Results

By type

          2022-05-24 10:37:41,534 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-05-24 10:37:42,557 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-05-24 10:37:43.163  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
May 24, 2022 10:37:44 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
May 24, 2022 10:37:44 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
May 24, 2022 10:37:44 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
May 24, 2022 10:37:44 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-05-24 10:37:45.333 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-05-24 10:37:45.516  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-05-24 10:37:45.639  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-05-24 10:37:46.201 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-05-24 10:37:46.204 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-05-24 10:37:46.205 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-05-24 10:37:46.209 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-05-24 10:37:46.240 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-05-24 10:37:46.243 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-05-24 10:37:46.325 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-05-24 10:37:46.911 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
May 24, 2022 10:37:47 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-05-24 10:37:47.685  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 6.676 seconds (JVM running for 7.952)
May 24, 2022 10:38:16 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-05-24 10:38:47.056  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-24 10:38:47.064 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-24 10:38:47.092 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-24 10:38:47.095 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-24 10:38:47.106  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-24 10:38:47.108  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-24 10:38:47.109  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-24 10:38:47.110 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-24 10:38:47.111 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-24 10:38:47.113 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-24 10:38:47.118 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-24 10:38:47.120 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-24 10:38:47.146 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-24 10:38:47.151 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-24 10:38:47.151 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-24 10:38:47.154 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-24 10:38:47.630  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-24 10:38:47.632  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-24 10:38:47.633 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-24 10:38:47.634 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-24 10:38:47.639  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-24 10:38:47.640  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-24 10:38:47.641 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-24 10:38:47.641 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-24 10:38:47.641 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-24 10:38:47.649 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-24 10:38:47.649 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-24 10:38:47.649 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-24 10:38:47.653 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-24 10:38:47.654 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-24 10:38:47.654 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-24 10:38:47.655 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-24 10:38:47.680 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 33744373258804818365874138739854443926114133558
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 24 10:35:36 UTC 2022
           Final Date: Sun May 23 10:35:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:14:39:e5:44:2c:29:a6:37:bc:a2:25:4f:d5:e6:44:c5:e8:40:c1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6e662df8400026cc55f1ca37240f40b0566c8dca
                       7925a4db19bdc6083f61e7b5664b5cd676fe8838
                       c705a16d2d6553c65c82d46746f20854d01200d8
                       da71f9dba67a00015c42c5813a93aa70308a6261
                       ce3cc8ba044d52e0a859e72e7e4caa7473ac6ca6
                       c2d20422cf2f67bb4645a8586d5787082106f55d
                       e129fdfbad1e4e2ea957c807509f81373cf4f52b
                       433545685e68d6a93406753b275ce2c9ac604ec5
                       7dfc69372b7dbc8f0922331d74606e2f785dd7db
                       aaf9876a6ea48b829ae893007c3422c445e895d5
                       dd46ac6b990a69309f5df1be3eea86dfa8a1ac12
                       d9d987f6ae5d57c05b388a5b5fec47fc675de2bb
                       63e08c3833e48185a11b6c92d0967443758df887
                       e7655628e421ea18fc809fc15e04e816d05650c1
                       32ca954d1ec3abd66568ac3c3e9a4a1c71be7442
                       9e571918018c8a315dd2c3639ed4600a15d1c1a1
                       68158cd9c5c4c4ba6a96ea42342deb9849e4c01f
                       c55234874b87ba86e8e839c9fc81db1f038b8dfc
                       e1953dd74508530e8fe367c5d3eb7098abc45b26
