Results

By type

          2022-03-05 03:06:42,257 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-03-05 03:06:43,186 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-03-05 03:06:43.948  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Mar 05, 2022 3:06:45 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Mar 05, 2022 3:06:45 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Mar 05, 2022 3:06:45 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Mar 05, 2022 3:06:45 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-03-05 03:06:46.517 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-03-05 03:06:46.804  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-03-05 03:06:46.971  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-03-05 03:06:47.636 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-03-05 03:06:47.639 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-03-05 03:06:47.640 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-03-05 03:06:47.644 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-03-05 03:06:47.684 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-03-05 03:06:47.688 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-03-05 03:06:47.809 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-03-05 03:06:48.394 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Mar 05, 2022 3:06:49 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-03-05 03:06:49.316  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.821 seconds (JVM running for 9.641)
Mar 05, 2022 3:07:13 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-03-05 03:08:14.298  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-05 03:08:14.314 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-05 03:08:14.353 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-03-05 03:08:14.356 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-05 03:08:14.378  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-03-05 03:08:14.380  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-05 03:08:14.381  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-05 03:08:14.383 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-05 03:08:14.384 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 03:08:14.388 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-05 03:08:14.394 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-05 03:08:14.397 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-05 03:08:14.434 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-05 03:08:14.439 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 03:08:14.439 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 03:08:14.443 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 03:08:15.086  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-05 03:08:15.089  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-05 03:08:15.089 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-05 03:08:15.091 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 03:08:15.102  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-05 03:08:15.103  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-05 03:08:15.104 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 03:08:15.104 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 03:08:15.105 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 03:08:15.117 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 03:08:15.117 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 03:08:15.118 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 03:08:15.124 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 03:08:15.125 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 03:08:15.125 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 03:08:15.127 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-05 03:08:15.161 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 512333789329218184960632672972290616628503204865
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Mar 05 03:04:39 UTC 2022
           Final Date: Thu Mar 04 03:04:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [04:e0:f3:94:04:2b:29:4f:07:5c:14:01:27:c1:4e:2d:2b:3e:86:47]
            modulus: bdcab64e09697d74aa8703bc7ff3bb3918722932c6a29b01660599107c2fea20737f753e82a41d25caae35f49c98cb9c973cebccffb885caddb9b6c8b229d697c3085b8ecd231342a73ae620420137da0526c9f540934e2789d902f4ed139fd58e368e9923093037e0d35553f0c1ccb6b82e21afbbfcd5fcd27443d3ef23b5c390c4a7116ab564901f2d7ed57b90389a18711e83ab00e2455bed4d9987ec3db274ef4b6932cec7010bcb46fd0458a0a3e6464945f157089cd1ba80b60f5d77c12ac40e88de1a417d17ed780e6c757cf6964df6d3017e3a9bb4ad2fd319b9af32934e482004c56e27d3a81d164d6a39f5819d3185a87e2399921bba24a29fa767224c05beb16c30ba44c705bc5dd1226213522c099f02d0a408e8c6c053fb14485c3b99ea7ecb672223c1dcdfe63115254289fbd8083ecb985f16f4250a1d690d687475b0268bed2f906aa28c1e7ae6894aaae1b69e5653bd9db9622007f3671e6baae15621426e74a7f4db668ded1a40d07549c5e6202212caad620612e5dc17
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3843ab91a2d5316d87ab47ef57e976e2b72159aa
                       68ac4efdacfd58dd5a2da25401fb6679f1b12830
                       61f45127c9a395a0bb4aaca3db8c543ede0b3616
                       be9c64e885f4fabd018406ff1095b3483c1fbbb9
                       ab0fca7f88e21f2f507e58ce6e60c650159f8314
                       297838b171a004d7378ee347fe02182b8fb85d20
                       44ca2ada90a0f9912ef9817ee74c8899b8e400d4
                       ee85dd0ceb16b86809eb3752e674bdcd619fe40e
                       f4e351260d48f8b021184ead35e9df5e28e5c108
                       136c5076ae7ecbde1782e4dd98c3290763fd22d2
                       615009696357bb48f4d3ee5b4b36385a8d93bcc0
                       d6516da05cdc6321ba77df50fd0cf46be86eef6a
                       61448254fd94cb398a3eae2f570c5e708c2d479d
                       3a0762d491d74388a20e8b42838454d6b7074329
                       9b4fb7003fded8e355ca2c86a97adfe132453424
                       c892bfe56349cab18cd17fab6860c6f5adbcd600
                       900f2b8dd51d4f9d41b70a7e1dfd6084241cff7e
                       630814e62fc65fae42e1184b0f82d0f3978a0b3f
                       2a04bf540ed34897ae372492c4fed19084c5527d
                       b4d23f54
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5b:fd:86:b2:d0:86:a0:82:6c:fc:ae:fe:b6:37:e8:db:1a:83:42:98]
            modulus: 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
    public exponent: 10001

] 
2022-03-05 04:13:53.477  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-05 04:13:53.481 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-05 04:13:53.484 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-05 04:13:53.485 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-05 04:13:53.486  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-05 04:13:53.487  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-05 04:13:53.487  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-05 04:13:53.488 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-05 04:13:53.488 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-05 04:13:53.489 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-05 04:13:53.496 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-05 04:13:53.497 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:13:53.497 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:13:53.498 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:13:53.734  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-05 04:13:53.735  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-05 04:13:53.736 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-05 04:13:53.736 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:13:53.741  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-05 04:13:53.741  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-05 04:13:53.742 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:13:53.742 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:13:53.743 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:13:53.744 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:13:53.745 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:13:53.745 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:13:53.746 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:13:53.746 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:13:53.747 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:13:53.748 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-05 04:13:53.756 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 512333789329218184960632672972290616628503204865
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Mar 05 03:04:39 UTC 2022
           Final Date: Thu Mar 04 03:04:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [04:e0:f3:94:04:2b:29:4f:07:5c:14:01:27:c1:4e:2d:2b:3e:86:47]
            modulus: bdcab64e09697d74aa8703bc7ff3bb3918722932c6a29b01660599107c2fea20737f753e82a41d25caae35f49c98cb9c973cebccffb885caddb9b6c8b229d697c3085b8ecd231342a73ae620420137da0526c9f540934e2789d902f4ed139fd58e368e9923093037e0d35553f0c1ccb6b82e21afbbfcd5fcd27443d3ef23b5c390c4a7116ab564901f2d7ed57b90389a18711e83ab00e2455bed4d9987ec3db274ef4b6932cec7010bcb46fd0458a0a3e6464945f157089cd1ba80b60f5d77c12ac40e88de1a417d17ed780e6c757cf6964df6d3017e3a9bb4ad2fd319b9af32934e482004c56e27d3a81d164d6a39f5819d3185a87e2399921bba24a29fa767224c05beb16c30ba44c705bc5dd1226213522c099f02d0a408e8c6c053fb14485c3b99ea7ecb672223c1dcdfe63115254289fbd8083ecb985f16f4250a1d690d687475b0268bed2f906aa28c1e7ae6894aaae1b69e5653bd9db9622007f3671e6baae15621426e74a7f4db668ded1a40d07549c5e6202212caad620612e5dc17
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3843ab91a2d5316d87ab47ef57e976e2b72159aa
                       68ac4efdacfd58dd5a2da25401fb6679f1b12830
                       61f45127c9a395a0bb4aaca3db8c543ede0b3616
                       be9c64e885f4fabd018406ff1095b3483c1fbbb9
                       ab0fca7f88e21f2f507e58ce6e60c650159f8314
                       297838b171a004d7378ee347fe02182b8fb85d20
                       44ca2ada90a0f9912ef9817ee74c8899b8e400d4
                       ee85dd0ceb16b86809eb3752e674bdcd619fe40e
                       f4e351260d48f8b021184ead35e9df5e28e5c108
                       136c5076ae7ecbde1782e4dd98c3290763fd22d2
                       615009696357bb48f4d3ee5b4b36385a8d93bcc0
                       d6516da05cdc6321ba77df50fd0cf46be86eef6a
                       61448254fd94cb398a3eae2f570c5e708c2d479d
                       3a0762d491d74388a20e8b42838454d6b7074329
                       9b4fb7003fded8e355ca2c86a97adfe132453424
                       c892bfe56349cab18cd17fab6860c6f5adbcd600
                       900f2b8dd51d4f9d41b70a7e1dfd6084241cff7e
                       630814e62fc65fae42e1184b0f82d0f3978a0b3f
                       2a04bf540ed34897ae372492c4fed19084c5527d
                       b4d23f54
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a2:7e:32:c1:50:94:43:e4:c0:f6:52:81:a7:10:05:89:32:19:77:74]
            modulus: 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
    public exponent: 10001

