Results

By type

          2022-05-25 08:53:41,946 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-05-25 08:53:42,540 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-05-25 08:53:43.044  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
May 25, 2022 8:53:44 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
May 25, 2022 8:53:44 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
May 25, 2022 8:53:44 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
May 25, 2022 8:53:44 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-05-25 08:53:44.926 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-05-25 08:53:45.111  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-05-25 08:53:45.219  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-05-25 08:53:45.715 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-05-25 08:53:45.718 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-05-25 08:53:45.719 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-05-25 08:53:45.722 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-05-25 08:53:45.755 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
2022-05-25 08:53:45.758 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-05-25 08:53:45.839 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-05-25 08:53:46.295 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
May 25, 2022 8:53:46 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-05-25 08:53:47.047  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 5.576 seconds (JVM running for 6.502)
May 25, 2022 8:54:14 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-05-25 08:54:39.682  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 08:54:39.687 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 08:54:39.710 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-25 08:54:39.712 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 08:54:39.722  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-25 08:54:39.724  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 08:54:39.725  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 08:54:39.726 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 08:54:39.726 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 08:54:39.728 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 08:54:39.732 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 08:54:39.734 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 08:54:39.758 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 08:54:39.762 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 08:54:39.763 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 08:54:39.765 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 08:54:40.241  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 08:54:40.243  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 08:54:40.244 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 08:54:40.245 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 08:54:40.251  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 08:54:40.252  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 08:54:40.253 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 08:54:40.253 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 08:54:40.253 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 08:54:40.261 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 08:54:40.262 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 08:54:40.262 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 08:54:40.267 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 08:54:40.268 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 08:54:40.268 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 08:54:40.270 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 08:54:40.290 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 92402211972371529999343818252358347026377592817
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 08:51:23 UTC 2022
           Final Date: Mon May 24 08:51:22 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b6:70:4f:bc:23:42:c2:01:1d:08:b8:92:34:07:76:68:24:a5:a2:3c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4b25cec20b30076ca8f1646c0ef6b72ce889547c
                       3c01b45d83806c6f5b5e84137e910653966590f1
                       2fbc5ff57df9a8eae9e2f8213d9679fb2cea92aa
                       41b83525b9091a0010da3ffccb67d6f9737d6a77
                       1d3ac6fc511b82471381f261b1b1c070a17587a1
                       8e0b15a9a2d6906ab07793b1ff3acb0fd7770f2b
                       2627c925f0009fedc4a9216ba43ec40ec8ffa565
                       d4a10c17f9af6121ce12b17891b3e2ee718e8a84
                       f64b2d7985ec1b16a169d5600170b1a7630e1343
                       08b20a0827f9c2a2a99ab35333062e6194b5ecdc
                       b74c9a23cc576b4694ca8d6c20b95f30c43ee490
                       92f429d305099f48e577b46066ca046b30768e8c
                       fbfc6207a7660c7270d0bb32f090913c49fb6c95
                       62a5a19f056faafe9f7203d7b46a0ada887ba21b
                       a9d11b57424ec6422f3cc6cdb1d2247121cb5ecc
                       278307d2e30ea115b696b7ab49fcfb6661de4afe
                       330a8742da6384f9d5e8cef161d67911e379aa16
                       cb96c68705d5b574e658543bbd5b748b0fcd4440
                       f60ff3dbee456748d37a1fc8cadeb7d4609b0eef
                       e59a8557