                       6edd1fe5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bd:ee:91:67:f9:5c:e9:ba:b7:07:11:f4:5e:da:4d:31:b6:fe:5a:fc]
            modulus: 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
    public exponent: 10001

] 
2022-05-24 11:54:29.697  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-24 11:54:29.699 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-24 11:54:29.701 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-24 11:54:29.702 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-24 11:54:29.702  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-24 11:54:29.702  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-24 11:54:29.703  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-24 11:54:29.703 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-24 11:54:29.703 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-24 11:54:29.703 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-24 11:54:29.709 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-24 11:54:29.710 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-24 11:54:29.710 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-24 11:54:29.710 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-24 11:54:29.954  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-24 11:54:29.955  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-24 11:54:29.956 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-24 11:54:29.956 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-24 11:54:29.959  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-24 11:54:29.959  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-24 11:54:29.959 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-24 11:54:29.960 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-24 11:54:29.960 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-24 11:54:29.961 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-24 11:54:29.961 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-24 11:54:29.962 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-24 11:54:29.962 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-24 11:54:29.963 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-24 11:54:29.963 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-24 11:54:29.964 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-24 11:54:29.967 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 33744373258804818365874138739854443926114133558
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 24 10:35:36 UTC 2022
           Final Date: Sun May 23 10:35:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:14:39:e5:44:2c:29:a6:37:bc:a2:25:4f:d5:e6:44:c5:e8:40:c1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6e662df8400026cc55f1ca37240f40b0566c8dca
                       7925a4db19bdc6083f61e7b5664b5cd676fe8838
                       c705a16d2d6553c65c82d46746f20854d01200d8
                       da71f9dba67a00015c42c5813a93aa70308a6261
                       ce3cc8ba044d52e0a859e72e7e4caa7473ac6ca6
                       c2d20422cf2f67bb4645a8586d5787082106f55d
                       e129fdfbad1e4e2ea957c807509f81373cf4f52b
                       433545685e68d6a93406753b275ce2c9ac604ec5
                       7dfc69372b7dbc8f0922331d74606e2f785dd7db
                       aaf9876a6ea48b829ae893007c3422c445e895d5
                       dd46ac6b990a69309f5df1be3eea86dfa8a1ac12
                       d9d987f6ae5d57c05b388a5b5fec47fc675de2bb
                       63e08c3833e48185a11b6c92d0967443758df887
                       e7655628e421ea18fc809fc15e04e816d05650c1
                       32ca954d1ec3abd66568ac3c3e9a4a1c71be7442
                       9e571918018c8a315dd2c3639ed4600a15d1c1a1
                       68158cd9c5c4c4ba6a96ea42342deb9849e4c01f
                       c55234874b87ba86e8e839c9fc81db1f038b8dfc
                       e1953dd74508530e8fe367c5d3eb7098abc45b26
                       6edd1fe5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [20:85:8a:d0:c6:b1:1b:89:03:bf:09:2e:87:c4:cb:e3:70:47:31:0b]
            modulus: 9ae38d7df7a20390387cab44b127190edd74d5c41e864dc153a68dcf4be247f83824d6e8b098c56b78cea174be901deb4229688041f672e5a5545694083e2613acba6cda7601cf825f4636699ac2cc7a05bef5e853f92f2820969db08ff8e3b5c58c4f5ff0dd8ed47bfa2e5e17807ac5ec49c8e30a3d3b1ac621731fa15f32319542e06e48d1d213d7b55e65a9d49d9c75d40ca5cb5d531574e4e05e874a7df7680f13f00c22211f5aec13b61fe1a87fd50210c4a606f31514bf1519c2beaeb5a45b78f086705acef6aee8d2768ffe7d3726949ba82dc5a8cca92652133ee1e2d8f46f268e5fbdd578a089e386b3a8f6df10f660b06b4b3a3265caa49b2d5c5d
    public exponent: 10001

] 
