Results

By type

          2022-11-02 02:53:56,043 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-11-02 02:53:57,024 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-11-02 02:53:57.698  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Nov 02, 2022 2:53:59 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Nov 02, 2022 2:53:59 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Nov 02, 2022 2:53:59 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Nov 02, 2022 2:53:59 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-11-02 02:54:00.142 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-11-02 02:54:00.420  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-11-02 02:54:00.582  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-11-02 02:54:01.247 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-11-02 02:54:01.249 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-11-02 02:54:01.251 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-11-02 02:54:01.254 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-11-02 02:54:01.295 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
2022-11-02 02:54:01.298 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-11-02 02:54:01.422 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-11-02 02:54:01.955 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Nov 02, 2022 2:54:02 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-11-02 02:54:02.821  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.588 seconds (JVM running for 9.294)
Nov 02, 2022 2:54:30 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-11-02 02:57:16.866  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-02 02:57:16.876 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-02 02:57:16.918 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-02 02:57:16.923 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-02 02:57:16.942  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-02 02:57:16.944  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-02 02:57:16.945  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-02 02:57:16.947 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-02 02:57:16.947 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-02 02:57:16.952 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-02 02:57:16.958 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-02 02:57:16.962 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-02 02:57:17.003 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-02 02:57:17.008 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-02 02:57:17.008 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-02 02:57:17.012 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-02 02:57:17.613  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-02 02:57:17.616  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-02 02:57:17.617 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-02 02:57:17.618 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-02 02:57:17.628  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-02 02:57:17.629  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-02 02:57:17.630 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-02 02:57:17.631 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-02 02:57:17.631 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-02 02:57:17.645 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-02 02:57:17.645 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-02 02:57:17.646 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-02 02:57:17.652 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-02 02:57:17.653 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-02 02:57:17.653 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-02 02:57:17.655 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-02 02:57:17.684 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 725916378755123069895397563436528930287468036649
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 02 02:50:25 UTC 2022
           Final Date: Mon Nov 01 02:50:24 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e1:2e:25:60:cc:73:e6:32:2e:b9:17:18:1d:34:23:87:3d:49:95:8f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ad6fbde92c7967a575a9e0ee540ba2b2bfd3e1e9
                       e09429ebbe1f515713654ab56ecfe4a82bea373c
                       d3bd0a6a12a45ebdc511ffe218113f40e6eca069
                       3ffa42cabb4747d004518482ad1bef3b48b40f46
                       b32ed8141a768226e5b40247ce8c82a4d1fbb025
                       c56df8e5b3d6e9e8900a78b61457504c67ecc719
                       8729df5053864ea24a63f432c96d8f298fba7dbc
                       eefc802dac480ecfc0d200dc85cbad418de77b25
                       b46195ac9589c97395c79c846e59218fd4003713
                       070b0006eee2cd511878ed14c6e8eb82f2b9963e
                       14e8e521ede6ebfa2d593abf98cd118676c3375b
                       045e9a81cb0cf5b3df51e22aaa22b493ee31e422
                       1e7eb106a79824de47a5fe058c4b077a8b8529fc
                       d047fd41d642fc428ffdc86418f3853577dcf6b3
                       d6c4af26237062533d5f7973a74ac4d28424d9a4
                       077f48d1426a1b38786013d0607d9621dcb43667
                       bf1cbc822ddf7c2648f879a0bd637da4ca5ee0c5
                       57eb32b10e99e2f75deb15a5b04c538d1a42d06b
                       e398e248db1e3237a425d60fa8cbb5024e378cce
                       a42d0521
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [99:2a:34:7e:77:3d:55:3d:d8:b2:2b:72:95:50:9d:21:c8:4f:7f:51]
            modulus: 955655ab07c8a8aefb1592360bc02718efcf6f24441fcdd3da34540aee178b7b579ec88b47aec6d4ad25568f9043aa0431f9603c8cc277b848ee46fe05fd2a1f71fedcea1a9e9962f48e75bdd584d2fe1cee08b247fbc9b90eb14a15871a067e353c49a13b6662e3b5ee3755ec91db344ab872d0732103ffa4372f7b6e58dba913cbf26c07829c3c581826b6dcfacd41bdb5900c1cdb3b83240cef972314765b64d92a352910f14c7a9bd850dfc5cf288a3a4c62c0666c34bd18fc497d1affb426c4ad1aaefc2ea7948c5955242d70df9b7dd0cc625aa9c02b35b9ec03d1dac087bfd6f224b6234ea687d5d3092d81cb5521f26a024c250967f60b2cb3385083
    public exponent: 10001

