Results

By type

          2022-03-20 03:18:56,851 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-03-20 03:18:58,704 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-03-20 03:18:59.710  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Mar 20, 2022 3:19:02 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Mar 20, 2022 3:19:02 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Mar 20, 2022 3:19:02 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Mar 20, 2022 3:19:02 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-03-20 03:19:03.234 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-03-20 03:19:03.600  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-03-20 03:19:03.855  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-03-20 03:19:04.987 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-03-20 03:19:04.992 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-03-20 03:19:04.997 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-03-20 03:19:05.002 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-03-20 03:19:05.075 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-03-20 03:19:05.082 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-03-20 03:19:05.299 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-03-20 03:19:06.145 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Mar 20, 2022 3:19:06 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-03-20 03:19:07.369  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 11.547 seconds (JVM running for 14.003)
Mar 20, 2022 3:19:31 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-03-20 03:19:48.480  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-20 03:19:48.491 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-20 03:19:48.535 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-03-20 03:19:48.540 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-20 03:19:48.574  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-03-20 03:19:48.582  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-20 03:19:48.583  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-20 03:19:48.586 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-20 03:19:48.586 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-20 03:19:48.599 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-20 03:19:48.612 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-20 03:19:48.618 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-20 03:19:48.680 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-20 03:19:48.687 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-20 03:19:48.690 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-20 03:19:48.698 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-20 03:19:49.559  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-20 03:19:49.564  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-20 03:19:49.564 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-20 03:19:49.567 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-20 03:19:49.578  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-20 03:19:49.579  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-20 03:19:49.580 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 03:19:49.580 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 03:19:49.581 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 03:19:49.594 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 03:19:49.595 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 03:19:49.596 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 03:19:49.603 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 03:19:49.604 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 03:19:49.605 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 03:19:49.607 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-20 03:19:49.639 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 104335131105005706299521300063180802303600701538
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Mar 20 03:16:04 UTC 2022
           Final Date: Fri Mar 19 03:16:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:14:2f:9a:8b:9d:3c:97:5a:69:d9:6a:8f:10:23:52:aa:3c:32:20]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1822be73df792972d8487c1ca7315858d8435fa9
                       f6d0f5e648f2e2ad23cb2787320193483db9a70d
                       8864f2b715c6b93ca269639b812419be1245d507
                       f516ffb9cea59c9c96a3c2fafda95278ba5fbbc5
                       1cfe3ae411a74bfb4dd0c0d121309ed61102cc98
                       2ea2ae4506716fc33f1c265151e91791ab8afe73
                       75838c112c1732975751e04a95a230eb15b3a51d
                       141911b612c69cc32c2f71b296d73761fe0452c5
                       5ba8f8451d2d04fb7848f8599d3401c081f5c022
                       edd474c17d6a9914dfc6a0ffcae33fdc247f2df9
                       b2924fd9d2798dfa5a6a0e9916b0c95f08adab40
                       9d3d717c98d7d6b61195f06d9fd8f44f87037f9f
                       f70fbc57ce63d6f373177dfca024adaf5ecc01a4
                       4fffa314510ccb103943a6cd253d3df8121d1b3f
                       ea5997cd063f86a81731a72b82ec1baa0f5d65f7
                       bd0e8d4805598b6291688d3129d793ba918cd431
                       f905b82fe157e039bf65a84403bb5629e0182139
                       23f6371b3b174883745f9f2e0a3ba9998e03f38a
                       fa7bf6b629cd1fe5f4e8774dda009259827b0587
                       50a8adc9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [50:6d:ae:aa:12:f8:4b:43:ea:c9:af:39:5d:4e:d7:a0:5b:ae:66:7f]
            modulus: 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
    public exponent: 10001

] 
2022-03-20 04:33:27.438  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-20 04:33:27.442 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-20 04:33:27.453 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-20 04:33:27.466 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-20 04:33:27.467  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-20 04:33:27.470  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-20 04:33:27.471  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-20 04:33:27.473 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-20 04:33:27.474 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-20 04:33:27.475 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-20 04:33:27.490 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-20 04:33:27.493 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-20 04:33:27.494 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-20 04:33:27.495 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-20 04:33:27.818  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-20 04:33:27.819  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-20 04:33:27.819 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-20 04:33:27.820 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-20 04:33:27.824  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-20 04:33:27.825  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-20 04:33:27.825 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 04:33:27.826 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 04:33:27.827 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 04:33:27.832 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 04:33:27.833 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 04:33:27.834 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 04:33:27.835 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 04:33:27.836 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 04:33:27.836 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 04:33:27.838 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-20 04:33:27.844 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 104335131105005706299521300063180802303600701538
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Mar 20 03:16:04 UTC 2022
           Final Date: Fri Mar 19 03:16:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:14:2f:9a:8b:9d:3c:97:5a:69:d9:6a:8f:10:23:52:aa:3c:32:20]
            modulus: f6b01b41d5e33341d955531c6f351f12c8dd4032e0efc6189fe5c90af25309435146c30a8bfbea158507a7217ec7b5a913853c4bb735a0804119a35b8a0d10a3daf1e1cd058484eba8bcc0221fb40571d90208038fae4732cd336ad2ef3c3a57767294e5232cc043eb60b1b9095861abe4341a11bba92471747721d474d814bb61f9cdc0ce835b2ebcc2270f8ee13958f47ba667e4830ec279e2c5fb5580c8ea54e1acfbca46bc559d0f941275aad85f30607ea1bd1b3b2e54a0eaab155b33f59f9ea574be3c5c9d8aa99c3ed2d58a2d2de5c792f0c47029420a1a3fe204e9c62afb54e8e2e875b15309bf7e14223ef37cd19f5fdfbde6a48d64c620e455c1c82826d6a0501d21207c8d467f6957dabaf0f4f8eff7b3740ceb99cf8896f74c58976cec53c6672bb5bcf4d56934d053b06ebb168826812707ecc28c63f9bf72a6a198d50b8c14d60f2ab0c8e6d2d51c80a76f47d24b4c96efc74fef30bbb44c43a7e99310cf9233aec0fc2746ce5de4b17e58d565ac151f8fbe0efb2945a4ff4f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1822be73df792972d8487c1ca7315858d8435fa9
                       f6d0f5e648f2e2ad23cb2787320193483db9a70d
                       8864f2b715c6b93ca269639b812419be1245d507
                       f516ffb9cea59c9c96a3c2fafda95278ba5fbbc5
                       1cfe3ae411a74bfb4dd0c0d121309ed61102cc98
                       2ea2ae4506716fc33f1c265151e91791ab8afe73
                       75838c112c1732975751e04a95a230eb15b3a51d
                       141911b612c69cc32c2f71b296d73761fe0452c5
                       5ba8f8451d2d04fb7848f8599d3401c081f5c022
                       edd474c17d6a9914dfc6a0ffcae33fdc247f2df9
                       b2924fd9d2798dfa5a6a0e9916b0c95f08adab40
                       9d3d717c98d7d6b61195f06d9fd8f44f87037f9f
                       f70fbc57ce63d6f373177dfca024adaf5ecc01a4
                       4fffa314510ccb103943a6cd253d3df8121d1b3f
                       ea5997cd063f86a81731a72b82ec1baa0f5d65f7
                       bd0e8d4805598b6291688d3129d793ba918cd431
                       f905b82fe157e039bf65a84403bb5629e0182139
                       23f6371b3b174883745f9f2e0a3ba9998e03f38a
                       fa7bf6b629cd1fe5f4e8774dda009259827b0587
                       50a8adc9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4d:12:dd:bd:7c:63:d2:b1:e0:74:3a:7b:19:88:79:78:fd:59:4c:96]
            modulus: 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
    public exponent: 10001