] 
2022-03-05 04:15:02.475  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-05 04:15:02.477 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-05 04:15:02.478 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-05 04:15:02.479 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-05 04:15:02.480  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-05 04:15:02.480  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-05 04:15:02.481  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-05 04:15:02.481 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-05 04:15:02.482 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-05 04:15:02.482 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-05 04:15:02.495 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-05 04:15:02.495 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:15:02.496 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:15:02.496 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:15:02.628  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-05 04:15:02.629  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-05 04:15:02.629 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-05 04:15:02.630 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:15:02.632  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-05 04:15:02.633  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-05 04:15:02.634 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:15:02.634 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:15:02.634 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:15:02.636 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:15:02.636 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:15:02.636 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:15:02.637 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:15:02.638 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:15:02.638 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:15:02.639 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-05 04:15:02.642 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 512333789329218184960632672972290616628503204865
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Mar 05 03:04:39 UTC 2022
           Final Date: Thu Mar 04 03:04:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [04:e0:f3:94:04:2b:29:4f:07:5c:14:01:27:c1:4e:2d:2b:3e:86:47]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3843ab91a2d5316d87ab47ef57e976e2b72159aa
                       68ac4efdacfd58dd5a2da25401fb6679f1b12830
                       61f45127c9a395a0bb4aaca3db8c543ede0b3616
                       be9c64e885f4fabd018406ff1095b3483c1fbbb9
                       ab0fca7f88e21f2f507e58ce6e60c650159f8314
                       297838b171a004d7378ee347fe02182b8fb85d20
                       44ca2ada90a0f9912ef9817ee74c8899b8e400d4
                       ee85dd0ceb16b86809eb3752e674bdcd619fe40e
                       f4e351260d48f8b021184ead35e9df5e28e5c108
                       136c5076ae7ecbde1782e4dd98c3290763fd22d2
                       615009696357bb48f4d3ee5b4b36385a8d93bcc0
                       d6516da05cdc6321ba77df50fd0cf46be86eef6a
                       61448254fd94cb398a3eae2f570c5e708c2d479d
                       3a0762d491d74388a20e8b42838454d6b7074329
                       9b4fb7003fded8e355ca2c86a97adfe132453424
                       c892bfe56349cab18cd17fab6860c6f5adbcd600
                       900f2b8dd51d4f9d41b70a7e1dfd6084241cff7e
                       630814e62fc65fae42e1184b0f82d0f3978a0b3f
                       2a04bf540ed34897ae372492c4fed19084c5527d
                       b4d23f54
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [79:80:75:84:14:a1:6a:30:18:98:90:a8:6a:da:d3:95:b5:03:2b:39]
            modulus: bc37e42fbdd2737bcc7009dd7b6f71d74831173df3f391e1ac2dbedcf5f887d75bfc9a25f327c23cecc838c27672af4c1518cdb3df05b86893a447894bd3e9706534e518a3ef3edd943606e50e1e00583d9387fff69173e807087c90363fa04b679d5b118c2cceac7e08fcd83463de4246e3ccc5e8607b788897be756bc942af82b79f4c1f23a6258cf25dbc92b86e612be432681dfccfb60085ba00f2f8e24fdeeb191b48dd4ae36e0346f36377061d56b0f8f04c83341ecbfcf9a26fe62d0f0fd48f5d957e693829aee0857dbc2198d6d019d544c5fff570f3896675b8c5894c24f10a4e1bdf1aada59b42844d452d765efbe35aead3dd27dc264bcec8877d
    public exponent: 10001

] 
2022-03-05 04:16:14.645  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-05 04:16:14.646 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-05 04:16:14.648 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-05 04:16:14.649 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-05 04:16:14.650  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-05 04:16:14.651  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-05 04:16:14.651  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-05 04:16:14.652 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-05 04:16:14.653 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-05 04:16:14.653 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-05 04:16:14.661 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-05 04:16:14.662 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:16:14.662 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:16:14.663 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:16:14.808  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-05 04:16:14.808  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-05 04:16:14.809 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-05 04:16:14.809 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:16:14.811  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-05 04:16:14.812  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-05 04:16:14.812 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:16:14.812 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:16:14.813 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:16:14.813 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:16:14.814 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:16:14.814 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:16:14.815 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:16:14.815 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:16:14.815 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:16:14.816 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-05 04:16:14.822 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 512333789329218184960632672972290616628503204865
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Mar 05 03:04:39 UTC 2022
           Final Date: Thu Mar 04 03:04:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [04:e0:f3:94:04:2b:29:4f:07:5c:14:01:27:c1:4e:2d:2b:3e:86:47]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3843ab91a2d5316d87ab47ef57e976e2b72159aa
                       68ac4efdacfd58dd5a2da25401fb6679f1b12830
                       61f45127c9a395a0bb4aaca3db8c543ede0b3616
                       be9c64e885f4fabd018406ff1095b3483c1fbbb9
                       ab0fca7f88e21f2f507e58ce6e60c650159f8314
                       297838b171a004d7378ee347fe02182b8fb85d20
                       44ca2ada90a0f9912ef9817ee74c8899b8e400d4
                       ee85dd0ceb16b86809eb3752e674bdcd619fe40e
                       f4e351260d48f8b021184ead35e9df5e28e5c108
                       136c5076ae7ecbde1782e4dd98c3290763fd22d2
                       615009696357bb48f4d3ee5b4b36385a8d93bcc0
                       d6516da05cdc6321ba77df50fd0cf46be86eef6a
                       61448254fd94cb398a3eae2f570c5e708c2d479d
                       3a0762d491d74388a20e8b42838454d6b7074329
                       9b4fb7003fded8e355ca2c86a97adfe132453424
                       c892bfe56349cab18cd17fab6860c6f5adbcd600
                       900f2b8dd51d4f9d41b70a7e1dfd6084241cff7e
                       630814e62fc65fae42e1184b0f82d0f3978a0b3f
                       2a04bf540ed34897ae372492c4fed19084c5527d
                       b4d23f54
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [59:6e:76:69:22:41:76:d9:c1:64:45:3d:19:6e:a0:c5:06:fc:89:17]
            modulus: e90b6a48ce9ccd8d853fac2b66b0c46e37dac651c0b97407e303ce94f286eb09ebd95d15557e5dc146cc0d3eb2e65edf5f5b16a67f42ce5a342c8ac8883b32740f7855ea72aa9bd89002fcfa12c59495c8abb97c76e43dd7a8fd436a7af17ca6a1bd6a763cf9a766fe68c464a99358810daeec41130cd9a6facb10d0bd130dfe2801744d3fda4f4c74b1ee671b4a463f6f36d1e2521504789da03511503aa61eefb847f0949059b40fa312e7e95d9eae59f36cd9b8acbbd7d8501b4d429d66570259929d3817f1cd69bc5d9da06486102312bfc6f095a0f4acafae36e2440cbd607c221e19104e39c1895f97aa673378c9b8e3271076d03eba1ab7d1bb9e614f
    public exponent: 10001