2022-05-24 11:56:01.498  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-24 11:56:01.499 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-24 11:56:01.501 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-24 11:56:01.501 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-24 11:56:01.502  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-24 11:56:01.502  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-24 11:56:01.503  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-24 11:56:01.503 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-24 11:56:01.503 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-24 11:56:01.504 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-24 11:56:01.508 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-24 11:56:01.509 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-24 11:56:01.509 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-24 11:56:01.509 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-24 11:56:01.667  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-24 11:56:01.668  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-24 11:56:01.668 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-24 11:56:01.669 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-24 11:56:01.671  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-24 11:56:01.671  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-24 11:56:01.671 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-24 11:56:01.672 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-24 11:56:01.672 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-24 11:56:01.673 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-24 11:56:01.673 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-24 11:56:01.673 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-24 11:56:01.674 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-24 11:56:01.674 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-24 11:56:01.674 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-24 11:56:01.675 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-24 11:56:01.677 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 33744373258804818365874138739854443926114133558
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 24 10:35:36 UTC 2022
           Final Date: Sun May 23 10:35:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:14:39:e5:44:2c:29:a6:37:bc:a2:25:4f:d5:e6:44:c5:e8:40:c1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6e662df8400026cc55f1ca37240f40b0566c8dca
                       7925a4db19bdc6083f61e7b5664b5cd676fe8838
                       c705a16d2d6553c65c82d46746f20854d01200d8
                       da71f9dba67a00015c42c5813a93aa70308a6261
                       ce3cc8ba044d52e0a859e72e7e4caa7473ac6ca6
                       c2d20422cf2f67bb4645a8586d5787082106f55d
                       e129fdfbad1e4e2ea957c807509f81373cf4f52b
                       433545685e68d6a93406753b275ce2c9ac604ec5
                       7dfc69372b7dbc8f0922331d74606e2f785dd7db
                       aaf9876a6ea48b829ae893007c3422c445e895d5
                       dd46ac6b990a69309f5df1be3eea86dfa8a1ac12
                       d9d987f6ae5d57c05b388a5b5fec47fc675de2bb
                       63e08c3833e48185a11b6c92d0967443758df887
                       e7655628e421ea18fc809fc15e04e816d05650c1
                       32ca954d1ec3abd66568ac3c3e9a4a1c71be7442
                       9e571918018c8a315dd2c3639ed4600a15d1c1a1
                       68158cd9c5c4c4ba6a96ea42342deb9849e4c01f
                       c55234874b87ba86e8e839c9fc81db1f038b8dfc
                       e1953dd74508530e8fe367c5d3eb7098abc45b26
                       6edd1fe5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ef:b5:e1:5f:e2:49:60:b2:1f:b3:f2:86:3b:c0:4c:6e:cd:00:d2:16]
            modulus: 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
    public exponent: 10001

] 
2022-05-24 11:56:46.091  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-24 11:56:46.092 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-24 11:56:46.093 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-24 11:56:46.093 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-24 11:56:46.094  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-24 11:56:46.094  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-24 11:56:46.094  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-24 11:56:46.094 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-24 11:56:46.094 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-24 11:56:46.095 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-24 11:56:46.098 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-24 11:56:46.098 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-24 11:56:46.098 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-24 11:56:46.098 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-24 11:56:46.219  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-24 11:56:46.220  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-24 11:56:46.221 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-24 11:56:46.221 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-24 11:56:46.222  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-24 11:56:46.223  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-24 11:56:46.223 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-24 11:56:46.223 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-24 11:56:46.223 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-24 11:56:46.224 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-24 11:56:46.224 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-24 11:56:46.224 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-24 11:56:46.225 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-24 11:56:46.225 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-24 11:56:46.225 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-24 11:56:46.226 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-24 11:56:46.229 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 33744373258804818365874138739854443926114133558