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [66:74:01:ef:31:fb:95:62:a6:a6:49:fe:d5:b3:57:bf:01:86:10:4c]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 09:58:13.708  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 09:58:13.711 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 09:58:13.713 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 09:58:13.714 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 09:58:13.715  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 09:58:13.716  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 09:58:13.716  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 09:58:13.716 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 09:58:13.717 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 09:58:13.717 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 09:58:13.725 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 09:58:13.726 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 09:58:13.726 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 09:58:13.727 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 09:58:13.943  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 09:58:13.944  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 09:58:13.944 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 09:58:13.944 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 09:58:13.946  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 09:58:13.946  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 09:58:13.947 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 09:58:13.947 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 09:58:13.947 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 09:58:13.948 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 09:58:13.948 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 09:58:13.948 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 09:58:13.949 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 09:58:13.949 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 09:58:13.949 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 09:58:13.950 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 09:58:13.953 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 92402211972371529999343818252358347026377592817
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 08:51:23 UTC 2022
           Final Date: Mon May 24 08:51:22 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b6:70:4f:bc:23:42:c2:01:1d:08:b8:92:34:07:76:68:24:a5:a2:3c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4b25cec20b30076ca8f1646c0ef6b72ce889547c
                       3c01b45d83806c6f5b5e84137e910653966590f1
                       2fbc5ff57df9a8eae9e2f8213d9679fb2cea92aa
                       41b83525b9091a0010da3ffccb67d6f9737d6a77
                       1d3ac6fc511b82471381f261b1b1c070a17587a1
                       8e0b15a9a2d6906ab07793b1ff3acb0fd7770f2b
                       2627c925f0009fedc4a9216ba43ec40ec8ffa565
                       d4a10c17f9af6121ce12b17891b3e2ee718e8a84
                       f64b2d7985ec1b16a169d5600170b1a7630e1343
                       08b20a0827f9c2a2a99ab35333062e6194b5ecdc
                       b74c9a23cc576b4694ca8d6c20b95f30c43ee490
                       92f429d305099f48e577b46066ca046b30768e8c
                       fbfc6207a7660c7270d0bb32f090913c49fb6c95
                       62a5a19f056faafe9f7203d7b46a0ada887ba21b
                       a9d11b57424ec6422f3cc6cdb1d2247121cb5ecc
                       278307d2e30ea115b696b7ab49fcfb6661de4afe
                       330a8742da6384f9d5e8cef161d67911e379aa16
                       cb96c68705d5b574e658543bbd5b748b0fcd4440
                       f60ff3dbee456748d37a1fc8cadeb7d4609b0eef
                       e59a8557
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6d:bb:6d:0d:3e:af:d3:09:a6:1a:b7:a5:73:df:48:3a:3c:20:6b:33]
            modulus: deaa12dc117d27004734131a20163942e9692234b1f3fbc0853906940ca998cbdd45857cc19449e475d417fdf64c3376cf17d3d4d5ac37a048317cbbe8b6c36c5b25dbd6bfd9ebbeb956828d315baa6fe60a510324ae0e2afb8910a94c0e8614c57d7f563543bc8104023b747b17a3c5cb0b78dbde850a7150ed0b495bdec290a5d75436b8e1ba53792032b85b785621bf610de9601fd9f95d611f2482a1a59ede37399159a3e262d507c668220af8a102b638b2b9312d62823c2836b6898a6079ce3966d6f9fa853ac03f297c09bf552f0df3b907bd98cb28af30ef2813d575db377969dd6496b17f5d07c6bf30ebdea2aa31e75350c3eb0e947737d19a1909
    public exponent: 10001

] 
2022-05-25 10:00:01.038  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 10:00:01.039 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 10:00:01.040 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-25 10:00:01.041 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 10:00:01.042  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-25 10:00:01.042  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 10:00:01.042  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 10:00:01.043 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 10:00:01.043 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 10:00:01.044 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 10:00:01.051 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 10:00:01.052 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 10:00:01.052 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 10:00:01.053 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 10:00:01.210  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 10:00:01.211  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 10:00:01.212 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 10:00:01.212 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 10:00:01.214  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 10:00:01.214  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 10:00:01.215 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 10:00:01.215 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 10:00:01.215 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 10:00:01.216 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 10:00:01.216 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 10:00:01.217 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 10:00:01.217 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 10:00:01.218 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 10:00:01.218 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 10:00:01.219 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 10:00:01.221 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 92402211972371529999343818252358347026377592817