] 
2022-03-05 04:18:07.888  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-05 04:18:07.890 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-05 04:18:07.892 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-03-05 04:18:07.893 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-05 04:18:07.894  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-03-05 04:18:07.895  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-05 04:18:07.896  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-05 04:18:07.896 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-05 04:18:07.896 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-05 04:18:07.897 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-05 04:18:07.902 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-05 04:18:07.902 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:18:07.903 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:18:07.903 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:18:08.076  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-05 04:18:08.077  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-05 04:18:08.078 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-05 04:18:08.078 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:18:08.085  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-05 04:18:08.087  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-05 04:18:08.088 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:18:08.089 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:18:08.089 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:18:08.090 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:18:08.091 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:18:08.091 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:18:08.096 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:18:08.097 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:18:08.097 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:18:08.098 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-05 04:18:08.101 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 512333789329218184960632672972290616628503204865
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Mar 05 03:04:39 UTC 2022
           Final Date: Thu Mar 04 03:04:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [04:e0:f3:94:04:2b:29:4f:07:5c:14:01:27:c1:4e:2d:2b:3e:86:47]
            modulus: bdcab64e09697d74aa8703bc7ff3bb3918722932c6a29b01660599107c2fea20737f753e82a41d25caae35f49c98cb9c973cebccffb885caddb9b6c8b229d697c3085b8ecd231342a73ae620420137da0526c9f540934e2789d902f4ed139fd58e368e9923093037e0d35553f0c1ccb6b82e21afbbfcd5fcd27443d3ef23b5c390c4a7116ab564901f2d7ed57b90389a18711e83ab00e2455bed4d9987ec3db274ef4b6932cec7010bcb46fd0458a0a3e6464945f157089cd1ba80b60f5d77c12ac40e88de1a417d17ed780e6c757cf6964df6d3017e3a9bb4ad2fd319b9af32934e482004c56e27d3a81d164d6a39f5819d3185a87e2399921bba24a29fa767224c05beb16c30ba44c705bc5dd1226213522c099f02d0a408e8c6c053fb14485c3b99ea7ecb672223c1dcdfe63115254289fbd8083ecb985f16f4250a1d690d687475b0268bed2f906aa28c1e7ae6894aaae1b69e5653bd9db9622007f3671e6baae15621426e74a7f4db668ded1a40d07549c5e6202212caad620612e5dc17
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3843ab91a2d5316d87ab47ef57e976e2b72159aa
                       68ac4efdacfd58dd5a2da25401fb6679f1b12830
                       61f45127c9a395a0bb4aaca3db8c543ede0b3616
                       be9c64e885f4fabd018406ff1095b3483c1fbbb9
                       ab0fca7f88e21f2f507e58ce6e60c650159f8314
                       297838b171a004d7378ee347fe02182b8fb85d20
                       44ca2ada90a0f9912ef9817ee74c8899b8e400d4
                       ee85dd0ceb16b86809eb3752e674bdcd619fe40e
                       f4e351260d48f8b021184ead35e9df5e28e5c108
                       136c5076ae7ecbde1782e4dd98c3290763fd22d2
                       615009696357bb48f4d3ee5b4b36385a8d93bcc0
                       d6516da05cdc6321ba77df50fd0cf46be86eef6a
                       61448254fd94cb398a3eae2f570c5e708c2d479d
                       3a0762d491d74388a20e8b42838454d6b7074329
                       9b4fb7003fded8e355ca2c86a97adfe132453424
                       c892bfe56349cab18cd17fab6860c6f5adbcd600
                       900f2b8dd51d4f9d41b70a7e1dfd6084241cff7e
                       630814e62fc65fae42e1184b0f82d0f3978a0b3f
                       2a04bf540ed34897ae372492c4fed19084c5527d
                       b4d23f54
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ee:b7:ed:b2:4d:2d:69:4c:2e:41:a2:cd:39:ed:2f:33:4c:5a:49:ab]
            modulus: c1b8f272b4270d287ccab4800a2f7a6be961fee9175c018fdb9331ceabaa0485bc04e78cb74e328d7ff014808e4139c96379676a3761c4c1889e81eee3c3d60acda3d8c7c4c44b72544d7fa5a67ed37477431d06fe5ea9b413bb4c9714a61323ded620eff30064e19785e28116be95d10bb3289c06fca5d0026f44958b55c79cbc006064f6debb984040ad0517e0ab9bc1eab713fbb2d1e7c41a2468554fc49a520960dd2145778fedf56aabec657a3d35998824565fa6769c6ed16e93670ce49b05ace3d9748697a856631747c787a957f0ba97e180efbae8eddc36745b6ed1eddfdd649fc8005969ae5d297be07bd0dc458231b48d5aa6364056ef8c5bf7d5
    public exponent: 10001

] 
2022-03-05 04:18:25.928  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-05 04:18:25.929 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-05 04:18:25.931 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-05 04:18:25.932 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-05 04:18:25.932  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-05 04:18:25.933  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-05 04:18:25.933  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-05 04:18:25.934 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-05 04:18:25.934 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-05 04:18:25.934 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-05 04:18:25.939 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-05 04:18:25.940 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:18:25.940 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:18:25.941 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:18:26.054  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-05 04:18:26.055  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-05 04:18:26.055 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-05 04:18:26.056 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:18:26.057  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-05 04:18:26.057  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-05 04:18:26.058 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:18:26.058 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:18:26.059 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:18:26.059 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:18:26.060 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:18:26.060 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:18:26.061 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:18:26.061 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:18:26.061 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:18:26.062 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-05 04:18:26.066 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 512333789329218184960632672972290616628503204865
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Mar 05 03:04:39 UTC 2022
           Final Date: Thu Mar 04 03:04:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [04:e0:f3:94:04:2b:29:4f:07:5c:14:01:27:c1:4e:2d:2b:3e:86:47]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3843ab91a2d5316d87ab47ef57e976e2b72159aa
                       68ac4efdacfd58dd5a2da25401fb6679f1b12830
                       61f45127c9a395a0bb4aaca3db8c543ede0b3616
                       be9c64e885f4fabd018406ff1095b3483c1fbbb9
                       ab0fca7f88e21f2f507e58ce6e60c650159f8314
                       297838b171a004d7378ee347fe02182b8fb85d20
                       44ca2ada90a0f9912ef9817ee74c8899b8e400d4
                       ee85dd0ceb16b86809eb3752e674bdcd619fe40e
                       f4e351260d48f8b021184ead35e9df5e28e5c108
                       136c5076ae7ecbde1782e4dd98c3290763fd22d2
                       615009696357bb48f4d3ee5b4b36385a8d93bcc0
                       d6516da05cdc6321ba77df50fd0cf46be86eef6a
                       61448254fd94cb398a3eae2f570c5e708c2d479d
                       3a0762d491d74388a20e8b42838454d6b7074329
                       9b4fb7003fded8e355ca2c86a97adfe132453424
                       c892bfe56349cab18cd17fab6860c6f5adbcd600
                       900f2b8dd51d4f9d41b70a7e1dfd6084241cff7e
                       630814e62fc65fae42e1184b0f82d0f3978a0b3f
                       2a04bf540ed34897ae372492c4fed19084c5527d
                       b4d23f54
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6f:da:af:18:75:4d:52:27:9d:b6:72:2d:5b:c4:db:88:0d:5f:a9:23]
            modulus: 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
    public exponent: 10001