] 
2022-03-20 04:34:56.234  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-20 04:34:56.235 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-20 04:34:56.238 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-20 04:34:56.238 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-20 04:34:56.239  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-20 04:34:56.240  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-20 04:34:56.240  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-20 04:34:56.241 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-20 04:34:56.242 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-20 04:34:56.242 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-20 04:34:56.261 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-20 04:34:56.262 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-20 04:34:56.263 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-20 04:34:56.263 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-20 04:34:56.486  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-20 04:34:56.487  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-20 04:34:56.488 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-20 04:34:56.489 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-20 04:34:56.493  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-20 04:34:56.494  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-20 04:34:56.494 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 04:34:56.495 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 04:34:56.495 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 04:34:56.496 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 04:34:56.497 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 04:34:56.498 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 04:34:56.499 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 04:34:56.499 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 04:34:56.500 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 04:34:56.501 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-20 04:34:56.505 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 104335131105005706299521300063180802303600701538
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Mar 20 03:16:04 UTC 2022
           Final Date: Fri Mar 19 03:16:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:14:2f:9a:8b:9d:3c:97:5a:69:d9:6a:8f:10:23:52:aa:3c:32:20]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1822be73df792972d8487c1ca7315858d8435fa9
                       f6d0f5e648f2e2ad23cb2787320193483db9a70d
                       8864f2b715c6b93ca269639b812419be1245d507
                       f516ffb9cea59c9c96a3c2fafda95278ba5fbbc5
                       1cfe3ae411a74bfb4dd0c0d121309ed61102cc98
                       2ea2ae4506716fc33f1c265151e91791ab8afe73
                       75838c112c1732975751e04a95a230eb15b3a51d
                       141911b612c69cc32c2f71b296d73761fe0452c5
                       5ba8f8451d2d04fb7848f8599d3401c081f5c022
                       edd474c17d6a9914dfc6a0ffcae33fdc247f2df9
                       b2924fd9d2798dfa5a6a0e9916b0c95f08adab40
                       9d3d717c98d7d6b61195f06d9fd8f44f87037f9f
                       f70fbc57ce63d6f373177dfca024adaf5ecc01a4
                       4fffa314510ccb103943a6cd253d3df8121d1b3f
                       ea5997cd063f86a81731a72b82ec1baa0f5d65f7
                       bd0e8d4805598b6291688d3129d793ba918cd431
                       f905b82fe157e039bf65a84403bb5629e0182139
                       23f6371b3b174883745f9f2e0a3ba9998e03f38a
                       fa7bf6b629cd1fe5f4e8774dda009259827b0587
                       50a8adc9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d1:2e:71:af:78:bb:79:80:e3:94:d5:97:8c:d0:29:68:d4:a9:40:e0]
            modulus: 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
    public exponent: 10001

] 
2022-03-20 04:37:06.519  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-20 04:37:06.522 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-20 04:37:06.524 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-20 04:37:06.526 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-20 04:37:06.526  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-20 04:37:06.527  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-20 04:37:06.528  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-20 04:37:06.528 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-20 04:37:06.529 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-20 04:37:06.530 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-20 04:37:06.537 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-20 04:37:06.539 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-20 04:37:06.539 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-20 04:37:06.539 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-20 04:37:06.782  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-20 04:37:06.783  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-20 04:37:06.784 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-20 04:37:06.785 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-20 04:37:06.788  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-20 04:37:06.789  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-20 04:37:06.790 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 04:37:06.790 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 04:37:06.791 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 04:37:06.792 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 04:37:06.793 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 04:37:06.794 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 04:37:06.795 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 04:37:06.796 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 04:37:06.797 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 04:37:06.799 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-20 04:37:06.808 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 104335131105005706299521300063180802303600701538
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Mar 20 03:16:04 UTC 2022
           Final Date: Fri Mar 19 03:16:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:14:2f:9a:8b:9d:3c:97:5a:69:d9:6a:8f:10:23:52:aa:3c:32:20]
            modulus: f6b01b41d5e33341d955531c6f351f12c8dd4032e0efc6189fe5c90af25309435146c30a8bfbea158507a7217ec7b5a913853c4bb735a0804119a35b8a0d10a3daf1e1cd058484eba8bcc0221fb40571d90208038fae4732cd336ad2ef3c3a57767294e5232cc043eb60b1b9095861abe4341a11bba92471747721d474d814bb61f9cdc0ce835b2ebcc2270f8ee13958f47ba667e4830ec279e2c5fb5580c8ea54e1acfbca46bc559d0f941275aad85f30607ea1bd1b3b2e54a0eaab155b33f59f9ea574be3c5c9d8aa99c3ed2d58a2d2de5c792f0c47029420a1a3fe204e9c62afb54e8e2e875b15309bf7e14223ef37cd19f5fdfbde6a48d64c620e455c1c82826d6a0501d21207c8d467f6957dabaf0f4f8eff7b3740ceb99cf8896f74c58976cec53c6672bb5bcf4d56934d053b06ebb168826812707ecc28c63f9bf72a6a198d50b8c14d60f2ab0c8e6d2d51c80a76f47d24b4c96efc74fef30bbb44c43a7e99310cf9233aec0fc2746ce5de4b17e58d565ac151f8fbe0efb2945a4ff4f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1822be73df792972d8487c1ca7315858d8435fa9
                       f6d0f5e648f2e2ad23cb2787320193483db9a70d
                       8864f2b715c6b93ca269639b812419be1245d507
                       f516ffb9cea59c9c96a3c2fafda95278ba5fbbc5
                       1cfe3ae411a74bfb4dd0c0d121309ed61102cc98
                       2ea2ae4506716fc33f1c265151e91791ab8afe73
                       75838c112c1732975751e04a95a230eb15b3a51d
                       141911b612c69cc32c2f71b296d73761fe0452c5
                       5ba8f8451d2d04fb7848f8599d3401c081f5c022
                       edd474c17d6a9914dfc6a0ffcae33fdc247f2df9
                       b2924fd9d2798dfa5a6a0e9916b0c95f08adab40
                       9d3d717c98d7d6b61195f06d9fd8f44f87037f9f
                       f70fbc57ce63d6f373177dfca024adaf5ecc01a4
                       4fffa314510ccb103943a6cd253d3df8121d1b3f
                       ea5997cd063f86a81731a72b82ec1baa0f5d65f7
                       bd0e8d4805598b6291688d3129d793ba918cd431
                       f905b82fe157e039bf65a84403bb5629e0182139
                       23f6371b3b174883745f9f2e0a3ba9998e03f38a
                       fa7bf6b629cd1fe5f4e8774dda009259827b0587
                       50a8adc9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [75:b7:7a:39:d4:53:84:6f:d1:22:09:eb:7f:44:e8:4f:a3:ce:f9:6e]
            modulus: a3bb46c1519a455009d2a72807e1329af48a67a7275809588a108f05fa79354641d884e1d4bd40f45772bbcfe3fa7707f6970b40881ef2483bd1e73e72d1b26a8528ac08564b9002f4bf49701cef42eacd306414a0e3f1d5ab791cd431b7dd2772673feb08cb7b04c94c5bda9e7836fd7993ab5b3a70ca4bba8dbc212e2e32aa86466902114705e8c7678d9f2adf57225d74a043d0d0f18a58989b88ca4d555e872f8bafb69e62cf23b33e88ebce899c6ae39e5a3552d3aa04e1c501e940c03cfa82a75714d16b6c5c2810fce7fa70c0f96e75deac1ca7823edd1325cce564dd154a778b669b61eeb9c9a9494055c464e78a7dd5f60684c5828611e743aca163
    public exponent: 10001

