 
2021-05-05 11:11:13.948  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-05 11:11:13.949 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-05 11:11:13.950 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-05 11:11:13.950 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-05 11:11:13.951  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-05 11:11:13.951  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-05 11:11:13.952  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-05 11:11:13.952  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-05 11:11:13.952  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-05 11:11:13.956  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-05 11:11:13.957  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 11:11:13.957  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-05 11:11:13.958  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-05 11:11:14.059  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-05 11:11:14.059  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-05 11:11:14.059 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-05 11:11:14.061 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-05 11:11:14.061  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1627
2021-05-05 11:11:14.061  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-05 11:11:14.063  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-05 11:11:14.064  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-05 11:11:14.064  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-05 11:11:14.064  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-05 11:11:14.065 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 11:11:14.065 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 11:11:14.065 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 11:11:14.066 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-05 11:11:14.067 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-05 11:11:14.067 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-05 11:11:14.068 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-05 11:11:14.071 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 346385566726625223712388886969089262072978522882
             IssuerDN: UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 05 09:27:56 UTC 2021
           Final Date: Mon May 05 09:27:56 UTC 2031
            SubjectDN: UID=c-0dcda7df2b0578d20,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:03:99:53:69:76:f7:01:a3:ca:42:99:97:fd:44:a2:e7:83:68:5a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 836f723a38cce952fa4db687994f77cecfe0f5fe
                       61b5f1242714faaf0260beffc878b89b9cfe228b
                       835dba2c02ba4e49200954998f2ca3afb2e6dada
                       95f67fd2904e88511ece95905a00afe92c839f31
                       567bac73c2213c76b30594cf66553078220dd38b
                       4718c0932adff34d3e940f64d287e89ad5599dbf
                       c8347d1e60fb50c91a947372664e237a453e55b2
                       b47c0dcc237faddaf862b854e326657b8f0d1557
                       f07cc30a5347830fcd0c8ce6b135c214cc6b06fa
                       9bb7be68e4b28755f3116510330ba2c9b6b1b922
                       12fe8b6f9b42d170673ecd63412366b6592bfbe3
                       e408cf6edfeb211cda9e489e7c33b31178b2e939
                       e749855eee400ecb578a9668dd301ec23313957a
                       c1e525421aa1531d57e9f081d32d354f37eafdb5
                       4220504cedd2fd646cda5e6d462cad54bb008681
                       1c6bc6e8f00792f33a0e581b810fd5c0d1c46ffa
                       bb6bd85597df725040b9709cabbcc2627eba3719
                       a1484b0cd95b575bb3f04d63a62837294c555fea
                       a60339a3de0467341bfed8141e11c57a18394caf
                       3bb99d80
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0e:54:c7:70:56:af:d0:81:1b:b2:9d:4e:ad:1d:bc:bf:e1:16:54:ce]
            modulus: 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
    public exponent: 10001

]