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 24 10:35:36 UTC 2022
           Final Date: Sun May 23 10:35:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:14:39:e5:44:2c:29:a6:37:bc:a2:25:4f:d5:e6:44:c5:e8:40:c1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6e662df8400026cc55f1ca37240f40b0566c8dca
                       7925a4db19bdc6083f61e7b5664b5cd676fe8838
                       c705a16d2d6553c65c82d46746f20854d01200d8
                       da71f9dba67a00015c42c5813a93aa70308a6261
                       ce3cc8ba044d52e0a859e72e7e4caa7473ac6ca6
                       c2d20422cf2f67bb4645a8586d5787082106f55d
                       e129fdfbad1e4e2ea957c807509f81373cf4f52b
                       433545685e68d6a93406753b275ce2c9ac604ec5
                       7dfc69372b7dbc8f0922331d74606e2f785dd7db
                       aaf9876a6ea48b829ae893007c3422c445e895d5
                       dd46ac6b990a69309f5df1be3eea86dfa8a1ac12
                       d9d987f6ae5d57c05b388a5b5fec47fc675de2bb
                       63e08c3833e48185a11b6c92d0967443758df887
                       e7655628e421ea18fc809fc15e04e816d05650c1
                       32ca954d1ec3abd66568ac3c3e9a4a1c71be7442
                       9e571918018c8a315dd2c3639ed4600a15d1c1a1
                       68158cd9c5c4c4ba6a96ea42342deb9849e4c01f
                       c55234874b87ba86e8e839c9fc81db1f038b8dfc
                       e1953dd74508530e8fe367c5d3eb7098abc45b26
                       6edd1fe5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [57:64:f8:e6:28:57:0b:50:6b:6c:1f:b4:67:4e:6e:03:21:90:2e:be]
            modulus: c2e86c4d146ceaede6a1f88568d20d62cf1e51dc2f6349785f57c573d2171f7f28efb00271d19a64006cb86d73301e81c758cf6ff8191fbfc96ebabff5bd741c39abd06f68b0a497d3aa0aab867f4ac1e709761617a5e630a781c3d8ac82105eec6ece445b98d5c97462955414a4bc908f7c1c4ec76b27df781cb8044d56a8c828a43c8da205bf7f35d48143fa098d1c89e323bfae33150d591cd1e6dbc1c7ae4c511a457c7626cdb2401d0e6cdf5b5d9e77113929e487ff1b16b0d08d4818c3f63352f633160df3498a376726cb98c608814ae702698f5450b68a6a8ab8d02dfe68f16a6b4573388a392e36dbc7dae248b99208ef1a791ed502e06b48dffa83
    public exponent: 10001

] 
2022-05-24 11:57:23.290  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-24 11:57:23.292 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-24 11:57:23.293 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-24 11:57:23.294 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-24 11:57:23.295  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-24 11:57:23.296  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-24 11:57:23.297  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-24 11:57:23.297 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-24 11:57:23.297 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-24 11:57:23.298 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-24 11:57:23.301 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-24 11:57:23.301 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-24 11:57:23.302 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-24 11:57:23.302 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-24 11:57:23.455  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-24 11:57:23.456  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-24 11:57:23.456 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-24 11:57:23.457 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-24 11:57:23.458  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-24 11:57:23.459  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-24 11:57:23.460 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-24 11:57:23.460 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-24 11:57:23.460 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-24 11:57:23.461 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-24 11:57:23.461 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-24 11:57:23.461 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-24 11:57:23.462 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-24 11:57:23.462 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-24 11:57:23.462 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-24 11:57:23.462 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-24 11:57:23.469 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 33744373258804818365874138739854443926114133558
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 24 10:35:36 UTC 2022
           Final Date: Sun May 23 10:35:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:14:39:e5:44:2c:29:a6:37:bc:a2:25:4f:d5:e6:44:c5:e8:40:c1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6e662df8400026cc55f1ca37240f40b0566c8dca
                       7925a4db19bdc6083f61e7b5664b5cd676fe8838
                       c705a16d2d6553c65c82d46746f20854d01200d8
                       da71f9dba67a00015c42c5813a93aa70308a6261
                       ce3cc8ba044d52e0a859e72e7e4caa7473ac6ca6
                       c2d20422cf2f67bb4645a8586d5787082106f55d
                       e129fdfbad1e4e2ea957c807509f81373cf4f52b
                       433545685e68d6a93406753b275ce2c9ac604ec5
                       7dfc69372b7dbc8f0922331d74606e2f785dd7db
                       aaf9876a6ea48b829ae893007c3422c445e895d5
                       dd46ac6b990a69309f5df1be3eea86dfa8a1ac12
                       d9d987f6ae5d57c05b388a5b5fec47fc675de2bb