] 
2022-11-02 04:16:27.371  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-02 04:16:27.375 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-02 04:16:27.378 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-02 04:16:27.379 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-02 04:16:27.380  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-02 04:16:27.381  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-02 04:16:27.381  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-02 04:16:27.382 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-02 04:16:27.383 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-02 04:16:27.383 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-02 04:16:27.393 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-02 04:16:27.395 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-02 04:16:27.395 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-02 04:16:27.395 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-02 04:16:27.579  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-02 04:16:27.580  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-02 04:16:27.581 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-02 04:16:27.581 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-02 04:16:27.584  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-02 04:16:27.584  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-02 04:16:27.585 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-02 04:16:27.585 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-02 04:16:27.586 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-02 04:16:27.587 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-02 04:16:27.587 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-02 04:16:27.588 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-02 04:16:27.588 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-02 04:16:27.589 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-02 04:16:27.589 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-02 04:16:27.590 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-02 04:16:27.596 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 725916378755123069895397563436528930287468036649
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 02 02:50:25 UTC 2022
           Final Date: Mon Nov 01 02:50:24 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e1:2e:25:60:cc:73:e6:32:2e:b9:17:18:1d:34:23:87:3d:49:95:8f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ad6fbde92c7967a575a9e0ee540ba2b2bfd3e1e9
                       e09429ebbe1f515713654ab56ecfe4a82bea373c
                       d3bd0a6a12a45ebdc511ffe218113f40e6eca069
                       3ffa42cabb4747d004518482ad1bef3b48b40f46
                       b32ed8141a768226e5b40247ce8c82a4d1fbb025
                       c56df8e5b3d6e9e8900a78b61457504c67ecc719
                       8729df5053864ea24a63f432c96d8f298fba7dbc
                       eefc802dac480ecfc0d200dc85cbad418de77b25
                       b46195ac9589c97395c79c846e59218fd4003713
                       070b0006eee2cd511878ed14c6e8eb82f2b9963e
                       14e8e521ede6ebfa2d593abf98cd118676c3375b
                       045e9a81cb0cf5b3df51e22aaa22b493ee31e422
                       1e7eb106a79824de47a5fe058c4b077a8b8529fc
                       d047fd41d642fc428ffdc86418f3853577dcf6b3
                       d6c4af26237062533d5f7973a74ac4d28424d9a4
                       077f48d1426a1b38786013d0607d9621dcb43667
                       bf1cbc822ddf7c2648f879a0bd637da4ca5ee0c5
                       57eb32b10e99e2f75deb15a5b04c538d1a42d06b
                       e398e248db1e3237a425d60fa8cbb5024e378cce
                       a42d0521
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [05:f1:0b:f8:86:c5:64:6e:21:e6:18:37:e6:a8:7d:2a:28:0c:dd:a4]
            modulus: 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
    public exponent: 10001

] 
2022-11-02 04:18:14.838  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-02 04:18:14.839 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-02 04:18:14.841 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-02 04:18:14.842 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-02 04:18:14.843  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-02 04:18:14.844  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-02 04:18:14.844  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-02 04:18:14.845 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-02 04:18:14.845 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-02 04:18:14.849 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-02 04:18:14.859 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-02 04:18:14.860 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-02 04:18:14.861 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-02 04:18:14.861 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-02 04:18:15.034  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-02 04:18:15.035  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-02 04:18:15.037 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-02 04:18:15.037 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-02 04:18:15.042  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-02 04:18:15.043  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-02 04:18:15.044 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-02 04:18:15.044 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-02 04:18:15.044 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-02 04:18:15.046 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-02 04:18:15.046 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-02 04:18:15.047 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-02 04:18:15.048 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-02 04:18:15.048 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-02 04:18:15.048 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-02 04:18:15.049 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-02 04:18:15.053 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 725916378755123069895397563436528930287468036649
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 02 02:50:25 UTC 2022
           Final Date: Mon Nov 01 02:50:24 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e1:2e:25:60:cc:73:e6:32:2e:b9:17:18:1d:34:23:87:3d:49:95:8f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ad6fbde92c7967a575a9e0ee540ba2b2bfd3e1e9
                       e09429ebbe1f515713654ab56ecfe4a82bea373c
                       d3bd0a6a12a45ebdc511ffe218113f40e6eca069
                       3ffa42cabb4747d004518482ad1bef3b48b40f46
                       b32ed8141a768226e5b40247ce8c82a4d1fbb025
                       c56df8e5b3d6e9e8900a78b61457504c67ecc719
                       8729df5053864ea24a63f432c96d8f298fba7dbc
                       eefc802dac480ecfc0d200dc85cbad418de77b25
                       b46195ac9589c97395c79c846e59218fd4003713
                       070b0006eee2cd511878ed14c6e8eb82f2b9963e
                       14e8e521ede6ebfa2d593abf98cd118676c3375b
                       045e9a81cb0cf5b3df51e22aaa22b493ee31e422
                       1e7eb106a79824de47a5fe058c4b077a8b8529fc
                       d047fd41d642fc428ffdc86418f3853577dcf6b3
                       d6c4af26237062533d5f7973a74ac4d28424d9a4
                       077f48d1426a1b38786013d0607d9621dcb43667
                       bf1cbc822ddf7c2648f879a0bd637da4ca5ee0c5
                       57eb32b10e99e2f75deb15a5b04c538d1a42d06b
                       e398e248db1e3237a425d60fa8cbb5024e378cce
                       a42d0521
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5d:6b:f6:46:d6:7f:89:8a:34:03:25:73:d9:46:ca:d9:f2:69:fb:b5]
            modulus: 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
    public exponent: 10001