] 
2022-03-05 04:19:00.123  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-05 04:19:00.124 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-05 04:19:00.128 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-05 04:19:00.129 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-05 04:19:00.129  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-05 04:19:00.130  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-05 04:19:00.130  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-05 04:19:00.130 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-05 04:19:00.130 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-05 04:19:00.131 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-05 04:19:00.135 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-05 04:19:00.136 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:19:00.136 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:19:00.136 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:19:00.314  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-05 04:19:00.315  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-05 04:19:00.315 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-05 04:19:00.316 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:19:00.317  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-05 04:19:00.320  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-05 04:19:00.321 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:19:00.321 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:19:00.321 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:19:00.322 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:19:00.322 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:19:00.323 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:19:00.323 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:19:00.324 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:19:00.324 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:19:00.325 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-05 04:19:00.328 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 512333789329218184960632672972290616628503204865
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Mar 05 03:04:39 UTC 2022
           Final Date: Thu Mar 04 03:04:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [04:e0:f3:94:04:2b:29:4f:07:5c:14:01:27:c1:4e:2d:2b:3e:86:47]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3843ab91a2d5316d87ab47ef57e976e2b72159aa
                       68ac4efdacfd58dd5a2da25401fb6679f1b12830
                       61f45127c9a395a0bb4aaca3db8c543ede0b3616
                       be9c64e885f4fabd018406ff1095b3483c1fbbb9
                       ab0fca7f88e21f2f507e58ce6e60c650159f8314
                       297838b171a004d7378ee347fe02182b8fb85d20
                       44ca2ada90a0f9912ef9817ee74c8899b8e400d4
                       ee85dd0ceb16b86809eb3752e674bdcd619fe40e
                       f4e351260d48f8b021184ead35e9df5e28e5c108
                       136c5076ae7ecbde1782e4dd98c3290763fd22d2
                       615009696357bb48f4d3ee5b4b36385a8d93bcc0
                       d6516da05cdc6321ba77df50fd0cf46be86eef6a
                       61448254fd94cb398a3eae2f570c5e708c2d479d
                       3a0762d491d74388a20e8b42838454d6b7074329
                       9b4fb7003fded8e355ca2c86a97adfe132453424
                       c892bfe56349cab18cd17fab6860c6f5adbcd600
                       900f2b8dd51d4f9d41b70a7e1dfd6084241cff7e
                       630814e62fc65fae42e1184b0f82d0f3978a0b3f
                       2a04bf540ed34897ae372492c4fed19084c5527d
                       b4d23f54
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [82:1d:82:bc:34:5b:da:d9:97:c8:fe:55:c5:b8:24:10:68:cb:a4:f0]
            modulus: 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
    public exponent: 10001

] 
2022-03-05 04:19:35.165  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-05 04:19:35.168 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-05 04:19:35.170 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-05 04:19:35.171 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-05 04:19:35.171  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-05 04:19:35.172  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-05 04:19:35.172  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-05 04:19:35.172 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-05 04:19:35.173 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-05 04:19:35.173 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-05 04:19:35.178 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-05 04:19:35.179 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:19:35.179 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:19:35.180 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:19:35.316  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-05 04:19:35.317  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-05 04:19:35.317 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-05 04:19:35.317 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:19:35.319  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-05 04:19:35.319  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-05 04:19:35.320 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:19:35.320 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:19:35.321 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:19:35.321 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:19:35.322 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:19:35.322 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:19:35.322 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:19:35.323 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:19:35.323 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:19:35.324 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-05 04:19:35.328 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 512333789329218184960632672972290616628503204865
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Mar 05 03:04:39 UTC 2022
           Final Date: Thu Mar 04 03:04:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [04:e0:f3:94:04:2b:29:4f:07:5c:14:01:27:c1:4e:2d:2b:3e:86:47]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3843ab91a2d5316d87ab47ef57e976e2b72159aa
                       68ac4efdacfd58dd5a2da25401fb6679f1b12830
                       61f45127c9a395a0bb4aaca3db8c543ede0b3616
                       be9c64e885f4fabd018406ff1095b3483c1fbbb9
                       ab0fca7f88e21f2f507e58ce6e60c650159f8314
                       297838b171a004d7378ee347fe02182b8fb85d20
                       44ca2ada90a0f9912ef9817ee74c8899b8e400d4
                       ee85dd0ceb16b86809eb3752e674bdcd619fe40e
                       f4e351260d48f8b021184ead35e9df5e28e5c108
                       136c5076ae7ecbde1782e4dd98c3290763fd22d2
                       615009696357bb48f4d3ee5b4b36385a8d93bcc0
                       d6516da05cdc6321ba77df50fd0cf46be86eef6a
                       61448254fd94cb398a3eae2f570c5e708c2d479d
                       3a0762d491d74388a20e8b42838454d6b7074329
                       9b4fb7003fded8e355ca2c86a97adfe132453424
                       c892bfe56349cab18cd17fab6860c6f5adbcd600
                       900f2b8dd51d4f9d41b70a7e1dfd6084241cff7e
                       630814e62fc65fae42e1184b0f82d0f3978a0b3f
                       2a04bf540ed34897ae372492c4fed19084c5527d
                       b4d23f54
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0a:b7:50:51:d7:9b:bb:db:b9:3a:52:77:24:50:55:c9:1c:0b:a4:30]
            modulus: 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
    public exponent: 10001

] 
2022-03-05 04:21:22.668  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-05 04:21:22.670 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-05 04:21:22.671 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-05 04:21:22.672 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-05 04:21:22.673  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-05 04:21:22.674  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-05 04:21:22.674  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-05 04:21:22.675 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-05 04:21:22.675 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-05 04:21:22.676 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-05 04:21:22.682 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-05 04:21:22.683 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:21:22.683 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:21:22.683 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:21:22.852  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-05 04:21:22.853  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-05 04:21:22.853 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-05 04:21:22.853 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:21:22.855  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-05 04:21:22.855  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-05 04:21:22.856 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:21:22.856 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:21:22.857 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:21:22.857 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:21:22.858 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:21:22.858 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:21:22.859 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:21:22.860 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:21:22.860 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:21:22.861 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-05 04:21:22.864 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 512333789329218184960632672972290616628503204865
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Mar 05 03:04:39 UTC 2022
           Final Date: Thu Mar 04 03:04:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [04:e0:f3:94:04:2b:29:4f:07:5c:14:01:27:c1:4e:2d:2b:3e:86:47]
            modulus: bdcab64e09697d74aa8703bc7ff3bb3918722932c6a29b01660599107c2fea20737f753e82a41d25caae35f49c98cb9c973cebccffb885caddb9b6c8b229d697c3085b8ecd231342a73ae620420137da0526c9f540934e2789d902f4ed139fd58e368e9923093037e0d35553f0c1ccb6b82e21afbbfcd5fcd27443d3ef23b5c390c4a7116ab564901f2d7ed57b90389a18711e83ab00e2455bed4d9987ec3db274ef4b6932cec7010bcb46fd0458a0a3e6464945f157089cd1ba80b60f5d77c12ac40e88de1a417d17ed780e6c757cf6964df6d3017e3a9bb4ad2fd319b9af32934e482004c56e27d3a81d164d6a39f5819d3185a87e2399921bba24a29fa767224c05beb16c30ba44c705bc5dd1226213522c099f02d0a408e8c6c053fb14485c3b99ea7ecb672223c1dcdfe63115254289fbd8083ecb985f16f4250a1d690d687475b0268bed2f906aa28c1e7ae6894aaae1b69e5653bd9db9622007f3671e6baae15621426e74a7f4db668ded1a40d07549c5e6202212caad620612e5dc17
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3843ab91a2d5316d87ab47ef57e976e2b72159aa
                       68ac4efdacfd58dd5a2da25401fb6679f1b12830
                       61f45127c9a395a0bb4aaca3db8c543ede0b3616
                       be9c64e885f4fabd018406ff1095b3483c1fbbb9
                       ab0fca7f88e21f2f507e58ce6e60c650159f8314
                       297838b171a004d7378ee347fe02182b8fb85d20
                       44ca2ada90a0f9912ef9817ee74c8899b8e400d4
                       ee85dd0ceb16b86809eb3752e674bdcd619fe40e
                       f4e351260d48f8b021184ead35e9df5e28e5c108
                       136c5076ae7ecbde1782e4dd98c3290763fd22d2
                       615009696357bb48f4d3ee5b4b36385a8d93bcc0
                       d6516da05cdc6321ba77df50fd0cf46be86eef6a
                       61448254fd94cb398a3eae2f570c5e708c2d479d
                       3a0762d491d74388a20e8b42838454d6b7074329
                       9b4fb7003fded8e355ca2c86a97adfe132453424
                       c892bfe56349cab18cd17fab6860c6f5adbcd600
                       900f2b8dd51d4f9d41b70a7e1dfd6084241cff7e
                       630814e62fc65fae42e1184b0f82d0f3978a0b3f
                       2a04bf540ed34897ae372492c4fed19084c5527d
                       b4d23f54
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e0:5c:0e:0c:82:50:7e:8c:57:fd:35:2a:3b:2b:c9:a2:f5:ce:f0:d0]
            modulus: 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
    public exponent: 10001