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 08:51:23 UTC 2022
           Final Date: Mon May 24 08:51:22 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b6:70:4f:bc:23:42:c2:01:1d:08:b8:92:34:07:76:68:24:a5:a2:3c]
            modulus: c1e5d31fbcdfe10696fe320f8755da39b0a6bfa0c7d2aed4419d7845e3da003ba603e1ed2a3f6244c462d3f48e07e71831693f3b2e3c8403016695a1ed23081aca1e85f32b15359decb65840af860a78ead5363ca87368655c2430df781ce840cc216c1884b778a2ed4a54f00d5d6de4afac4f622cacfd5e03efcc01920ff80db572708e3a96b802068b648bd087168ade8274a6f7e021e665dd21c1eb97b26e8c6aff4e95360e59e6cc41f032df7d32c2e851a85f30fd851801590ce39db89f41891e244990a24e2345c790c4c60454283d9c5db52e222c43afc854e63697e10b52e4680ae2b122cbf60a4d4e9e9f54e5b94ec3646d3f9f57f5bf0e9956eeaefa5709b89408a0a5f9a099e62b2ce14f139e46ae1572b4e48ab5ef909e48545df4ae5a6178aac569106a54c587baa27c8a567e53f9bc08d1947029d50eb7c47a5c4515d6272ac2c55acf35d44f17909323fc25da1beb9afc3785e04ec7c4ac1ae53686b1c207fd1e2e806a13668d7412dbfcd8286fa1e663433ab404229e0617
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4b25cec20b30076ca8f1646c0ef6b72ce889547c
                       3c01b45d83806c6f5b5e84137e910653966590f1
                       2fbc5ff57df9a8eae9e2f8213d9679fb2cea92aa
                       41b83525b9091a0010da3ffccb67d6f9737d6a77
                       1d3ac6fc511b82471381f261b1b1c070a17587a1
                       8e0b15a9a2d6906ab07793b1ff3acb0fd7770f2b
                       2627c925f0009fedc4a9216ba43ec40ec8ffa565
                       d4a10c17f9af6121ce12b17891b3e2ee718e8a84
                       f64b2d7985ec1b16a169d5600170b1a7630e1343
                       08b20a0827f9c2a2a99ab35333062e6194b5ecdc
                       b74c9a23cc576b4694ca8d6c20b95f30c43ee490
                       92f429d305099f48e577b46066ca046b30768e8c
                       fbfc6207a7660c7270d0bb32f090913c49fb6c95
                       62a5a19f056faafe9f7203d7b46a0ada887ba21b
                       a9d11b57424ec6422f3cc6cdb1d2247121cb5ecc
                       278307d2e30ea115b696b7ab49fcfb6661de4afe
                       330a8742da6384f9d5e8cef161d67911e379aa16
                       cb96c68705d5b574e658543bbd5b748b0fcd4440
                       f60ff3dbee456748d37a1fc8cadeb7d4609b0eef
                       e59a8557
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [21:46:b7:d0:52:c9:4c:e8:33:f3:a4:a0:60:10:71:1e:7e:3f:fc:19]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 10:01:02.480  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 10:01:02.481 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 10:01:02.482 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-25 10:01:02.482 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 10:01:02.483  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-25 10:01:02.483  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 10:01:02.484  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 10:01:02.484 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 10:01:02.484 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 10:01:02.484 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 10:01:02.487 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 10:01:02.488 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 10:01:02.488 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 10:01:02.488 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 10:01:02.622  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 10:01:02.623  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 10:01:02.624 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 10:01:02.624 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 10:01:02.627  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 10:01:02.628  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 10:01:02.628 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 10:01:02.629 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 10:01:02.629 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 10:01:02.630 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 10:01:02.630 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 10:01:02.630 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 10:01:02.631 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 10:01:02.631 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 10:01:02.631 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 10:01:02.632 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 10:01:02.635 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 92402211972371529999343818252358347026377592817
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 08:51:23 UTC 2022
           Final Date: Mon May 24 08:51:22 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b6:70:4f:bc:23:42:c2:01:1d:08:b8:92:34:07:76:68:24:a5:a2:3c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4b25cec20b30076ca8f1646c0ef6b72ce889547c
                       3c01b45d83806c6f5b5e84137e910653966590f1
                       2fbc5ff57df9a8eae9e2f8213d9679fb2cea92aa
                       41b83525b9091a0010da3ffccb67d6f9737d6a77
                       1d3ac6fc511b82471381f261b1b1c070a17587a1
                       8e0b15a9a2d6906ab07793b1ff3acb0fd7770f2b
                       2627c925f0009fedc4a9216ba43ec40ec8ffa565
                       d4a10c17f9af6121ce12b17891b3e2ee718e8a84
                       f64b2d7985ec1b16a169d5600170b1a7630e1343
                       08b20a0827f9c2a2a99ab35333062e6194b5ecdc
                       b74c9a23cc576b4694ca8d6c20b95f30c43ee490
                       92f429d305099f48e577b46066ca046b30768e8c
                       fbfc6207a7660c7270d0bb32f090913c49fb6c95
                       62a5a19f056faafe9f7203d7b46a0ada887ba21b
                       a9d11b57424ec6422f3cc6cdb1d2247121cb5ecc
                       278307d2e30ea115b696b7ab49fcfb6661de4afe