                       63e08c3833e48185a11b6c92d0967443758df887
                       e7655628e421ea18fc809fc15e04e816d05650c1
                       32ca954d1ec3abd66568ac3c3e9a4a1c71be7442
                       9e571918018c8a315dd2c3639ed4600a15d1c1a1
                       68158cd9c5c4c4ba6a96ea42342deb9849e4c01f
                       c55234874b87ba86e8e839c9fc81db1f038b8dfc
                       e1953dd74508530e8fe367c5d3eb7098abc45b26
                       6edd1fe5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [50:a2:4d:3e:6e:61:88:58:75:25:d9:21:93:2a:c0:ba:86:02:60:12]
            modulus: b5e79f50964043997eec99c5cbb0070567a95728362130ea470fa3102755da675fc4b1a191ba628dbf06a66bcd8e53b644fa04474997d71c7c68ebbdd0939e516a6bb170101db29ce5c136541320dc90d4636a54df2a33119b064b64e7a0e954cd91558a20f98ae42a727b6fb6169085031d4ea8cdceebe8888a37a24d8c631ea91970afdedc2b3a7df5328defc8d730ba4ab9988062e246282dd169b1c5568c908240e9262b3ef3ab563703627533708be01688c60dde6e1abb9b48fd2b1e16c5f8ad8821924f011406107c55a99256b55fd28431aa4b84972ca8c694eebdd35450ec83d1e297efe23b30e4dae00c213202c97e5b5b3131b55acbe8cfffb92f
    public exponent: 10001

] 
2022-05-24 11:59:16.948  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-24 11:59:16.951 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-24 11:59:16.952 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-24 11:59:16.953 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-24 11:59:16.954  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-24 11:59:16.954  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-24 11:59:16.954  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-24 11:59:16.955 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-24 11:59:16.955 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-24 11:59:16.955 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-24 11:59:16.961 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-24 11:59:16.962 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-24 11:59:16.962 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-24 11:59:16.962 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-24 11:59:17.125  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-24 11:59:17.126  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-24 11:59:17.126 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-24 11:59:17.126 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-24 11:59:17.128  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-24 11:59:17.128  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-24 11:59:17.128 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-24 11:59:17.129 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-24 11:59:17.129 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-24 11:59:17.129 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-24 11:59:17.130 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-24 11:59:17.130 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-24 11:59:17.131 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-24 11:59:17.131 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-24 11:59:17.131 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-24 11:59:17.132 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-24 11:59:17.136 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 33744373258804818365874138739854443926114133558
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 24 10:35:36 UTC 2022
           Final Date: Sun May 23 10:35:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:14:39:e5:44:2c:29:a6:37:bc:a2:25:4f:d5:e6:44:c5:e8:40:c1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6e662df8400026cc55f1ca37240f40b0566c8dca
                       7925a4db19bdc6083f61e7b5664b5cd676fe8838
                       c705a16d2d6553c65c82d46746f20854d01200d8
                       da71f9dba67a00015c42c5813a93aa70308a6261
                       ce3cc8ba044d52e0a859e72e7e4caa7473ac6ca6
                       c2d20422cf2f67bb4645a8586d5787082106f55d
                       e129fdfbad1e4e2ea957c807509f81373cf4f52b
                       433545685e68d6a93406753b275ce2c9ac604ec5
                       7dfc69372b7dbc8f0922331d74606e2f785dd7db
                       aaf9876a6ea48b829ae893007c3422c445e895d5
                       dd46ac6b990a69309f5df1be3eea86dfa8a1ac12
                       d9d987f6ae5d57c05b388a5b5fec47fc675de2bb
                       63e08c3833e48185a11b6c92d0967443758df887
                       e7655628e421ea18fc809fc15e04e816d05650c1
                       32ca954d1ec3abd66568ac3c3e9a4a1c71be7442
                       9e571918018c8a315dd2c3639ed4600a15d1c1a1
                       68158cd9c5c4c4ba6a96ea42342deb9849e4c01f
                       c55234874b87ba86e8e839c9fc81db1f038b8dfc
                       e1953dd74508530e8fe367c5d3eb7098abc45b26
                       6edd1fe5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f5:d6:16:99:82:08:c1:40:bb:00:64:3d:11:84:30:85:4d:c7:c2:d7]
            modulus: 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
    public exponent: 10001

] 