] 
2022-03-20 04:38:18.985  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-20 04:38:18.988 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-20 04:38:18.990 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-20 04:38:18.992 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-20 04:38:18.993  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-20 04:38:18.994  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-20 04:38:18.997  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-20 04:38:18.998 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-20 04:38:18.998 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-20 04:38:18.999 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-20 04:38:19.006 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-20 04:38:19.007 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-20 04:38:19.008 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-20 04:38:19.008 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-20 04:38:19.202  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-20 04:38:19.203  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-20 04:38:19.204 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-20 04:38:19.204 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-20 04:38:19.206  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-20 04:38:19.208  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-20 04:38:19.209 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 04:38:19.209 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 04:38:19.209 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 04:38:19.210 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 04:38:19.210 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 04:38:19.211 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 04:38:19.212 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 04:38:19.212 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 04:38:19.213 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 04:38:19.214 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-20 04:38:19.219 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 104335131105005706299521300063180802303600701538
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Mar 20 03:16:04 UTC 2022
           Final Date: Fri Mar 19 03:16:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:14:2f:9a:8b:9d:3c:97:5a:69:d9:6a:8f:10:23:52:aa:3c:32:20]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1822be73df792972d8487c1ca7315858d8435fa9
                       f6d0f5e648f2e2ad23cb2787320193483db9a70d
                       8864f2b715c6b93ca269639b812419be1245d507
                       f516ffb9cea59c9c96a3c2fafda95278ba5fbbc5
                       1cfe3ae411a74bfb4dd0c0d121309ed61102cc98
                       2ea2ae4506716fc33f1c265151e91791ab8afe73
                       75838c112c1732975751e04a95a230eb15b3a51d
                       141911b612c69cc32c2f71b296d73761fe0452c5
                       5ba8f8451d2d04fb7848f8599d3401c081f5c022
                       edd474c17d6a9914dfc6a0ffcae33fdc247f2df9
                       b2924fd9d2798dfa5a6a0e9916b0c95f08adab40
                       9d3d717c98d7d6b61195f06d9fd8f44f87037f9f
                       f70fbc57ce63d6f373177dfca024adaf5ecc01a4
                       4fffa314510ccb103943a6cd253d3df8121d1b3f
                       ea5997cd063f86a81731a72b82ec1baa0f5d65f7
                       bd0e8d4805598b6291688d3129d793ba918cd431
                       f905b82fe157e039bf65a84403bb5629e0182139
                       23f6371b3b174883745f9f2e0a3ba9998e03f38a
                       fa7bf6b629cd1fe5f4e8774dda009259827b0587
                       50a8adc9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [46:ff:61:44:ef:d5:d1:44:bd:9d:43:28:c3:0f:15:99:ca:ff:59:83]
            modulus: de6dcd56dc4c2a92960cb2043c8897040b741e541eb835731e77ee2fec1adc9b887fa0e559bb7249df07c3eb550f29f759eea40f57d753f6c494fcc4f71e8e8acd3b980d867c9c0a2c313ae5782a3d5b7310fa3af4e3108cb1f8161ac2503a154a78f4c151995c43252be5aab6f67c29ad8104b476f36d83f6636d816df8999270f65c7ca3a104365c78fbeb32c94daadba5a965c9ff5cb7d8aad0d424b39e55f1f756a369ff52589e0359e0919063a6ca4653d9fb7f16d7afde8c9c9e3180ea9fca70d68a303ce8668edbca29498e14db99817c974a248f4d443fc74b410b8155a1a07107df5e668ef415b8ec920279f82c6544d62b0d3c26c0a22d04a0230b
    public exponent: 10001

] 
2022-03-20 04:38:52.040  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-20 04:38:52.042 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-20 04:38:52.044 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-20 04:38:52.049 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-20 04:38:52.050  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-20 04:38:52.051  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-20 04:38:52.052  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-20 04:38:52.053 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-20 04:38:52.053 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-20 04:38:52.054 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-20 04:38:52.064 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-20 04:38:52.066 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-20 04:38:52.066 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-20 04:38:52.067 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-20 04:38:52.252  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-20 04:38:52.253  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-20 04:38:52.254 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-20 04:38:52.254 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-20 04:38:52.257  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-20 04:38:52.258  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-20 04:38:52.259 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 04:38:52.259 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 04:38:52.259 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 04:38:52.260 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 04:38:52.261 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 04:38:52.261 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 04:38:52.262 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 04:38:52.262 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 04:38:52.262 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 04:38:52.263 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-20 04:38:52.270 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 104335131105005706299521300063180802303600701538
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Mar 20 03:16:04 UTC 2022
           Final Date: Fri Mar 19 03:16:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:14:2f:9a:8b:9d:3c:97:5a:69:d9:6a:8f:10:23:52:aa:3c:32:20]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1822be73df792972d8487c1ca7315858d8435fa9
                       f6d0f5e648f2e2ad23cb2787320193483db9a70d
                       8864f2b715c6b93ca269639b812419be1245d507
                       f516ffb9cea59c9c96a3c2fafda95278ba5fbbc5
                       1cfe3ae411a74bfb4dd0c0d121309ed61102cc98
                       2ea2ae4506716fc33f1c265151e91791ab8afe73
                       75838c112c1732975751e04a95a230eb15b3a51d
                       141911b612c69cc32c2f71b296d73761fe0452c5
                       5ba8f8451d2d04fb7848f8599d3401c081f5c022
                       edd474c17d6a9914dfc6a0ffcae33fdc247f2df9
                       b2924fd9d2798dfa5a6a0e9916b0c95f08adab40
                       9d3d717c98d7d6b61195f06d9fd8f44f87037f9f
                       f70fbc57ce63d6f373177dfca024adaf5ecc01a4
                       4fffa314510ccb103943a6cd253d3df8121d1b3f
                       ea5997cd063f86a81731a72b82ec1baa0f5d65f7
                       bd0e8d4805598b6291688d3129d793ba918cd431
                       f905b82fe157e039bf65a84403bb5629e0182139
                       23f6371b3b174883745f9f2e0a3ba9998e03f38a
                       fa7bf6b629cd1fe5f4e8774dda009259827b0587
                       50a8adc9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [11:31:98:f3:29:b7:ab:e0:25:6e:4b:10:b4:70:f1:21:71:a7:da:0f]
            modulus: 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
    public exponent: 10001

] 
2022-03-20 04:39:28.763  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-20 04:39:28.765 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-20 04:39:28.768 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-20 04:39:28.769 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-20 04:39:28.769  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-20 04:39:28.770  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-20 04:39:28.771  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-20 04:39:28.771 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-20 04:39:28.772 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-20 04:39:28.772 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-20 04:39:28.777 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-20 04:39:28.778 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-20 04:39:28.779 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-20 04:39:28.779 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-20 04:39:28.960  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-20 04:39:28.961  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-20 04:39:28.961 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-20 04:39:28.962 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-20 04:39:28.963  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-20 04:39:28.964  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-20 04:39:28.965 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 04:39:28.965 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 04:39:28.966 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 04:39:28.966 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 04:39:28.967 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 04:39:28.969 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 04:39:28.970 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 04:39:28.971 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 04:39:28.971 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 04:39:28.973 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-20 04:39:28.979 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 104335131105005706299521300063180802303600701538
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Mar 20 03:16:04 UTC 2022
           Final Date: Fri Mar 19 03:16:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:14:2f:9a:8b:9d:3c:97:5a:69:d9:6a:8f:10:23:52:aa:3c:32:20]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1822be73df792972d8487c1ca7315858d8435fa9
                       f6d0f5e648f2e2ad23cb2787320193483db9a70d
                       8864f2b715c6b93ca269639b812419be1245d507
                       f516ffb9cea59c9c96a3c2fafda95278ba5fbbc5
                       1cfe3ae411a74bfb4dd0c0d121309ed61102cc98
                       2ea2ae4506716fc33f1c265151e91791ab8afe73
                       75838c112c1732975751e04a95a230eb15b3a51d
                       141911b612c69cc32c2f71b296d73761fe0452c5
                       5ba8f8451d2d04fb7848f8599d3401c081f5c022
                       edd474c17d6a9914dfc6a0ffcae33fdc247f2df9
                       b2924fd9d2798dfa5a6a0e9916b0c95f08adab40
                       9d3d717c98d7d6b61195f06d9fd8f44f87037f9f
                       f70fbc57ce63d6f373177dfca024adaf5ecc01a4
                       4fffa314510ccb103943a6cd253d3df8121d1b3f
                       ea5997cd063f86a81731a72b82ec1baa0f5d65f7
                       bd0e8d4805598b6291688d3129d793ba918cd431
                       f905b82fe157e039bf65a84403bb5629e0182139
                       23f6371b3b174883745f9f2e0a3ba9998e03f38a
                       fa7bf6b629cd1fe5f4e8774dda009259827b0587
                       50a8adc9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f1:19:dd:76:54:cc:c7:d2:e9:8a:78:fa:e5:3f:5b:da:b8:e5:0f:8d]
            modulus: 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
    public exponent: 10001