] 
2022-03-05 04:34:00.406  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-05 04:34:00.410 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-05 04:34:00.416 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-05 04:34:00.417 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-05 04:34:00.418  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-05 04:34:00.419  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-05 04:34:00.419  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-05 04:34:00.420 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-05 04:34:00.420 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-05 04:34:00.421 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-05 04:34:00.427 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-05 04:34:00.428 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:34:00.428 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:34:00.429 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:34:00.621  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-05 04:34:00.622  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-05 04:34:00.622 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-05 04:34:00.623 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:34:00.624  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-05 04:34:00.625  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-05 04:34:00.625 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:34:00.625 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:34:00.626 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:34:00.626 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:34:00.627 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:34:00.627 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:34:00.628 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:34:00.628 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:34:00.628 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:34:00.630 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-05 04:34:00.633 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 512333789329218184960632672972290616628503204865
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Mar 05 03:04:39 UTC 2022
           Final Date: Thu Mar 04 03:04:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [04:e0:f3:94:04:2b:29:4f:07:5c:14:01:27:c1:4e:2d:2b:3e:86:47]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3843ab91a2d5316d87ab47ef57e976e2b72159aa
                       68ac4efdacfd58dd5a2da25401fb6679f1b12830
                       61f45127c9a395a0bb4aaca3db8c543ede0b3616
                       be9c64e885f4fabd018406ff1095b3483c1fbbb9
                       ab0fca7f88e21f2f507e58ce6e60c650159f8314
                       297838b171a004d7378ee347fe02182b8fb85d20
                       44ca2ada90a0f9912ef9817ee74c8899b8e400d4
                       ee85dd0ceb16b86809eb3752e674bdcd619fe40e
                       f4e351260d48f8b021184ead35e9df5e28e5c108
                       136c5076ae7ecbde1782e4dd98c3290763fd22d2
                       615009696357bb48f4d3ee5b4b36385a8d93bcc0
                       d6516da05cdc6321ba77df50fd0cf46be86eef6a
                       61448254fd94cb398a3eae2f570c5e708c2d479d
                       3a0762d491d74388a20e8b42838454d6b7074329
                       9b4fb7003fded8e355ca2c86a97adfe132453424
                       c892bfe56349cab18cd17fab6860c6f5adbcd600
                       900f2b8dd51d4f9d41b70a7e1dfd6084241cff7e
                       630814e62fc65fae42e1184b0f82d0f3978a0b3f
                       2a04bf540ed34897ae372492c4fed19084c5527d
                       b4d23f54
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [03:12:cd:7a:9e:c7:8f:cb:66:7c:89:5c:e7:ca:7e:25:e5:dd:07:cc]
            modulus: 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
    public exponent: 10001

] 
2022-03-05 04:38:10.176  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-05 04:38:10.178 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-05 04:38:10.180 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-05 04:38:10.181 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-05 04:38:10.181  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-05 04:38:10.182  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-05 04:38:10.182  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-05 04:38:10.183 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-05 04:38:10.183 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-05 04:38:10.183 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-05 04:38:10.188 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-05 04:38:10.189 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:38:10.189 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:38:10.189 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:38:10.357  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-05 04:38:10.359  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-05 04:38:10.360 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-05 04:38:10.360 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:38:10.362  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-05 04:38:10.362  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-05 04:38:10.363 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:38:10.363 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:38:10.363 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:38:10.364 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:38:10.364 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:38:10.365 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:38:10.367 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:38:10.367 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:38:10.368 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:38:10.370 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-05 04:38:10.375 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 512333789329218184960632672972290616628503204865
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Mar 05 03:04:39 UTC 2022
           Final Date: Thu Mar 04 03:04:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [04:e0:f3:94:04:2b:29:4f:07:5c:14:01:27:c1:4e:2d:2b:3e:86:47]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3843ab91a2d5316d87ab47ef57e976e2b72159aa
                       68ac4efdacfd58dd5a2da25401fb6679f1b12830
                       61f45127c9a395a0bb4aaca3db8c543ede0b3616
                       be9c64e885f4fabd018406ff1095b3483c1fbbb9
                       ab0fca7f88e21f2f507e58ce6e60c650159f8314
                       297838b171a004d7378ee347fe02182b8fb85d20
                       44ca2ada90a0f9912ef9817ee74c8899b8e400d4
                       ee85dd0ceb16b86809eb3752e674bdcd619fe40e
                       f4e351260d48f8b021184ead35e9df5e28e5c108
                       136c5076ae7ecbde1782e4dd98c3290763fd22d2
                       615009696357bb48f4d3ee5b4b36385a8d93bcc0
                       d6516da05cdc6321ba77df50fd0cf46be86eef6a
                       61448254fd94cb398a3eae2f570c5e708c2d479d
                       3a0762d491d74388a20e8b42838454d6b7074329
                       9b4fb7003fded8e355ca2c86a97adfe132453424
                       c892bfe56349cab18cd17fab6860c6f5adbcd600
                       900f2b8dd51d4f9d41b70a7e1dfd6084241cff7e
                       630814e62fc65fae42e1184b0f82d0f3978a0b3f
                       2a04bf540ed34897ae372492c4fed19084c5527d
                       b4d23f54
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5f:a3:e7:21:b0:bc:39:4d:14:2a:23:a0:dc:e3:ff:1a:cf:e4:67:9c]
            modulus: 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
    public exponent: 10001

] 
2022-03-05 04:38:43.091  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-05 04:38:43.092 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-05 04:38:43.094 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-05 04:38:43.095 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-05 04:38:43.095  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-05 04:38:43.096  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-05 04:38:43.096  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-05 04:38:43.096 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-05 04:38:43.097 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-05 04:38:43.097 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-05 04:38:43.102 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-05 04:38:43.102 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:38:43.102 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:38:43.103 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:38:43.241  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-05 04:38:43.242  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-05 04:38:43.242 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-05 04:38:43.242 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:38:43.244  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-05 04:38:43.244  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-05 04:38:43.245 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:38:43.245 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:38:43.245 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:38:43.246 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:38:43.246 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:38:43.246 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:38:43.247 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:38:43.247 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:38:43.247 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:38:43.248 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-05 04:38:43.251 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 512333789329218184960632672972290616628503204865
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Mar 05 03:04:39 UTC 2022
           Final Date: Thu Mar 04 03:04:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [04:e0:f3:94:04:2b:29:4f:07:5c:14:01:27:c1:4e:2d:2b:3e:86:47]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3843ab91a2d5316d87ab47ef57e976e2b72159aa
                       68ac4efdacfd58dd5a2da25401fb6679f1b12830
                       61f45127c9a395a0bb4aaca3db8c543ede0b3616
                       be9c64e885f4fabd018406ff1095b3483c1fbbb9
                       ab0fca7f88e21f2f507e58ce6e60c650159f8314
                       297838b171a004d7378ee347fe02182b8fb85d20
                       44ca2ada90a0f9912ef9817ee74c8899b8e400d4
                       ee85dd0ceb16b86809eb3752e674bdcd619fe40e
                       f4e351260d48f8b021184ead35e9df5e28e5c108
                       136c5076ae7ecbde1782e4dd98c3290763fd22d2
                       615009696357bb48f4d3ee5b4b36385a8d93bcc0
                       d6516da05cdc6321ba77df50fd0cf46be86eef6a
                       61448254fd94cb398a3eae2f570c5e708c2d479d
                       3a0762d491d74388a20e8b42838454d6b7074329
                       9b4fb7003fded8e355ca2c86a97adfe132453424
                       c892bfe56349cab18cd17fab6860c6f5adbcd600
                       900f2b8dd51d4f9d41b70a7e1dfd6084241cff7e
                       630814e62fc65fae42e1184b0f82d0f3978a0b3f
                       2a04bf540ed34897ae372492c4fed19084c5527d
                       b4d23f54
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cd:3a:45:45:b0:f3:92:04:eb:de:8e:19:0e:b6:07:f0:60:b1:6a:13]
            modulus: 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
    public exponent: 10001