2022-05-24 12:01:30.316  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-24 12:01:30.317 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-24 12:01:30.318 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-24 12:01:30.319 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-24 12:01:30.319  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-24 12:01:30.319  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-24 12:01:30.320  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-24 12:01:30.320 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-24 12:01:30.320 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-24 12:01:30.320 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-24 12:01:30.324 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-24 12:01:30.324 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-24 12:01:30.325 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-24 12:01:30.325 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-24 12:01:30.486  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-24 12:01:30.487  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-24 12:01:30.488 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-24 12:01:30.488 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-24 12:01:30.489  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-24 12:01:30.490  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-24 12:01:30.490 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-24 12:01:30.490 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-24 12:01:30.491 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-24 12:01:30.491 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-24 12:01:30.492 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-24 12:01:30.492 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-24 12:01:30.493 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-24 12:01:30.493 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-24 12:01:30.493 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-24 12:01:30.494 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-24 12:01:30.496 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 33744373258804818365874138739854443926114133558
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 24 10:35:36 UTC 2022
           Final Date: Sun May 23 10:35:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:14:39:e5:44:2c:29:a6:37:bc:a2:25:4f:d5:e6:44:c5:e8:40:c1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6e662df8400026cc55f1ca37240f40b0566c8dca
                       7925a4db19bdc6083f61e7b5664b5cd676fe8838
                       c705a16d2d6553c65c82d46746f20854d01200d8
                       da71f9dba67a00015c42c5813a93aa70308a6261
                       ce3cc8ba044d52e0a859e72e7e4caa7473ac6ca6
                       c2d20422cf2f67bb4645a8586d5787082106f55d
                       e129fdfbad1e4e2ea957c807509f81373cf4f52b
                       433545685e68d6a93406753b275ce2c9ac604ec5
                       7dfc69372b7dbc8f0922331d74606e2f785dd7db
                       aaf9876a6ea48b829ae893007c3422c445e895d5
                       dd46ac6b990a69309f5df1be3eea86dfa8a1ac12
                       d9d987f6ae5d57c05b388a5b5fec47fc675de2bb
                       63e08c3833e48185a11b6c92d0967443758df887
                       e7655628e421ea18fc809fc15e04e816d05650c1
                       32ca954d1ec3abd66568ac3c3e9a4a1c71be7442
                       9e571918018c8a315dd2c3639ed4600a15d1c1a1
                       68158cd9c5c4c4ba6a96ea42342deb9849e4c01f
                       c55234874b87ba86e8e839c9fc81db1f038b8dfc
                       e1953dd74508530e8fe367c5d3eb7098abc45b26
                       6edd1fe5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [77:c1:df:73:67:b3:ad:b0:e0:89:40:35:46:86:fe:01:15:bb:de:c9]
            modulus: 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
    public exponent: 10001

] 
2022-05-24 12:01:43.282  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-24 12:01:43.283 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-24 12:01:43.285 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-24 12:01:43.285 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-24 12:01:43.285  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-24 12:01:43.286  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-24 12:01:43.286  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-24 12:01:43.286 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-24 12:01:43.286 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-24 12:01:43.286 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-24 12:01:43.290 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-24 12:01:43.290 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-24 12:01:43.290 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-24 12:01:43.290 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-24 12:01:43.446  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-24 12:01:43.447  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-24 12:01:43.447 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-24 12:01:43.447 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-24 12:01:43.449  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-24 12:01:43.449  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-24 12:01:43.449 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-24 12:01:43.449 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-24 12:01:43.449 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-24 12:01:43.450 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-24 12:01:43.450 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-24 12:01:43.451 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-24 12:01:43.451 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-24 12:01:43.451 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-24 12:01:43.451 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-24 12:01:43.452 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-24 12:01:43.455 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 33744373258804818365874138739854443926114133558