] 
2022-03-20 04:39:39.675  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-20 04:39:39.676 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-20 04:39:39.678 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-03-20 04:39:39.679 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-20 04:39:39.680  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-03-20 04:39:39.680  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-20 04:39:39.681  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-20 04:39:39.682 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-20 04:39:39.682 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-20 04:39:39.683 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-20 04:39:39.689 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-20 04:39:39.690 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-20 04:39:39.690 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-20 04:39:39.690 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-20 04:39:39.862  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-20 04:39:39.863  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-20 04:39:39.863 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-20 04:39:39.864 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-20 04:39:39.866  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-20 04:39:39.866  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-20 04:39:39.867 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 04:39:39.867 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 04:39:39.868 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 04:39:39.869 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 04:39:39.869 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 04:39:39.869 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 04:39:39.870 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 04:39:39.870 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 04:39:39.871 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 04:39:39.872 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-20 04:39:39.876 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 104335131105005706299521300063180802303600701538
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Mar 20 03:16:04 UTC 2022
           Final Date: Fri Mar 19 03:16:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:14:2f:9a:8b:9d:3c:97:5a:69:d9:6a:8f:10:23:52:aa:3c:32:20]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1822be73df792972d8487c1ca7315858d8435fa9
                       f6d0f5e648f2e2ad23cb2787320193483db9a70d
                       8864f2b715c6b93ca269639b812419be1245d507
                       f516ffb9cea59c9c96a3c2fafda95278ba5fbbc5
                       1cfe3ae411a74bfb4dd0c0d121309ed61102cc98
                       2ea2ae4506716fc33f1c265151e91791ab8afe73
                       75838c112c1732975751e04a95a230eb15b3a51d
                       141911b612c69cc32c2f71b296d73761fe0452c5
                       5ba8f8451d2d04fb7848f8599d3401c081f5c022
                       edd474c17d6a9914dfc6a0ffcae33fdc247f2df9
                       b2924fd9d2798dfa5a6a0e9916b0c95f08adab40
                       9d3d717c98d7d6b61195f06d9fd8f44f87037f9f
                       f70fbc57ce63d6f373177dfca024adaf5ecc01a4
                       4fffa314510ccb103943a6cd253d3df8121d1b3f
                       ea5997cd063f86a81731a72b82ec1baa0f5d65f7
                       bd0e8d4805598b6291688d3129d793ba918cd431
                       f905b82fe157e039bf65a84403bb5629e0182139
                       23f6371b3b174883745f9f2e0a3ba9998e03f38a
                       fa7bf6b629cd1fe5f4e8774dda009259827b0587
                       50a8adc9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [38:e6:05:3a:8c:a6:08:c4:31:a4:be:00:16:36:fa:c5:de:1d:6f:9d]
            modulus: 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
    public exponent: 10001

] 
2022-03-20 04:41:36.657  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-20 04:41:36.664 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-20 04:41:36.666 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-20 04:41:36.667 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-20 04:41:36.667  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-20 04:41:36.668  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-20 04:41:36.672  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-20 04:41:36.673 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-20 04:41:36.673 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-20 04:41:36.674 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-20 04:41:36.686 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-20 04:41:36.687 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-20 04:41:36.687 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-20 04:41:36.687 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-20 04:41:36.866  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-20 04:41:36.867  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-20 04:41:36.868 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-20 04:41:36.868 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-20 04:41:36.870  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-20 04:41:36.871  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-20 04:41:36.871 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 04:41:36.872 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 04:41:36.872 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 04:41:36.873 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 04:41:36.874 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 04:41:36.874 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 04:41:36.875 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 04:41:36.875 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 04:41:36.875 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 04:41:36.877 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-20 04:41:36.883 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 104335131105005706299521300063180802303600701538
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Mar 20 03:16:04 UTC 2022
           Final Date: Fri Mar 19 03:16:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:14:2f:9a:8b:9d:3c:97:5a:69:d9:6a:8f:10:23:52:aa:3c:32:20]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1822be73df792972d8487c1ca7315858d8435fa9
                       f6d0f5e648f2e2ad23cb2787320193483db9a70d
                       8864f2b715c6b93ca269639b812419be1245d507
                       f516ffb9cea59c9c96a3c2fafda95278ba5fbbc5
                       1cfe3ae411a74bfb4dd0c0d121309ed61102cc98
                       2ea2ae4506716fc33f1c265151e91791ab8afe73
                       75838c112c1732975751e04a95a230eb15b3a51d
                       141911b612c69cc32c2f71b296d73761fe0452c5
                       5ba8f8451d2d04fb7848f8599d3401c081f5c022
                       edd474c17d6a9914dfc6a0ffcae33fdc247f2df9
                       b2924fd9d2798dfa5a6a0e9916b0c95f08adab40
                       9d3d717c98d7d6b61195f06d9fd8f44f87037f9f
                       f70fbc57ce63d6f373177dfca024adaf5ecc01a4
                       4fffa314510ccb103943a6cd253d3df8121d1b3f
                       ea5997cd063f86a81731a72b82ec1baa0f5d65f7
                       bd0e8d4805598b6291688d3129d793ba918cd431
                       f905b82fe157e039bf65a84403bb5629e0182139
                       23f6371b3b174883745f9f2e0a3ba9998e03f38a
                       fa7bf6b629cd1fe5f4e8774dda009259827b0587
                       50a8adc9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [eb:cd:59:4b:b0:e4:aa:d1:a6:55:3f:af:03:a3:c5:b1:2d:db:3e:b0]
            modulus: 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
    public exponent: 10001