                       330a8742da6384f9d5e8cef161d67911e379aa16
                       cb96c68705d5b574e658543bbd5b748b0fcd4440
                       f60ff3dbee456748d37a1fc8cadeb7d4609b0eef
                       e59a8557
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6e:86:02:28:c6:82:d1:0b:1d:7c:60:3b:54:9b:d8:7e:3f:4e:e3:1c]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 10:02:50.128  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 10:02:50.131 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 10:02:50.133 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 10:02:50.133 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 10:02:50.134  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-25 10:02:50.134  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 10:02:50.134  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 10:02:50.135 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 10:02:50.135 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 10:02:50.135 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 10:02:50.139 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 10:02:50.139 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 10:02:50.140 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 10:02:50.140 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 10:02:50.299  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 10:02:50.300  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 10:02:50.301 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 10:02:50.301 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 10:02:50.303  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 10:02:50.304  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 10:02:50.305 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 10:02:50.305 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 10:02:50.305 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 10:02:50.306 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 10:02:50.306 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 10:02:50.306 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 10:02:50.307 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 10:02:50.307 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 10:02:50.307 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 10:02:50.308 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 10:02:50.311 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 92402211972371529999343818252358347026377592817
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 08:51:23 UTC 2022
           Final Date: Mon May 24 08:51:22 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b6:70:4f:bc:23:42:c2:01:1d:08:b8:92:34:07:76:68:24:a5:a2:3c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4b25cec20b30076ca8f1646c0ef6b72ce889547c
                       3c01b45d83806c6f5b5e84137e910653966590f1
                       2fbc5ff57df9a8eae9e2f8213d9679fb2cea92aa
                       41b83525b9091a0010da3ffccb67d6f9737d6a77
                       1d3ac6fc511b82471381f261b1b1c070a17587a1
                       8e0b15a9a2d6906ab07793b1ff3acb0fd7770f2b
                       2627c925f0009fedc4a9216ba43ec40ec8ffa565
                       d4a10c17f9af6121ce12b17891b3e2ee718e8a84
                       f64b2d7985ec1b16a169d5600170b1a7630e1343
                       08b20a0827f9c2a2a99ab35333062e6194b5ecdc
                       b74c9a23cc576b4694ca8d6c20b95f30c43ee490
                       92f429d305099f48e577b46066ca046b30768e8c
                       fbfc6207a7660c7270d0bb32f090913c49fb6c95
                       62a5a19f056faafe9f7203d7b46a0ada887ba21b
                       a9d11b57424ec6422f3cc6cdb1d2247121cb5ecc
                       278307d2e30ea115b696b7ab49fcfb6661de4afe
                       330a8742da6384f9d5e8cef161d67911e379aa16
                       cb96c68705d5b574e658543bbd5b748b0fcd4440
                       f60ff3dbee456748d37a1fc8cadeb7d4609b0eef
                       e59a8557
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [dd:0c:df:46:82:95:ae:61:dd:8a:d7:12:bc:d2:9c:f9:f8:ba:47:e6]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 10:16:28.525  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 10:16:28.527 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 10:16:28.528 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-25 10:16:28.529 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 10:16:28.529  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-25 10:16:28.530  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 10:16:28.530  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 10:16:28.530 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 10:16:28.530 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 10:16:28.530 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 10:16:28.535 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 10:16:28.535 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 10:16:28.536 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 10:16:28.536 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 10:16:28.659  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 10:16:28.660  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 10:16:28.661 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 10:16:28.661 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 10:16:28.664  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 10:16:28.665  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 10:16:28.666 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 10:16:28.666 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 10:16:28.666 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 10:16:28.667 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 10:16:28.668 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 10:16:28.668 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 10:16:28.668 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 10:16:28.668 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 10:16:28.669 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 10:16:28.669 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 10:16:28.672 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 92402211972371529999343818252358347026377592817