] 
2022-03-05 04:39:17.067  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-05 04:39:17.068 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-05 04:39:17.070 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-05 04:39:17.070 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-05 04:39:17.071  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-05 04:39:17.071  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-05 04:39:17.072  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-05 04:39:17.072 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-05 04:39:17.072 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-05 04:39:17.073 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-05 04:39:17.079 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-05 04:39:17.080 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:39:17.080 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:39:17.080 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:39:17.238  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-05 04:39:17.239  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-05 04:39:17.240 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-05 04:39:17.240 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:39:17.241  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-05 04:39:17.242  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-05 04:39:17.242 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:39:17.243 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:39:17.243 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:39:17.244 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:39:17.244 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:39:17.244 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:39:17.245 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:39:17.245 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:39:17.246 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:39:17.246 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-05 04:39:17.250 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 512333789329218184960632672972290616628503204865
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Mar 05 03:04:39 UTC 2022
           Final Date: Thu Mar 04 03:04:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [04:e0:f3:94:04:2b:29:4f:07:5c:14:01:27:c1:4e:2d:2b:3e:86:47]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3843ab91a2d5316d87ab47ef57e976e2b72159aa
                       68ac4efdacfd58dd5a2da25401fb6679f1b12830
                       61f45127c9a395a0bb4aaca3db8c543ede0b3616
                       be9c64e885f4fabd018406ff1095b3483c1fbbb9
                       ab0fca7f88e21f2f507e58ce6e60c650159f8314
                       297838b171a004d7378ee347fe02182b8fb85d20
                       44ca2ada90a0f9912ef9817ee74c8899b8e400d4
                       ee85dd0ceb16b86809eb3752e674bdcd619fe40e
                       f4e351260d48f8b021184ead35e9df5e28e5c108
                       136c5076ae7ecbde1782e4dd98c3290763fd22d2
                       615009696357bb48f4d3ee5b4b36385a8d93bcc0
                       d6516da05cdc6321ba77df50fd0cf46be86eef6a
                       61448254fd94cb398a3eae2f570c5e708c2d479d
                       3a0762d491d74388a20e8b42838454d6b7074329
                       9b4fb7003fded8e355ca2c86a97adfe132453424
                       c892bfe56349cab18cd17fab6860c6f5adbcd600
                       900f2b8dd51d4f9d41b70a7e1dfd6084241cff7e
                       630814e62fc65fae42e1184b0f82d0f3978a0b3f
                       2a04bf540ed34897ae372492c4fed19084c5527d
                       b4d23f54
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d9:aa:ac:bb:0c:5f:cd:11:4b:9a:be:74:e2:93:34:1c:b1:90:86:3a]
            modulus: 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
    public exponent: 10001

] 
2022-03-05 04:41:05.359  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-05 04:41:05.361 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-05 04:41:05.363 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-05 04:41:05.366 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-05 04:41:05.367  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-05 04:41:05.368  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-05 04:41:05.368  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-05 04:41:05.368 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-05 04:41:05.369 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-05 04:41:05.369 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-05 04:41:05.373 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-05 04:41:05.374 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:41:05.374 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:41:05.375 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:41:05.505  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-05 04:41:05.506  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-05 04:41:05.506 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-05 04:41:05.506 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:41:05.508  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-05 04:41:05.508  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-05 04:41:05.509 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:41:05.509 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:41:05.509 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:41:05.510 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:41:05.510 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:41:05.510 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:41:05.513 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:41:05.513 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:41:05.514 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:41:05.515 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-05 04:41:05.519 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 512333789329218184960632672972290616628503204865
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Mar 05 03:04:39 UTC 2022
           Final Date: Thu Mar 04 03:04:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [04:e0:f3:94:04:2b:29:4f:07:5c:14:01:27:c1:4e:2d:2b:3e:86:47]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3843ab91a2d5316d87ab47ef57e976e2b72159aa
                       68ac4efdacfd58dd5a2da25401fb6679f1b12830
                       61f45127c9a395a0bb4aaca3db8c543ede0b3616
                       be9c64e885f4fabd018406ff1095b3483c1fbbb9
                       ab0fca7f88e21f2f507e58ce6e60c650159f8314
                       297838b171a004d7378ee347fe02182b8fb85d20
                       44ca2ada90a0f9912ef9817ee74c8899b8e400d4
                       ee85dd0ceb16b86809eb3752e674bdcd619fe40e
                       f4e351260d48f8b021184ead35e9df5e28e5c108
                       136c5076ae7ecbde1782e4dd98c3290763fd22d2
                       615009696357bb48f4d3ee5b4b36385a8d93bcc0
                       d6516da05cdc6321ba77df50fd0cf46be86eef6a
                       61448254fd94cb398a3eae2f570c5e708c2d479d
                       3a0762d491d74388a20e8b42838454d6b7074329
                       9b4fb7003fded8e355ca2c86a97adfe132453424
                       c892bfe56349cab18cd17fab6860c6f5adbcd600
                       900f2b8dd51d4f9d41b70a7e1dfd6084241cff7e
                       630814e62fc65fae42e1184b0f82d0f3978a0b3f
                       2a04bf540ed34897ae372492c4fed19084c5527d
                       b4d23f54
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [da:f4:c7:e4:51:e5:b7:e1:60:2e:08:49:be:5e:b0:bc:74:5c:57:63]
            modulus: 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
    public exponent: 10001