] 
2022-03-20 04:56:26.224  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-20 04:56:26.227 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-20 04:56:26.229 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-20 04:56:26.230 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-20 04:56:26.231  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-20 04:56:26.231  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-20 04:56:26.232  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-20 04:56:26.232 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-20 04:56:26.233 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-20 04:56:26.233 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-20 04:56:26.239 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-20 04:56:26.241 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-20 04:56:26.241 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-20 04:56:26.241 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-20 04:56:26.417  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-20 04:56:26.418  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-20 04:56:26.419 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-20 04:56:26.419 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-20 04:56:26.421  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-20 04:56:26.422  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-20 04:56:26.422 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 04:56:26.423 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 04:56:26.423 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 04:56:26.424 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 04:56:26.425 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 04:56:26.425 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 04:56:26.426 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 04:56:26.426 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 04:56:26.427 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 04:56:26.427 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-20 04:56:26.432 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 104335131105005706299521300063180802303600701538
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Mar 20 03:16:04 UTC 2022
           Final Date: Fri Mar 19 03:16:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:14:2f:9a:8b:9d:3c:97:5a:69:d9:6a:8f:10:23:52:aa:3c:32:20]
            modulus: f6b01b41d5e33341d955531c6f351f12c8dd4032e0efc6189fe5c90af25309435146c30a8bfbea158507a7217ec7b5a913853c4bb735a0804119a35b8a0d10a3daf1e1cd058484eba8bcc0221fb40571d90208038fae4732cd336ad2ef3c3a57767294e5232cc043eb60b1b9095861abe4341a11bba92471747721d474d814bb61f9cdc0ce835b2ebcc2270f8ee13958f47ba667e4830ec279e2c5fb5580c8ea54e1acfbca46bc559d0f941275aad85f30607ea1bd1b3b2e54a0eaab155b33f59f9ea574be3c5c9d8aa99c3ed2d58a2d2de5c792f0c47029420a1a3fe204e9c62afb54e8e2e875b15309bf7e14223ef37cd19f5fdfbde6a48d64c620e455c1c82826d6a0501d21207c8d467f6957dabaf0f4f8eff7b3740ceb99cf8896f74c58976cec53c6672bb5bcf4d56934d053b06ebb168826812707ecc28c63f9bf72a6a198d50b8c14d60f2ab0c8e6d2d51c80a76f47d24b4c96efc74fef30bbb44c43a7e99310cf9233aec0fc2746ce5de4b17e58d565ac151f8fbe0efb2945a4ff4f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1822be73df792972d8487c1ca7315858d8435fa9
                       f6d0f5e648f2e2ad23cb2787320193483db9a70d
                       8864f2b715c6b93ca269639b812419be1245d507
                       f516ffb9cea59c9c96a3c2fafda95278ba5fbbc5
                       1cfe3ae411a74bfb4dd0c0d121309ed61102cc98
                       2ea2ae4506716fc33f1c265151e91791ab8afe73
                       75838c112c1732975751e04a95a230eb15b3a51d
                       141911b612c69cc32c2f71b296d73761fe0452c5
                       5ba8f8451d2d04fb7848f8599d3401c081f5c022
                       edd474c17d6a9914dfc6a0ffcae33fdc247f2df9
                       b2924fd9d2798dfa5a6a0e9916b0c95f08adab40
                       9d3d717c98d7d6b61195f06d9fd8f44f87037f9f
                       f70fbc57ce63d6f373177dfca024adaf5ecc01a4
                       4fffa314510ccb103943a6cd253d3df8121d1b3f
                       ea5997cd063f86a81731a72b82ec1baa0f5d65f7
                       bd0e8d4805598b6291688d3129d793ba918cd431
                       f905b82fe157e039bf65a84403bb5629e0182139
                       23f6371b3b174883745f9f2e0a3ba9998e03f38a
                       fa7bf6b629cd1fe5f4e8774dda009259827b0587
                       50a8adc9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5f:ee:2e:02:50:99:a3:f3:df:61:db:81:78:1a:10:c1:d8:31:0d:8f]
            modulus: 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
    public exponent: 10001

] 
2022-03-20 05:00:21.435  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-20 05:00:21.438 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-20 05:00:21.442 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-20 05:00:21.444 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-20 05:00:21.444  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-20 05:00:21.445  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-20 05:00:21.446  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-20 05:00:21.446 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-20 05:00:21.447 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-20 05:00:21.447 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-20 05:00:21.456 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-20 05:00:21.458 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-20 05:00:21.458 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-20 05:00:21.458 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-20 05:00:21.676  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-20 05:00:21.677  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-20 05:00:21.678 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-20 05:00:21.678 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-20 05:00:21.680  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-20 05:00:21.680  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-20 05:00:21.680 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 05:00:21.681 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 05:00:21.681 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 05:00:21.682 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 05:00:21.682 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 05:00:21.682 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 05:00:21.683 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 05:00:21.683 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 05:00:21.683 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 05:00:21.684 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-20 05:00:21.689 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 104335131105005706299521300063180802303600701538
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Mar 20 03:16:04 UTC 2022
           Final Date: Fri Mar 19 03:16:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:14:2f:9a:8b:9d:3c:97:5a:69:d9:6a:8f:10:23:52:aa:3c:32:20]
            modulus: f6b01b41d5e33341d955531c6f351f12c8dd4032e0efc6189fe5c90af25309435146c30a8bfbea158507a7217ec7b5a913853c4bb735a0804119a35b8a0d10a3daf1e1cd058484eba8bcc0221fb40571d90208038fae4732cd336ad2ef3c3a57767294e5232cc043eb60b1b9095861abe4341a11bba92471747721d474d814bb61f9cdc0ce835b2ebcc2270f8ee13958f47ba667e4830ec279e2c5fb5580c8ea54e1acfbca46bc559d0f941275aad85f30607ea1bd1b3b2e54a0eaab155b33f59f9ea574be3c5c9d8aa99c3ed2d58a2d2de5c792f0c47029420a1a3fe204e9c62afb54e8e2e875b15309bf7e14223ef37cd19f5fdfbde6a48d64c620e455c1c82826d6a0501d21207c8d467f6957dabaf0f4f8eff7b3740ceb99cf8896f74c58976cec53c6672bb5bcf4d56934d053b06ebb168826812707ecc28c63f9bf72a6a198d50b8c14d60f2ab0c8e6d2d51c80a76f47d24b4c96efc74fef30bbb44c43a7e99310cf9233aec0fc2746ce5de4b17e58d565ac151f8fbe0efb2945a4ff4f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1822be73df792972d8487c1ca7315858d8435fa9
                       f6d0f5e648f2e2ad23cb2787320193483db9a70d
                       8864f2b715c6b93ca269639b812419be1245d507
                       f516ffb9cea59c9c96a3c2fafda95278ba5fbbc5
                       1cfe3ae411a74bfb4dd0c0d121309ed61102cc98
                       2ea2ae4506716fc33f1c265151e91791ab8afe73
                       75838c112c1732975751e04a95a230eb15b3a51d
                       141911b612c69cc32c2f71b296d73761fe0452c5
                       5ba8f8451d2d04fb7848f8599d3401c081f5c022
                       edd474c17d6a9914dfc6a0ffcae33fdc247f2df9
                       b2924fd9d2798dfa5a6a0e9916b0c95f08adab40
                       9d3d717c98d7d6b61195f06d9fd8f44f87037f9f
                       f70fbc57ce63d6f373177dfca024adaf5ecc01a4
                       4fffa314510ccb103943a6cd253d3df8121d1b3f
                       ea5997cd063f86a81731a72b82ec1baa0f5d65f7
                       bd0e8d4805598b6291688d3129d793ba918cd431
                       f905b82fe157e039bf65a84403bb5629e0182139
                       23f6371b3b174883745f9f2e0a3ba9998e03f38a
                       fa7bf6b629cd1fe5f4e8774dda009259827b0587
                       50a8adc9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [92:b8:a7:8c:54:c4:b0:49:45:2e:b3:27:00:8d:fe:9e:13:1a:15:9b]
            modulus: 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
    public exponent: 10001