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 08:51:23 UTC 2022
           Final Date: Mon May 24 08:51:22 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b6:70:4f:bc:23:42:c2:01:1d:08:b8:92:34:07:76:68:24:a5:a2:3c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4b25cec20b30076ca8f1646c0ef6b72ce889547c
                       3c01b45d83806c6f5b5e84137e910653966590f1
                       2fbc5ff57df9a8eae9e2f8213d9679fb2cea92aa
                       41b83525b9091a0010da3ffccb67d6f9737d6a77
                       1d3ac6fc511b82471381f261b1b1c070a17587a1
                       8e0b15a9a2d6906ab07793b1ff3acb0fd7770f2b
                       2627c925f0009fedc4a9216ba43ec40ec8ffa565
                       d4a10c17f9af6121ce12b17891b3e2ee718e8a84
                       f64b2d7985ec1b16a169d5600170b1a7630e1343
                       08b20a0827f9c2a2a99ab35333062e6194b5ecdc
                       b74c9a23cc576b4694ca8d6c20b95f30c43ee490
                       92f429d305099f48e577b46066ca046b30768e8c
                       fbfc6207a7660c7270d0bb32f090913c49fb6c95
                       62a5a19f056faafe9f7203d7b46a0ada887ba21b
                       a9d11b57424ec6422f3cc6cdb1d2247121cb5ecc
                       278307d2e30ea115b696b7ab49fcfb6661de4afe
                       330a8742da6384f9d5e8cef161d67911e379aa16
                       cb96c68705d5b574e658543bbd5b748b0fcd4440
                       f60ff3dbee456748d37a1fc8cadeb7d4609b0eef
                       e59a8557
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [40:58:dd:dc:fa:84:6f:b4:00:5e:cb:f1:11:83:35:0d:79:ce:ba:98]
            modulus: 9eddf8909488a7836bf8706e68126616fb4cd7be7800b1d3b7dbc7535cbc5e9450da2c467668581388a4621bdb9995d900bfa9055af39747c49ad511b9da687262c049e1ec990151f232fae1a38ef500767ee69eed406059e02694baec363169c59d39662107044ede444602c543ab7664fcadb35dca6fced204fe3d9f3b23b6afc8078d51e9997da30b32248954f4728700c4bb8c95517dd7641afd3ef67f9aa72b072351d7b007dde04cdd304ee3f91639c43d5d2a97352138d56a31b16da8b9ef251cad7cee397083def4e5132f992db0bfc335c067d7e1f9ec1047ae77382e778c06911c34732aa3687c0097e69215b963ad0a8533e4375d8a713811db15
    public exponent: 10001

] 
2022-05-25 10:20:39.577  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 10:20:39.578 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 10:20:39.580 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-25 10:20:39.581 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 10:20:39.581  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-25 10:20:39.581  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 10:20:39.582  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 10:20:39.582 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 10:20:39.582 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 10:20:39.582 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 10:20:39.586 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 10:20:39.587 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 10:20:39.588 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 10:20:39.588 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 10:20:39.751  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 10:20:39.752  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 10:20:39.752 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 10:20:39.752 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 10:20:39.753  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 10:20:39.754  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 10:20:39.754 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 10:20:39.754 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 10:20:39.754 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 10:20:39.755 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 10:20:39.755 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 10:20:39.755 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 10:20:39.756 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 10:20:39.756 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 10:20:39.756 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 10:20:39.757 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 10:20:39.760 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 92402211972371529999343818252358347026377592817
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 08:51:23 UTC 2022
           Final Date: Mon May 24 08:51:22 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b6:70:4f:bc:23:42:c2:01:1d:08:b8:92:34:07:76:68:24:a5:a2:3c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4b25cec20b30076ca8f1646c0ef6b72ce889547c
                       3c01b45d83806c6f5b5e84137e910653966590f1
                       2fbc5ff57df9a8eae9e2f8213d9679fb2cea92aa
                       41b83525b9091a0010da3ffccb67d6f9737d6a77
                       1d3ac6fc511b82471381f261b1b1c070a17587a1
                       8e0b15a9a2d6906ab07793b1ff3acb0fd7770f2b
                       2627c925f0009fedc4a9216ba43ec40ec8ffa565
                       d4a10c17f9af6121ce12b17891b3e2ee718e8a84
                       f64b2d7985ec1b16a169d5600170b1a7630e1343
                       08b20a0827f9c2a2a99ab35333062e6194b5ecdc
                       b74c9a23cc576b4694ca8d6c20b95f30c43ee490
                       92f429d305099f48e577b46066ca046b30768e8c
                       fbfc6207a7660c7270d0bb32f090913c49fb6c95
                       62a5a19f056faafe9f7203d7b46a0ada887ba21b
                       a9d11b57424ec6422f3cc6cdb1d2247121cb5ecc
                       278307d2e30ea115b696b7ab49fcfb6661de4afe
                       330a8742da6384f9d5e8cef161d67911e379aa16