] 
2022-03-05 04:41:32.778  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-05 04:41:32.779 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-05 04:41:32.781 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-05 04:41:32.782 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-05 04:41:32.782  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-05 04:41:32.782  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-05 04:41:32.783  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-05 04:41:32.783 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-05 04:41:32.783 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-05 04:41:32.784 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-05 04:41:32.788 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-05 04:41:32.789 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:41:32.789 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:41:32.789 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:41:32.909  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-05 04:41:32.910  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-05 04:41:32.911 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-05 04:41:32.911 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:41:32.913  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-05 04:41:32.913  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-05 04:41:32.914 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:41:32.914 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:41:32.914 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:41:32.915 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:41:32.915 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:41:32.915 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:41:32.916 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:41:32.916 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:41:32.916 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:41:32.917 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-05 04:41:32.919 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 512333789329218184960632672972290616628503204865
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Mar 05 03:04:39 UTC 2022
           Final Date: Thu Mar 04 03:04:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [04:e0:f3:94:04:2b:29:4f:07:5c:14:01:27:c1:4e:2d:2b:3e:86:47]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3843ab91a2d5316d87ab47ef57e976e2b72159aa
                       68ac4efdacfd58dd5a2da25401fb6679f1b12830
                       61f45127c9a395a0bb4aaca3db8c543ede0b3616
                       be9c64e885f4fabd018406ff1095b3483c1fbbb9
                       ab0fca7f88e21f2f507e58ce6e60c650159f8314
                       297838b171a004d7378ee347fe02182b8fb85d20
                       44ca2ada90a0f9912ef9817ee74c8899b8e400d4
                       ee85dd0ceb16b86809eb3752e674bdcd619fe40e
                       f4e351260d48f8b021184ead35e9df5e28e5c108
                       136c5076ae7ecbde1782e4dd98c3290763fd22d2
                       615009696357bb48f4d3ee5b4b36385a8d93bcc0
                       d6516da05cdc6321ba77df50fd0cf46be86eef6a
                       61448254fd94cb398a3eae2f570c5e708c2d479d
                       3a0762d491d74388a20e8b42838454d6b7074329
                       9b4fb7003fded8e355ca2c86a97adfe132453424
                       c892bfe56349cab18cd17fab6860c6f5adbcd600
                       900f2b8dd51d4f9d41b70a7e1dfd6084241cff7e
                       630814e62fc65fae42e1184b0f82d0f3978a0b3f
                       2a04bf540ed34897ae372492c4fed19084c5527d
                       b4d23f54
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2c:0d:73:a0:20:bf:4c:cc:26:d8:78:49:37:f1:d5:e2:22:f0:a9:75]
            modulus: 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
    public exponent: 10001

] 
2022-03-05 04:45:41.489  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-05 04:45:41.492 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-05 04:45:41.495 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-05 04:45:41.496 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-05 04:45:41.497  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-05 04:45:41.498  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-05 04:45:41.498  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-05 04:45:41.499 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-05 04:45:41.499 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-05 04:45:41.500 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-05 04:45:41.508 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-05 04:45:41.511 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:45:41.511 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:45:41.512 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:45:41.696  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-05 04:45:41.697  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-05 04:45:41.697 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-05 04:45:41.698 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:45:41.699  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-05 04:45:41.700  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-05 04:45:41.700 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:45:41.700 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:45:41.701 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:45:41.701 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:45:41.701 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:45:41.702 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:45:41.702 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:45:41.703 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:45:41.704 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:45:41.706 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-05 04:45:41.715 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 512333789329218184960632672972290616628503204865
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Mar 05 03:04:39 UTC 2022
           Final Date: Thu Mar 04 03:04:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [04:e0:f3:94:04:2b:29:4f:07:5c:14:01:27:c1:4e:2d:2b:3e:86:47]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3843ab91a2d5316d87ab47ef57e976e2b72159aa
                       68ac4efdacfd58dd5a2da25401fb6679f1b12830
                       61f45127c9a395a0bb4aaca3db8c543ede0b3616
                       be9c64e885f4fabd018406ff1095b3483c1fbbb9
                       ab0fca7f88e21f2f507e58ce6e60c650159f8314
                       297838b171a004d7378ee347fe02182b8fb85d20
                       44ca2ada90a0f9912ef9817ee74c8899b8e400d4
                       ee85dd0ceb16b86809eb3752e674bdcd619fe40e
                       f4e351260d48f8b021184ead35e9df5e28e5c108
                       136c5076ae7ecbde1782e4dd98c3290763fd22d2
                       615009696357bb48f4d3ee5b4b36385a8d93bcc0
                       d6516da05cdc6321ba77df50fd0cf46be86eef6a
                       61448254fd94cb398a3eae2f570c5e708c2d479d
                       3a0762d491d74388a20e8b42838454d6b7074329
                       9b4fb7003fded8e355ca2c86a97adfe132453424
                       c892bfe56349cab18cd17fab6860c6f5adbcd600
                       900f2b8dd51d4f9d41b70a7e1dfd6084241cff7e
                       630814e62fc65fae42e1184b0f82d0f3978a0b3f
                       2a04bf540ed34897ae372492c4fed19084c5527d
                       b4d23f54
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [82:2e:69:3b:f4:bf:25:8e:5a:c5:67:4a:49:f1:42:64:39:a1:16:45]
            modulus: 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
    public exponent: 10001

] 
2022-03-05 04:46:15.791  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-05 04:46:15.793 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-05 04:46:15.799 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-05 04:46:15.800 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-05 04:46:15.800  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-05 04:46:15.801  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-05 04:46:15.801  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-05 04:46:15.801 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-05 04:46:15.803 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-05 04:46:15.803 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-05 04:46:15.808 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-05 04:46:15.809 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:46:15.809 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:46:15.809 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:46:15.957  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-05 04:46:15.957  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-05 04:46:15.958 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-05 04:46:15.958 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:46:15.959  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-05 04:46:15.960  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-05 04:46:15.960 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:46:15.960 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:46:15.960 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:46:15.961 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:46:15.961 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:46:15.961 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:46:15.962 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:46:15.962 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:46:15.962 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:46:15.963 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-05 04:46:15.967 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 512333789329218184960632672972290616628503204865
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Mar 05 03:04:39 UTC 2022
           Final Date: Thu Mar 04 03:04:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [04:e0:f3:94:04:2b:29:4f:07:5c:14:01:27:c1:4e:2d:2b:3e:86:47]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3843ab91a2d5316d87ab47ef57e976e2b72159aa
                       68ac4efdacfd58dd5a2da25401fb6679f1b12830
                       61f45127c9a395a0bb4aaca3db8c543ede0b3616
                       be9c64e885f4fabd018406ff1095b3483c1fbbb9
                       ab0fca7f88e21f2f507e58ce6e60c650159f8314
                       297838b171a004d7378ee347fe02182b8fb85d20
                       44ca2ada90a0f9912ef9817ee74c8899b8e400d4
                       ee85dd0ceb16b86809eb3752e674bdcd619fe40e
                       f4e351260d48f8b021184ead35e9df5e28e5c108
                       136c5076ae7ecbde1782e4dd98c3290763fd22d2
                       615009696357bb48f4d3ee5b4b36385a8d93bcc0
                       d6516da05cdc6321ba77df50fd0cf46be86eef6a
                       61448254fd94cb398a3eae2f570c5e708c2d479d
                       3a0762d491d74388a20e8b42838454d6b7074329
                       9b4fb7003fded8e355ca2c86a97adfe132453424
                       c892bfe56349cab18cd17fab6860c6f5adbcd600
                       900f2b8dd51d4f9d41b70a7e1dfd6084241cff7e
                       630814e62fc65fae42e1184b0f82d0f3978a0b3f
                       2a04bf540ed34897ae372492c4fed19084c5527d
                       b4d23f54
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [95:0e:02:b3:96:af:c5:aa:dc:0b:f9:0b:b1:2b:e6:ab:0c:f1:36:4f]
            modulus: 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
    public exponent: 10001