] 
2022-03-20 05:00:36.806  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-20 05:00:36.808 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-20 05:00:36.811 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-20 05:00:36.812 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-20 05:00:36.812  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-20 05:00:36.813  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-20 05:00:36.814  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-20 05:00:36.814 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-20 05:00:36.815 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-20 05:00:36.815 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-20 05:00:36.821 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-20 05:00:36.822 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-20 05:00:36.822 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-20 05:00:36.822 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-20 05:00:37.027  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-20 05:00:37.028  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-20 05:00:37.028 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-20 05:00:37.029 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-20 05:00:37.031  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-20 05:00:37.031  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-20 05:00:37.032 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 05:00:37.034 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 05:00:37.034 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 05:00:37.036 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 05:00:37.036 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 05:00:37.037 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 05:00:37.037 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 05:00:37.038 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 05:00:37.038 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 05:00:37.040 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-20 05:00:37.045 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 104335131105005706299521300063180802303600701538
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Mar 20 03:16:04 UTC 2022
           Final Date: Fri Mar 19 03:16:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:14:2f:9a:8b:9d:3c:97:5a:69:d9:6a:8f:10:23:52:aa:3c:32:20]
            modulus: f6b01b41d5e33341d955531c6f351f12c8dd4032e0efc6189fe5c90af25309435146c30a8bfbea158507a7217ec7b5a913853c4bb735a0804119a35b8a0d10a3daf1e1cd058484eba8bcc0221fb40571d90208038fae4732cd336ad2ef3c3a57767294e5232cc043eb60b1b9095861abe4341a11bba92471747721d474d814bb61f9cdc0ce835b2ebcc2270f8ee13958f47ba667e4830ec279e2c5fb5580c8ea54e1acfbca46bc559d0f941275aad85f30607ea1bd1b3b2e54a0eaab155b33f59f9ea574be3c5c9d8aa99c3ed2d58a2d2de5c792f0c47029420a1a3fe204e9c62afb54e8e2e875b15309bf7e14223ef37cd19f5fdfbde6a48d64c620e455c1c82826d6a0501d21207c8d467f6957dabaf0f4f8eff7b3740ceb99cf8896f74c58976cec53c6672bb5bcf4d56934d053b06ebb168826812707ecc28c63f9bf72a6a198d50b8c14d60f2ab0c8e6d2d51c80a76f47d24b4c96efc74fef30bbb44c43a7e99310cf9233aec0fc2746ce5de4b17e58d565ac151f8fbe0efb2945a4ff4f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1822be73df792972d8487c1ca7315858d8435fa9
                       f6d0f5e648f2e2ad23cb2787320193483db9a70d
                       8864f2b715c6b93ca269639b812419be1245d507
                       f516ffb9cea59c9c96a3c2fafda95278ba5fbbc5
                       1cfe3ae411a74bfb4dd0c0d121309ed61102cc98
                       2ea2ae4506716fc33f1c265151e91791ab8afe73
                       75838c112c1732975751e04a95a230eb15b3a51d
                       141911b612c69cc32c2f71b296d73761fe0452c5
                       5ba8f8451d2d04fb7848f8599d3401c081f5c022
                       edd474c17d6a9914dfc6a0ffcae33fdc247f2df9
                       b2924fd9d2798dfa5a6a0e9916b0c95f08adab40
                       9d3d717c98d7d6b61195f06d9fd8f44f87037f9f
                       f70fbc57ce63d6f373177dfca024adaf5ecc01a4
                       4fffa314510ccb103943a6cd253d3df8121d1b3f
                       ea5997cd063f86a81731a72b82ec1baa0f5d65f7
                       bd0e8d4805598b6291688d3129d793ba918cd431
                       f905b82fe157e039bf65a84403bb5629e0182139
                       23f6371b3b174883745f9f2e0a3ba9998e03f38a
                       fa7bf6b629cd1fe5f4e8774dda009259827b0587
                       50a8adc9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [18:a8:b0:35:4c:4a:11:0a:59:e1:59:12:6d:5c:6d:5d:9d:09:4b:24]
            modulus: cdc684105e5c2f678ff83ade3985cc5b1ce510639d7950609828974209c66986e6df5909ec7b4c5d10680653da423ed80c2cfee963605bf93d05fa965dad092c27923bf922d069d1414500226cc516ba64ea49cbfdcb6d90fded0688973e54d22007020b0d5cac07f92ee96236bb04acdcd335eb355a5ee381b8dfca984366dfe4a30609fbbe2b08ab6f703b283b5ca677e0442889aecb58ad7895be575fe2e59d1c0650a5b6512bf46240a7cfedc71ead9a7bc3a5d8819c528e3b6d9910467ca095c0bc171f27d5b941e39db5e9da04e9ac15569c4ed8aed49f4c39514ccae78080558cc57fd803eb30ee9e2081cf12e4d10c4f30d3905cbf1e8d066cf212dd
    public exponent: 10001

] 
2022-03-20 05:01:14.204  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-20 05:01:14.205 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-20 05:01:14.207 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-20 05:01:14.207 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-20 05:01:14.208  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-03-20 05:01:14.208  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-20 05:01:14.209  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-20 05:01:14.209 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-20 05:01:14.210 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-20 05:01:14.210 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-20 05:01:14.215 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-20 05:01:14.216 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-20 05:01:14.217 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-20 05:01:14.217 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-20 05:01:14.429  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-20 05:01:14.429  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-20 05:01:14.430 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-20 05:01:14.430 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-20 05:01:14.432  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-20 05:01:14.433  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-20 05:01:14.434 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 05:01:14.434 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 05:01:14.435 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 05:01:14.436 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 05:01:14.436 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 05:01:14.437 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 05:01:14.438 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 05:01:14.438 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 05:01:14.439 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 05:01:14.440 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-20 05:01:14.444 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 104335131105005706299521300063180802303600701538
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Mar 20 03:16:04 UTC 2022
           Final Date: Fri Mar 19 03:16:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:14:2f:9a:8b:9d:3c:97:5a:69:d9:6a:8f:10:23:52:aa:3c:32:20]
            modulus: f6b01b41d5e33341d955531c6f351f12c8dd4032e0efc6189fe5c90af25309435146c30a8bfbea158507a7217ec7b5a913853c4bb735a0804119a35b8a0d10a3daf1e1cd058484eba8bcc0221fb40571d90208038fae4732cd336ad2ef3c3a57767294e5232cc043eb60b1b9095861abe4341a11bba92471747721d474d814bb61f9cdc0ce835b2ebcc2270f8ee13958f47ba667e4830ec279e2c5fb5580c8ea54e1acfbca46bc559d0f941275aad85f30607ea1bd1b3b2e54a0eaab155b33f59f9ea574be3c5c9d8aa99c3ed2d58a2d2de5c792f0c47029420a1a3fe204e9c62afb54e8e2e875b15309bf7e14223ef37cd19f5fdfbde6a48d64c620e455c1c82826d6a0501d21207c8d467f6957dabaf0f4f8eff7b3740ceb99cf8896f74c58976cec53c6672bb5bcf4d56934d053b06ebb168826812707ecc28c63f9bf72a6a198d50b8c14d60f2ab0c8e6d2d51c80a76f47d24b4c96efc74fef30bbb44c43a7e99310cf9233aec0fc2746ce5de4b17e58d565ac151f8fbe0efb2945a4ff4f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1822be73df792972d8487c1ca7315858d8435fa9
                       f6d0f5e648f2e2ad23cb2787320193483db9a70d
                       8864f2b715c6b93ca269639b812419be1245d507
                       f516ffb9cea59c9c96a3c2fafda95278ba5fbbc5
                       1cfe3ae411a74bfb4dd0c0d121309ed61102cc98
                       2ea2ae4506716fc33f1c265151e91791ab8afe73
                       75838c112c1732975751e04a95a230eb15b3a51d
                       141911b612c69cc32c2f71b296d73761fe0452c5
                       5ba8f8451d2d04fb7848f8599d3401c081f5c022
                       edd474c17d6a9914dfc6a0ffcae33fdc247f2df9
                       b2924fd9d2798dfa5a6a0e9916b0c95f08adab40
                       9d3d717c98d7d6b61195f06d9fd8f44f87037f9f
                       f70fbc57ce63d6f373177dfca024adaf5ecc01a4
                       4fffa314510ccb103943a6cd253d3df8121d1b3f
                       ea5997cd063f86a81731a72b82ec1baa0f5d65f7
                       bd0e8d4805598b6291688d3129d793ba918cd431
                       f905b82fe157e039bf65a84403bb5629e0182139
                       23f6371b3b174883745f9f2e0a3ba9998e03f38a
                       fa7bf6b629cd1fe5f4e8774dda009259827b0587
                       50a8adc9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e1:83:06:90:5f:8b:93:21:06:76:36:07:0b:aa:70:ad:af:48:38:0c]
            modulus: c010400ca9116b7c92f6ed66d73eef7a270b933a0074f5bc543e41c2b151dca58a7b2db5d34746715ae80702defc2b45dfa8f8f153a19905788b1f1cf527a85cd57cd35f3bd2d2f2af96b5e122149176763920b18c3f7558ff5dcddec6b862b11091b6fd8af361ecfd818674d6e00ef36603c3024541f3a9e7db734ca5f699a84541999fa46ae6abe35db2a6292aeef30dd5d310922fde4e80bc0aca32bcb90e44cd28b5984cd63ead953408ac10925492af1a6683c2c70877bedcc2d87bb4fafbd0b0dd10439eaa2ba00a85bf4878f8b4bcea3838baaf587eb28d800aee2a74ce8f974ef67389a6e77879155b81f2e780e6a015ef7679b96d591bcebb37a171
    public exponent: 10001