                       cb96c68705d5b574e658543bbd5b748b0fcd4440
                       f60ff3dbee456748d37a1fc8cadeb7d4609b0eef
                       e59a8557
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ec:5b:03:f7:72:1c:2f:ec:54:f1:a2:99:ac:90:de:e3:a2:ca:d7:c9]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 10:20:54.543  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 10:20:54.544 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 10:20:54.545 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-25 10:20:54.546 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 10:20:54.546  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-25 10:20:54.546  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 10:20:54.547  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 10:20:54.547 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 10:20:54.547 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 10:20:54.547 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 10:20:54.551 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 10:20:54.551 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 10:20:54.551 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 10:20:54.551 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 10:20:54.709  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 10:20:54.709  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 10:20:54.710 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 10:20:54.710 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 10:20:54.711  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 10:20:54.711  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 10:20:54.711 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 10:20:54.711 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 10:20:54.711 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 10:20:54.712 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 10:20:54.712 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 10:20:54.712 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 10:20:54.712 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 10:20:54.713 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 10:20:54.713 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 10:20:54.713 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 10:20:54.715 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 92402211972371529999343818252358347026377592817
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 08:51:23 UTC 2022
           Final Date: Mon May 24 08:51:22 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b6:70:4f:bc:23:42:c2:01:1d:08:b8:92:34:07:76:68:24:a5:a2:3c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4b25cec20b30076ca8f1646c0ef6b72ce889547c
                       3c01b45d83806c6f5b5e84137e910653966590f1
                       2fbc5ff57df9a8eae9e2f8213d9679fb2cea92aa
                       41b83525b9091a0010da3ffccb67d6f9737d6a77
                       1d3ac6fc511b82471381f261b1b1c070a17587a1
                       8e0b15a9a2d6906ab07793b1ff3acb0fd7770f2b
                       2627c925f0009fedc4a9216ba43ec40ec8ffa565
                       d4a10c17f9af6121ce12b17891b3e2ee718e8a84
                       f64b2d7985ec1b16a169d5600170b1a7630e1343
                       08b20a0827f9c2a2a99ab35333062e6194b5ecdc
                       b74c9a23cc576b4694ca8d6c20b95f30c43ee490
                       92f429d305099f48e577b46066ca046b30768e8c
                       fbfc6207a7660c7270d0bb32f090913c49fb6c95
                       62a5a19f056faafe9f7203d7b46a0ada887ba21b
                       a9d11b57424ec6422f3cc6cdb1d2247121cb5ecc
                       278307d2e30ea115b696b7ab49fcfb6661de4afe
                       330a8742da6384f9d5e8cef161d67911e379aa16
                       cb96c68705d5b574e658543bbd5b748b0fcd4440
                       f60ff3dbee456748d37a1fc8cadeb7d4609b0eef
                       e59a8557
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1e:8a:7f:77:31:a7:38:30:69:1d:db:57:2c:49:49:d1:93:63:16:6f]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 11:26:53.787  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 11:26:53.788 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 11:26:53.790 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-25 11:26:53.791 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 11:26:53.791  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-25 11:26:53.792  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 11:26:53.792  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 11:26:53.792 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 11:26:53.792 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 11:26:53.792 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 11:26:53.798 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 11:26:53.799 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 11:26:53.800 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 11:26:53.800 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 11:26:53.989  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 11:26:53.990  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 11:26:53.990 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 11:26:53.990 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 11:26:53.992  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 11:26:53.992  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 11:26:53.992 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 11:26:53.993 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 11:26:53.993 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 11:26:53.993 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 11:26:53.993 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 11:26:53.994 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 11:26:53.994 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 11:26:53.994 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 11:26:53.994 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 11:26:53.995 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 11:26:53.997 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 92402211972371529999343818252358347026377592817