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 24 10:35:36 UTC 2022
           Final Date: Sun May 23 10:35:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:14:39:e5:44:2c:29:a6:37:bc:a2:25:4f:d5:e6:44:c5:e8:40:c1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6e662df8400026cc55f1ca37240f40b0566c8dca
                       7925a4db19bdc6083f61e7b5664b5cd676fe8838
                       c705a16d2d6553c65c82d46746f20854d01200d8
                       da71f9dba67a00015c42c5813a93aa70308a6261
                       ce3cc8ba044d52e0a859e72e7e4caa7473ac6ca6
                       c2d20422cf2f67bb4645a8586d5787082106f55d
                       e129fdfbad1e4e2ea957c807509f81373cf4f52b
                       433545685e68d6a93406753b275ce2c9ac604ec5
                       7dfc69372b7dbc8f0922331d74606e2f785dd7db
                       aaf9876a6ea48b829ae893007c3422c445e895d5
                       dd46ac6b990a69309f5df1be3eea86dfa8a1ac12
                       d9d987f6ae5d57c05b388a5b5fec47fc675de2bb
                       63e08c3833e48185a11b6c92d0967443758df887
                       e7655628e421ea18fc809fc15e04e816d05650c1
                       32ca954d1ec3abd66568ac3c3e9a4a1c71be7442
                       9e571918018c8a315dd2c3639ed4600a15d1c1a1
                       68158cd9c5c4c4ba6a96ea42342deb9849e4c01f
                       c55234874b87ba86e8e839c9fc81db1f038b8dfc
                       e1953dd74508530e8fe367c5d3eb7098abc45b26
                       6edd1fe5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [97:42:60:f5:77:df:88:69:e9:c6:1c:27:bd:80:03:6e:e8:5d:d5:be]
            modulus: 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
    public exponent: 10001

] 
2022-05-24 12:03:03.900  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-24 12:03:03.901 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-24 12:03:03.903 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-24 12:03:03.903 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-24 12:03:03.904  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-24 12:03:03.904  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-24 12:03:03.904  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-24 12:03:03.904 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-24 12:03:03.904 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-24 12:03:03.905 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-24 12:03:03.908 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-24 12:03:03.908 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-24 12:03:03.908 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-24 12:03:03.909 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-24 12:03:04.066  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-24 12:03:04.068  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-24 12:03:04.068 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-24 12:03:04.071 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-24 12:03:04.072  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-24 12:03:04.073  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-24 12:03:04.073 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-24 12:03:04.073 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-24 12:03:04.073 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-24 12:03:04.074 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-24 12:03:04.074 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-24 12:03:04.074 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-24 12:03:04.075 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-24 12:03:04.075 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-24 12:03:04.076 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-24 12:03:04.076 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-24 12:03:04.079 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 33744373258804818365874138739854443926114133558
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 24 10:35:36 UTC 2022
           Final Date: Sun May 23 10:35:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:14:39:e5:44:2c:29:a6:37:bc:a2:25:4f:d5:e6:44:c5:e8:40:c1]
            modulus: ccc94d477905043f135f0b4d42f8c01793039834cc2dfef71e3c11039702c4842e3c6226e191aac2118d32f74f3b8b077c946bca5857ee2ed674088961f5e83b6ff02e3d5ee204dc62e23226b8ff333b1fbc7f74614040ecadf3b93330d0432f8b7597143091c082bb4f329aca525c7b763244ae171df5c00373397483edd11a97f9bcffded76b5e2d5f631efeda9267473a5b75d781e524fb7c9e40faf1639e0eff0102f390d4dfbb803ecaa14b5c258988ce13c96bca8a3297944ab96101de047ee103d326c49f83a2086be73a4e3f7cb69db9c8d30c012d1de106ca953dbb4b829533397d70cddd17bad78a6a85dfd5c90321b384eefbe8cb8c8f2399b7f9c9b718903c6637bae4261cfc8b84927fb1f5ae394076db9c3419b02a1cf3921ce5979e1937e2b037c0a1262512dd4d59928e0c9b442c4b12f34cb78f4421694137f86c0c64fdec85da5df350b6aface880f75fcd2ee18e9a6fefc6a1f6a58a62cdb0d63d0a67ea6bd2eabad1c9a525461433a1e973571c9b0c460beaa1785e0d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6e662df8400026cc55f1ca37240f40b0566c8dca