] 
2022-03-20 05:01:54.976  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-20 05:01:54.979 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-20 05:01:54.984 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-20 05:01:54.985 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-20 05:01:54.986  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-03-20 05:01:54.987  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-20 05:01:54.988  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-20 05:01:54.988 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-20 05:01:54.989 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-20 05:01:54.989 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-20 05:01:54.997 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-20 05:01:54.998 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-20 05:01:54.998 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-20 05:01:54.999 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-20 05:01:55.205  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-20 05:01:55.207  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-20 05:01:55.207 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-20 05:01:55.207 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-20 05:01:55.238  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-20 05:01:55.239  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-20 05:01:55.240 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 05:01:55.241 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 05:01:55.241 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 05:01:55.242 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 05:01:55.243 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 05:01:55.243 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 05:01:55.245 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 05:01:55.246 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 05:01:55.246 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 05:01:55.247 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-20 05:01:55.253 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 104335131105005706299521300063180802303600701538
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Mar 20 03:16:04 UTC 2022
           Final Date: Fri Mar 19 03:16:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:14:2f:9a:8b:9d:3c:97:5a:69:d9:6a:8f:10:23:52:aa:3c:32:20]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1822be73df792972d8487c1ca7315858d8435fa9
                       f6d0f5e648f2e2ad23cb2787320193483db9a70d
                       8864f2b715c6b93ca269639b812419be1245d507
                       f516ffb9cea59c9c96a3c2fafda95278ba5fbbc5
                       1cfe3ae411a74bfb4dd0c0d121309ed61102cc98
                       2ea2ae4506716fc33f1c265151e91791ab8afe73
                       75838c112c1732975751e04a95a230eb15b3a51d
                       141911b612c69cc32c2f71b296d73761fe0452c5
                       5ba8f8451d2d04fb7848f8599d3401c081f5c022
                       edd474c17d6a9914dfc6a0ffcae33fdc247f2df9
                       b2924fd9d2798dfa5a6a0e9916b0c95f08adab40
                       9d3d717c98d7d6b61195f06d9fd8f44f87037f9f
                       f70fbc57ce63d6f373177dfca024adaf5ecc01a4
                       4fffa314510ccb103943a6cd253d3df8121d1b3f
                       ea5997cd063f86a81731a72b82ec1baa0f5d65f7
                       bd0e8d4805598b6291688d3129d793ba918cd431
                       f905b82fe157e039bf65a84403bb5629e0182139
                       23f6371b3b174883745f9f2e0a3ba9998e03f38a
                       fa7bf6b629cd1fe5f4e8774dda009259827b0587
                       50a8adc9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8e:ae:7e:45:90:fd:6d:6e:21:8d:81:a0:25:00:f5:ca:15:6e:5b:df]
            modulus: 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
    public exponent: 10001

] 
2022-03-20 05:04:27.063  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-20 05:04:27.064 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-20 05:04:27.066 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-20 05:04:27.067 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-20 05:04:27.067  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-03-20 05:04:27.068  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-20 05:04:27.069  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-20 05:04:27.069 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-20 05:04:27.069 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-20 05:04:27.070 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-20 05:04:27.075 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-20 05:04:27.076 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-20 05:04:27.076 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-20 05:04:27.077 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-20 05:04:27.295  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-20 05:04:27.295  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-20 05:04:27.296 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-20 05:04:27.296 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-20 05:04:27.297  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-20 05:04:27.298  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-20 05:04:27.298 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 05:04:27.299 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 05:04:27.299 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 05:04:27.300 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 05:04:27.300 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 05:04:27.301 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 05:04:27.302 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 05:04:27.302 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 05:04:27.302 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 05:04:27.303 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-20 05:04:27.308 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 104335131105005706299521300063180802303600701538
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Mar 20 03:16:04 UTC 2022
           Final Date: Fri Mar 19 03:16:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:14:2f:9a:8b:9d:3c:97:5a:69:d9:6a:8f:10:23:52:aa:3c:32:20]
            modulus: f6b01b41d5e33341d955531c6f351f12c8dd4032e0efc6189fe5c90af25309435146c30a8bfbea158507a7217ec7b5a913853c4bb735a0804119a35b8a0d10a3daf1e1cd058484eba8bcc0221fb40571d90208038fae4732cd336ad2ef3c3a57767294e5232cc043eb60b1b9095861abe4341a11bba92471747721d474d814bb61f9cdc0ce835b2ebcc2270f8ee13958f47ba667e4830ec279e2c5fb5580c8ea54e1acfbca46bc559d0f941275aad85f30607ea1bd1b3b2e54a0eaab155b33f59f9ea574be3c5c9d8aa99c3ed2d58a2d2de5c792f0c47029420a1a3fe204e9c62afb54e8e2e875b15309bf7e14223ef37cd19f5fdfbde6a48d64c620e455c1c82826d6a0501d21207c8d467f6957dabaf0f4f8eff7b3740ceb99cf8896f74c58976cec53c6672bb5bcf4d56934d053b06ebb168826812707ecc28c63f9bf72a6a198d50b8c14d60f2ab0c8e6d2d51c80a76f47d24b4c96efc74fef30bbb44c43a7e99310cf9233aec0fc2746ce5de4b17e58d565ac151f8fbe0efb2945a4ff4f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1822be73df792972d8487c1ca7315858d8435fa9
                       f6d0f5e648f2e2ad23cb2787320193483db9a70d
                       8864f2b715c6b93ca269639b812419be1245d507
                       f516ffb9cea59c9c96a3c2fafda95278ba5fbbc5
                       1cfe3ae411a74bfb4dd0c0d121309ed61102cc98
                       2ea2ae4506716fc33f1c265151e91791ab8afe73
                       75838c112c1732975751e04a95a230eb15b3a51d
                       141911b612c69cc32c2f71b296d73761fe0452c5
                       5ba8f8451d2d04fb7848f8599d3401c081f5c022
                       edd474c17d6a9914dfc6a0ffcae33fdc247f2df9
                       b2924fd9d2798dfa5a6a0e9916b0c95f08adab40
                       9d3d717c98d7d6b61195f06d9fd8f44f87037f9f
                       f70fbc57ce63d6f373177dfca024adaf5ecc01a4
                       4fffa314510ccb103943a6cd253d3df8121d1b3f
                       ea5997cd063f86a81731a72b82ec1baa0f5d65f7
                       bd0e8d4805598b6291688d3129d793ba918cd431
                       f905b82fe157e039bf65a84403bb5629e0182139
                       23f6371b3b174883745f9f2e0a3ba9998e03f38a
                       fa7bf6b629cd1fe5f4e8774dda009259827b0587
                       50a8adc9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5a:fb:24:df:af:ef:9f:6f:8e:1c:f2:2e:23:d9:b9:4c:db:cb:3c:ed]
            modulus: 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
    public exponent: 10001