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 08:51:23 UTC 2022
           Final Date: Mon May 24 08:51:22 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b6:70:4f:bc:23:42:c2:01:1d:08:b8:92:34:07:76:68:24:a5:a2:3c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4b25cec20b30076ca8f1646c0ef6b72ce889547c
                       3c01b45d83806c6f5b5e84137e910653966590f1
                       2fbc5ff57df9a8eae9e2f8213d9679fb2cea92aa
                       41b83525b9091a0010da3ffccb67d6f9737d6a77
                       1d3ac6fc511b82471381f261b1b1c070a17587a1
                       8e0b15a9a2d6906ab07793b1ff3acb0fd7770f2b
                       2627c925f0009fedc4a9216ba43ec40ec8ffa565
                       d4a10c17f9af6121ce12b17891b3e2ee718e8a84
                       f64b2d7985ec1b16a169d5600170b1a7630e1343
                       08b20a0827f9c2a2a99ab35333062e6194b5ecdc
                       b74c9a23cc576b4694ca8d6c20b95f30c43ee490
                       92f429d305099f48e577b46066ca046b30768e8c
                       fbfc6207a7660c7270d0bb32f090913c49fb6c95
                       62a5a19f056faafe9f7203d7b46a0ada887ba21b
                       a9d11b57424ec6422f3cc6cdb1d2247121cb5ecc
                       278307d2e30ea115b696b7ab49fcfb6661de4afe
                       330a8742da6384f9d5e8cef161d67911e379aa16
                       cb96c68705d5b574e658543bbd5b748b0fcd4440
                       f60ff3dbee456748d37a1fc8cadeb7d4609b0eef
                       e59a8557
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3e:31:f0:74:99:61:5c:f9:07:46:68:48:10:25:2c:81:a4:bc:30:44]
            modulus: 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
    public exponent: 10001

] 
2022-05-25 11:26:58.737  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-25 11:26:58.739 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-25 11:26:58.740 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-25 11:26:58.741 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-25 11:26:58.741  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-25 11:26:58.741  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-25 11:26:58.742  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-25 11:26:58.742 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-25 11:26:58.742 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-25 11:26:58.742 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-25 11:26:58.746 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-25 11:26:58.747 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 11:26:58.747 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-25 11:26:58.747 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 11:26:58.845  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-25 11:26:58.846  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-25 11:26:58.846 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-25 11:26:58.846 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-25 11:26:58.847  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-25 11:26:58.848  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-25 11:26:58.848 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 11:26:58.848 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 11:26:58.849 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 11:26:58.849 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 11:26:58.849 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 11:26:58.849 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 11:26:58.850 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-25 11:26:58.850 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-25 11:26:58.850 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-25 11:26:58.850 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-25 11:26:58.852 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 92402211972371529999343818252358347026377592817
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 25 08:51:23 UTC 2022
           Final Date: Mon May 24 08:51:22 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b6:70:4f:bc:23:42:c2:01:1d:08:b8:92:34:07:76:68:24:a5:a2:3c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4b25cec20b30076ca8f1646c0ef6b72ce889547c
                       3c01b45d83806c6f5b5e84137e910653966590f1
                       2fbc5ff57df9a8eae9e2f8213d9679fb2cea92aa
                       41b83525b9091a0010da3ffccb67d6f9737d6a77
                       1d3ac6fc511b82471381f261b1b1c070a17587a1
                       8e0b15a9a2d6906ab07793b1ff3acb0fd7770f2b
                       2627c925f0009fedc4a9216ba43ec40ec8ffa565
                       d4a10c17f9af6121ce12b17891b3e2ee718e8a84
                       f64b2d7985ec1b16a169d5600170b1a7630e1343
                       08b20a0827f9c2a2a99ab35333062e6194b5ecdc
                       b74c9a23cc576b4694ca8d6c20b95f30c43ee490
                       92f429d305099f48e577b46066ca046b30768e8c
                       fbfc6207a7660c7270d0bb32f090913c49fb6c95
                       62a5a19f056faafe9f7203d7b46a0ada887ba21b
                       a9d11b57424ec6422f3cc6cdb1d2247121cb5ecc
                       278307d2e30ea115b696b7ab49fcfb6661de4afe
                       330a8742da6384f9d5e8cef161d67911e379aa16
                       cb96c68705d5b574e658543bbd5b748b0fcd4440
                       f60ff3dbee456748d37a1fc8cadeb7d4609b0eef
                       e59a8557
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fd:f7:62:d9:63:2d:15:7a:7c:8d:79:76:34:cc:d6:e7:eb:8c:1e:fd]
            modulus: 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
    public exponent: 10001

]