                       7925a4db19bdc6083f61e7b5664b5cd676fe8838
                       c705a16d2d6553c65c82d46746f20854d01200d8
                       da71f9dba67a00015c42c5813a93aa70308a6261
                       ce3cc8ba044d52e0a859e72e7e4caa7473ac6ca6
                       c2d20422cf2f67bb4645a8586d5787082106f55d
                       e129fdfbad1e4e2ea957c807509f81373cf4f52b
                       433545685e68d6a93406753b275ce2c9ac604ec5
                       7dfc69372b7dbc8f0922331d74606e2f785dd7db
                       aaf9876a6ea48b829ae893007c3422c445e895d5
                       dd46ac6b990a69309f5df1be3eea86dfa8a1ac12
                       d9d987f6ae5d57c05b388a5b5fec47fc675de2bb
                       63e08c3833e48185a11b6c92d0967443758df887
                       e7655628e421ea18fc809fc15e04e816d05650c1
                       32ca954d1ec3abd66568ac3c3e9a4a1c71be7442
                       9e571918018c8a315dd2c3639ed4600a15d1c1a1
                       68158cd9c5c4c4ba6a96ea42342deb9849e4c01f
                       c55234874b87ba86e8e839c9fc81db1f038b8dfc
                       e1953dd74508530e8fe367c5d3eb7098abc45b26
                       6edd1fe5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fa:04:81:2e:25:b0:ab:6e:9b:3a:7a:d1:89:5d:83:e7:09:15:0e:04]
            modulus: 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
    public exponent: 10001

] 
2022-05-24 12:07:46.762  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-24 12:07:46.764 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-24 12:07:46.767 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-24 12:07:46.768 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-24 12:07:46.768  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-24 12:07:46.769  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-24 12:07:46.770  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-24 12:07:46.771 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-24 12:07:46.772 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-24 12:07:46.772 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-24 12:07:46.781 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-24 12:07:46.782 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-24 12:07:46.782 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-24 12:07:46.783 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-24 12:07:46.950  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-24 12:07:46.951  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-24 12:07:46.951 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-24 12:07:46.952 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-24 12:07:46.953  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-24 12:07:46.954  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-24 12:07:46.954 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-24 12:07:46.954 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-24 12:07:46.954 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-24 12:07:46.954 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-24 12:07:46.955 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-24 12:07:46.955 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-24 12:07:46.955 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-24 12:07:46.955 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-24 12:07:46.955 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-24 12:07:46.956 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-24 12:07:46.959 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 33744373258804818365874138739854443926114133558
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 24 10:35:36 UTC 2022
           Final Date: Sun May 23 10:35:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:14:39:e5:44:2c:29:a6:37:bc:a2:25:4f:d5:e6:44:c5:e8:40:c1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6e662df8400026cc55f1ca37240f40b0566c8dca
                       7925a4db19bdc6083f61e7b5664b5cd676fe8838
                       c705a16d2d6553c65c82d46746f20854d01200d8
                       da71f9dba67a00015c42c5813a93aa70308a6261
                       ce3cc8ba044d52e0a859e72e7e4caa7473ac6ca6
                       c2d20422cf2f67bb4645a8586d5787082106f55d
                       e129fdfbad1e4e2ea957c807509f81373cf4f52b
                       433545685e68d6a93406753b275ce2c9ac604ec5
                       7dfc69372b7dbc8f0922331d74606e2f785dd7db
                       aaf9876a6ea48b829ae893007c3422c445e895d5
                       dd46ac6b990a69309f5df1be3eea86dfa8a1ac12
                       d9d987f6ae5d57c05b388a5b5fec47fc675de2bb
                       63e08c3833e48185a11b6c92d0967443758df887
                       e7655628e421ea18fc809fc15e04e816d05650c1
                       32ca954d1ec3abd66568ac3c3e9a4a1c71be7442
                       9e571918018c8a315dd2c3639ed4600a15d1c1a1
                       68158cd9c5c4c4ba6a96ea42342deb9849e4c01f
                       c55234874b87ba86e8e839c9fc81db1f038b8dfc
                       e1953dd74508530e8fe367c5d3eb7098abc45b26
                       6edd1fe5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b2:83:a0:ca:7f:c3:f4:2d:58:ff:ac:82:e6:17:11:c8:80:da:b5:21]
            modulus: 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
    public exponent: 10001

]