] 
2022-03-20 05:06:06.322  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-20 05:06:06.324 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-20 05:06:06.326 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-20 05:06:06.327 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-20 05:06:06.328  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-03-20 05:06:06.329  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-20 05:06:06.329  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-20 05:06:06.329 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-20 05:06:06.330 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-20 05:06:06.330 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-20 05:06:06.339 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-20 05:06:06.340 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-20 05:06:06.340 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-20 05:06:06.341 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-20 05:06:06.594  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-20 05:06:06.595  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-20 05:06:06.596 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-20 05:06:06.596 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-20 05:06:06.599  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-20 05:06:06.600  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-20 05:06:06.601 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 05:06:06.601 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 05:06:06.601 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 05:06:06.602 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 05:06:06.603 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 05:06:06.603 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 05:06:06.604 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 05:06:06.606 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 05:06:06.607 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 05:06:06.608 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-20 05:06:06.615 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 104335131105005706299521300063180802303600701538
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Mar 20 03:16:04 UTC 2022
           Final Date: Fri Mar 19 03:16:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:14:2f:9a:8b:9d:3c:97:5a:69:d9:6a:8f:10:23:52:aa:3c:32:20]
            modulus: f6b01b41d5e33341d955531c6f351f12c8dd4032e0efc6189fe5c90af25309435146c30a8bfbea158507a7217ec7b5a913853c4bb735a0804119a35b8a0d10a3daf1e1cd058484eba8bcc0221fb40571d90208038fae4732cd336ad2ef3c3a57767294e5232cc043eb60b1b9095861abe4341a11bba92471747721d474d814bb61f9cdc0ce835b2ebcc2270f8ee13958f47ba667e4830ec279e2c5fb5580c8ea54e1acfbca46bc559d0f941275aad85f30607ea1bd1b3b2e54a0eaab155b33f59f9ea574be3c5c9d8aa99c3ed2d58a2d2de5c792f0c47029420a1a3fe204e9c62afb54e8e2e875b15309bf7e14223ef37cd19f5fdfbde6a48d64c620e455c1c82826d6a0501d21207c8d467f6957dabaf0f4f8eff7b3740ceb99cf8896f74c58976cec53c6672bb5bcf4d56934d053b06ebb168826812707ecc28c63f9bf72a6a198d50b8c14d60f2ab0c8e6d2d51c80a76f47d24b4c96efc74fef30bbb44c43a7e99310cf9233aec0fc2746ce5de4b17e58d565ac151f8fbe0efb2945a4ff4f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1822be73df792972d8487c1ca7315858d8435fa9
                       f6d0f5e648f2e2ad23cb2787320193483db9a70d
                       8864f2b715c6b93ca269639b812419be1245d507
                       f516ffb9cea59c9c96a3c2fafda95278ba5fbbc5
                       1cfe3ae411a74bfb4dd0c0d121309ed61102cc98
                       2ea2ae4506716fc33f1c265151e91791ab8afe73
                       75838c112c1732975751e04a95a230eb15b3a51d
                       141911b612c69cc32c2f71b296d73761fe0452c5
                       5ba8f8451d2d04fb7848f8599d3401c081f5c022
                       edd474c17d6a9914dfc6a0ffcae33fdc247f2df9
                       b2924fd9d2798dfa5a6a0e9916b0c95f08adab40
                       9d3d717c98d7d6b61195f06d9fd8f44f87037f9f
                       f70fbc57ce63d6f373177dfca024adaf5ecc01a4
                       4fffa314510ccb103943a6cd253d3df8121d1b3f
                       ea5997cd063f86a81731a72b82ec1baa0f5d65f7
                       bd0e8d4805598b6291688d3129d793ba918cd431
                       f905b82fe157e039bf65a84403bb5629e0182139
                       23f6371b3b174883745f9f2e0a3ba9998e03f38a
                       fa7bf6b629cd1fe5f4e8774dda009259827b0587
                       50a8adc9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9f:58:a1:63:e4:3b:a2:8c:44:25:b7:35:bd:66:d6:45:05:b7:ad:47]
            modulus: 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
    public exponent: 10001

] 
2022-03-20 05:10:29.494  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-03-20 05:10:29.502 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-03-20 05:10:29.512 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-20 05:10:29.516 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-03-20 05:10:29.520  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-03-20 05:10:29.521  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-03-20 05:10:29.521  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-03-20 05:10:29.521 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-03-20 05:10:29.522 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-03-20 05:10:29.522 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-03-20 05:10:29.537 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-03-20 05:10:29.538 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-20 05:10:29.539 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-03-20 05:10:29.539 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-20 05:10:29.722  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-03-20 05:10:29.724  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-03-20 05:10:29.724 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-03-20 05:10:29.725 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-03-20 05:10:29.727  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-03-20 05:10:29.727  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-03-20 05:10:29.727 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 05:10:29.728 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 05:10:29.728 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 05:10:29.729 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 05:10:29.729 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 05:10:29.729 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 05:10:29.733 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-03-20 05:10:29.733 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-03-20 05:10:29.733 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-03-20 05:10:29.734 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-03-20 05:10:29.741 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 104335131105005706299521300063180802303600701538
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Mar 20 03:16:04 UTC 2022
           Final Date: Fri Mar 19 03:16:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:14:2f:9a:8b:9d:3c:97:5a:69:d9:6a:8f:10:23:52:aa:3c:32:20]
            modulus: f6b01b41d5e33341d955531c6f351f12c8dd4032e0efc6189fe5c90af25309435146c30a8bfbea158507a7217ec7b5a913853c4bb735a0804119a35b8a0d10a3daf1e1cd058484eba8bcc0221fb40571d90208038fae4732cd336ad2ef3c3a57767294e5232cc043eb60b1b9095861abe4341a11bba92471747721d474d814bb61f9cdc0ce835b2ebcc2270f8ee13958f47ba667e4830ec279e2c5fb5580c8ea54e1acfbca46bc559d0f941275aad85f30607ea1bd1b3b2e54a0eaab155b33f59f9ea574be3c5c9d8aa99c3ed2d58a2d2de5c792f0c47029420a1a3fe204e9c62afb54e8e2e875b15309bf7e14223ef37cd19f5fdfbde6a48d64c620e455c1c82826d6a0501d21207c8d467f6957dabaf0f4f8eff7b3740ceb99cf8896f74c58976cec53c6672bb5bcf4d56934d053b06ebb168826812707ecc28c63f9bf72a6a198d50b8c14d60f2ab0c8e6d2d51c80a76f47d24b4c96efc74fef30bbb44c43a7e99310cf9233aec0fc2746ce5de4b17e58d565ac151f8fbe0efb2945a4ff4f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1822be73df792972d8487c1ca7315858d8435fa9
                       f6d0f5e648f2e2ad23cb2787320193483db9a70d
                       8864f2b715c6b93ca269639b812419be1245d507
                       f516ffb9cea59c9c96a3c2fafda95278ba5fbbc5
                       1cfe3ae411a74bfb4dd0c0d121309ed61102cc98
                       2ea2ae4506716fc33f1c265151e91791ab8afe73
                       75838c112c1732975751e04a95a230eb15b3a51d
                       141911b612c69cc32c2f71b296d73761fe0452c5
                       5ba8f8451d2d04fb7848f8599d3401c081f5c022
                       edd474c17d6a9914dfc6a0ffcae33fdc247f2df9
                       b2924fd9d2798dfa5a6a0e9916b0c95f08adab40
                       9d3d717c98d7d6b61195f06d9fd8f44f87037f9f
                       f70fbc57ce63d6f373177dfca024adaf5ecc01a4
                       4fffa314510ccb103943a6cd253d3df8121d1b3f
                       ea5997cd063f86a81731a72b82ec1baa0f5d65f7
                       bd0e8d4805598b6291688d3129d793ba918cd431
                       f905b82fe157e039bf65a84403bb5629e0182139
                       23f6371b3b174883745f9f2e0a3ba9998e03f38a
                       fa7bf6b629cd1fe5f4e8774dda009259827b0587
                       50a8adc9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [97:40:6b:a7:92:13:47:2f:23:25:a0:91:ac:22:5b:6c:e5:2e:7f:76]
            modulus: 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
    public exponent: 10001

]