] 
2022-03-05 04:46:49.149  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-05 04:46:49.151 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-05 04:46:49.152 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-05 04:46:49.152 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-05 04:46:49.153  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-05 04:46:49.153  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-05 04:46:49.153  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-05 04:46:49.153 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-05 04:46:49.154 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-05 04:46:49.154 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-05 04:46:49.158 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-05 04:46:49.159 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:46:49.159 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:46:49.159 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:46:49.289  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-05 04:46:49.290  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-05 04:46:49.290 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-05 04:46:49.290 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:46:49.291  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-05 04:46:49.292  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-05 04:46:49.292 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:46:49.292 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:46:49.292 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:46:49.293 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:46:49.293 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:46:49.293 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:46:49.293 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:46:49.294 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:46:49.294 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:46:49.295 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-05 04:46:49.298 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 512333789329218184960632672972290616628503204865
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Mar 05 03:04:39 UTC 2022
           Final Date: Thu Mar 04 03:04:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [04:e0:f3:94:04:2b:29:4f:07:5c:14:01:27:c1:4e:2d:2b:3e:86:47]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3843ab91a2d5316d87ab47ef57e976e2b72159aa
                       68ac4efdacfd58dd5a2da25401fb6679f1b12830
                       61f45127c9a395a0bb4aaca3db8c543ede0b3616
                       be9c64e885f4fabd018406ff1095b3483c1fbbb9
                       ab0fca7f88e21f2f507e58ce6e60c650159f8314
                       297838b171a004d7378ee347fe02182b8fb85d20
                       44ca2ada90a0f9912ef9817ee74c8899b8e400d4
                       ee85dd0ceb16b86809eb3752e674bdcd619fe40e
                       f4e351260d48f8b021184ead35e9df5e28e5c108
                       136c5076ae7ecbde1782e4dd98c3290763fd22d2
                       615009696357bb48f4d3ee5b4b36385a8d93bcc0
                       d6516da05cdc6321ba77df50fd0cf46be86eef6a
                       61448254fd94cb398a3eae2f570c5e708c2d479d
                       3a0762d491d74388a20e8b42838454d6b7074329
                       9b4fb7003fded8e355ca2c86a97adfe132453424
                       c892bfe56349cab18cd17fab6860c6f5adbcd600
                       900f2b8dd51d4f9d41b70a7e1dfd6084241cff7e
                       630814e62fc65fae42e1184b0f82d0f3978a0b3f
                       2a04bf540ed34897ae372492c4fed19084c5527d
                       b4d23f54
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [90:3c:ff:79:bb:c3:1f:2f:46:b3:d2:f7:14:f4:e5:aa:dd:38:2c:c0]
            modulus: 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
    public exponent: 10001

] 
2022-03-05 04:49:58.564  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-05 04:49:58.566 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-05 04:49:58.568 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-05 04:49:58.569 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-05 04:49:58.569  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-05 04:49:58.570  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-05 04:49:58.570  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-05 04:49:58.570 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-05 04:49:58.571 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-05 04:49:58.571 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-05 04:49:58.576 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-05 04:49:58.577 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:49:58.577 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:49:58.578 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:49:58.742  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-05 04:49:58.743  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-05 04:49:58.743 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-05 04:49:58.744 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:49:58.745  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-05 04:49:58.745  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-05 04:49:58.746 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:49:58.746 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:49:58.746 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:49:58.747 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:49:58.747 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:49:58.747 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:49:58.748 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:49:58.748 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:49:58.748 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:49:58.749 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-05 04:49:58.753 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 512333789329218184960632672972290616628503204865
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Mar 05 03:04:39 UTC 2022
           Final Date: Thu Mar 04 03:04:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [04:e0:f3:94:04:2b:29:4f:07:5c:14:01:27:c1:4e:2d:2b:3e:86:47]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3843ab91a2d5316d87ab47ef57e976e2b72159aa
                       68ac4efdacfd58dd5a2da25401fb6679f1b12830
                       61f45127c9a395a0bb4aaca3db8c543ede0b3616
                       be9c64e885f4fabd018406ff1095b3483c1fbbb9
                       ab0fca7f88e21f2f507e58ce6e60c650159f8314
                       297838b171a004d7378ee347fe02182b8fb85d20
                       44ca2ada90a0f9912ef9817ee74c8899b8e400d4
                       ee85dd0ceb16b86809eb3752e674bdcd619fe40e
                       f4e351260d48f8b021184ead35e9df5e28e5c108
                       136c5076ae7ecbde1782e4dd98c3290763fd22d2
                       615009696357bb48f4d3ee5b4b36385a8d93bcc0
                       d6516da05cdc6321ba77df50fd0cf46be86eef6a
                       61448254fd94cb398a3eae2f570c5e708c2d479d
                       3a0762d491d74388a20e8b42838454d6b7074329
                       9b4fb7003fded8e355ca2c86a97adfe132453424
                       c892bfe56349cab18cd17fab6860c6f5adbcd600
                       900f2b8dd51d4f9d41b70a7e1dfd6084241cff7e
                       630814e62fc65fae42e1184b0f82d0f3978a0b3f
                       2a04bf540ed34897ae372492c4fed19084c5527d
                       b4d23f54
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a3:e7:b4:cf:f1:6f:80:33:cf:d3:59:96:04:5f:16:b3:0b:4a:32:a6]
            modulus: b3ab564f43309463412d4f3132432917e84bc8481e0d2292406459303493ce8f49a4fbe81d9202056beb770500be6f657f5af2d497df56314ba474d7add90bbac4e16295ddf4d3f827c7222442f344bf0d7df92fc7db4ed42bdf4aaf26d460e243feb3f2a5e67cd7efa22c8d768ca8d1b3959be884b6184a0c9db74ce2bb0b7c23e49cf6312914b10fd11bec2116f04a31c10930afbeb20a6d57b5150f5da083164dec09e334f601e1ef2d8bc503588a20ea073cf2847388641c05114a4c1342287936258d59d860a10eb0a7e4b02517fa625317bbac2c08ff715f4abd96796d0956c944e3ef6aac56bb059f69cbcb9ebc455bef5f863414f01fc285f9bf1483
    public exponent: 10001

] 
2022-03-05 04:54:13.772  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-05 04:54:13.775 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-05 04:54:13.778 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-05 04:54:13.779 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-05 04:54:13.780  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-05 04:54:13.781  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-05 04:54:13.781  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-05 04:54:13.782 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-05 04:54:13.782 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-05 04:54:13.783 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-05 04:54:13.789 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-05 04:54:13.790 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:54:13.790 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-05 04:54:13.791 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:54:13.962  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-05 04:54:13.963  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-05 04:54:13.964 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-05 04:54:13.964 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-05 04:54:13.967  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-05 04:54:13.968  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-05 04:54:13.968 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:54:13.969 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:54:13.969 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:54:13.970 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:54:13.971 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:54:13.971 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:54:13.972 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-05 04:54:13.973 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-05 04:54:13.973 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-05 04:54:13.974 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-05 04:54:13.980 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 512333789329218184960632672972290616628503204865
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Mar 05 03:04:39 UTC 2022
           Final Date: Thu Mar 04 03:04:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [04:e0:f3:94:04:2b:29:4f:07:5c:14:01:27:c1:4e:2d:2b:3e:86:47]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3843ab91a2d5316d87ab47ef57e976e2b72159aa
                       68ac4efdacfd58dd5a2da25401fb6679f1b12830
                       61f45127c9a395a0bb4aaca3db8c543ede0b3616
                       be9c64e885f4fabd018406ff1095b3483c1fbbb9
                       ab0fca7f88e21f2f507e58ce6e60c650159f8314
                       297838b171a004d7378ee347fe02182b8fb85d20
                       44ca2ada90a0f9912ef9817ee74c8899b8e400d4
                       ee85dd0ceb16b86809eb3752e674bdcd619fe40e
                       f4e351260d48f8b021184ead35e9df5e28e5c108
                       136c5076ae7ecbde1782e4dd98c3290763fd22d2
                       615009696357bb48f4d3ee5b4b36385a8d93bcc0
                       d6516da05cdc6321ba77df50fd0cf46be86eef6a
                       61448254fd94cb398a3eae2f570c5e708c2d479d
                       3a0762d491d74388a20e8b42838454d6b7074329
                       9b4fb7003fded8e355ca2c86a97adfe132453424
                       c892bfe56349cab18cd17fab6860c6f5adbcd600
                       900f2b8dd51d4f9d41b70a7e1dfd6084241cff7e
                       630814e62fc65fae42e1184b0f82d0f3978a0b3f
                       2a04bf540ed34897ae372492c4fed19084c5527d
                       b4d23f54
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c4:3b:89:c4:6f:3f:37:18:fa:df:ec:b4:72:db:28:10:57:c8:35:3a]
            modulus: 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
    public exponent: 10001

]