] 
2022-11-02 04:20:11.693  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-02 04:20:11.694 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-02 04:20:11.695 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-02 04:20:11.696 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-02 04:20:11.696  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-02 04:20:11.697  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-02 04:20:11.697  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-02 04:20:11.697 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-02 04:20:11.698 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-02 04:20:11.698 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-02 04:20:11.703 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-02 04:20:11.703 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-02 04:20:11.704 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-02 04:20:11.704 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-02 04:20:11.824  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-02 04:20:11.825  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-02 04:20:11.825 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-02 04:20:11.825 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-02 04:20:11.827  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-02 04:20:11.828  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-02 04:20:11.828 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-02 04:20:11.829 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-02 04:20:11.829 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-02 04:20:11.830 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-02 04:20:11.830 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-02 04:20:11.830 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-02 04:20:11.831 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-02 04:20:11.832 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-02 04:20:11.832 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-02 04:20:11.833 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-02 04:20:11.837 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 725916378755123069895397563436528930287468036649
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 02 02:50:25 UTC 2022
           Final Date: Mon Nov 01 02:50:24 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e1:2e:25:60:cc:73:e6:32:2e:b9:17:18:1d:34:23:87:3d:49:95:8f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ad6fbde92c7967a575a9e0ee540ba2b2bfd3e1e9
                       e09429ebbe1f515713654ab56ecfe4a82bea373c
                       d3bd0a6a12a45ebdc511ffe218113f40e6eca069
                       3ffa42cabb4747d004518482ad1bef3b48b40f46
                       b32ed8141a768226e5b40247ce8c82a4d1fbb025
                       c56df8e5b3d6e9e8900a78b61457504c67ecc719
                       8729df5053864ea24a63f432c96d8f298fba7dbc
                       eefc802dac480ecfc0d200dc85cbad418de77b25
                       b46195ac9589c97395c79c846e59218fd4003713
                       070b0006eee2cd511878ed14c6e8eb82f2b9963e
                       14e8e521ede6ebfa2d593abf98cd118676c3375b
                       045e9a81cb0cf5b3df51e22aaa22b493ee31e422
                       1e7eb106a79824de47a5fe058c4b077a8b8529fc
                       d047fd41d642fc428ffdc86418f3853577dcf6b3
                       d6c4af26237062533d5f7973a74ac4d28424d9a4
                       077f48d1426a1b38786013d0607d9621dcb43667
                       bf1cbc822ddf7c2648f879a0bd637da4ca5ee0c5
                       57eb32b10e99e2f75deb15a5b04c538d1a42d06b
                       e398e248db1e3237a425d60fa8cbb5024e378cce
                       a42d0521
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f9:e5:0e:fc:84:cc:b2:4b:84:e2:50:55:7d:70:b3:7c:d6:94:6a:a1]
            modulus: d860ab93090c0be76dc851bd268214b36fe0ac87ec4cca61ad0b7fe88f5a4356faa7f81ff08548d5b1923a539ee57d2685744a8635694feeaeda703beed5e30412392c2b3f8c9a8347ad6056232670a5182da1707dc36eb017084a63b6cdb26d303c43fc75d1db60928d95ea6c52c83b42b7e4c22de75ac25523b784c54c29b6aa87ff26247fd9098685ec3f6a1551cba7422b58e3489e9a77f53a302010d4b162b2a40776a6e43c70249b0f0cc839ab2f12ca665a7e1ea23be1d1cdedde1b75ac0ab31f434813a0ecc02a323e6421bcd8da70f18baaf3e0ea2dcae8642afa638a3820e92d197d6ef705ae4c027f063761599d0dae57eb85c5854663caa593bd
    public exponent: 10001

] 
2022-11-02 04:22:55.469  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-02 04:22:55.473 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-02 04:22:55.476 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-02 04:22:55.477 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-02 04:22:55.478  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-02 04:22:55.479  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-02 04:22:55.479  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-02 04:22:55.480 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-02 04:22:55.481 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-02 04:22:55.481 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-02 04:22:55.487 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-02 04:22:55.488 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-02 04:22:55.489 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-02 04:22:55.489 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-02 04:22:55.648  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-02 04:22:55.649  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-02 04:22:55.650 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-02 04:22:55.650 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-02 04:22:55.652  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-02 04:22:55.653  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-02 04:22:55.654 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-02 04:22:55.654 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-02 04:22:55.655 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-02 04:22:55.657 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-02 04:22:55.658 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-02 04:22:55.658 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-02 04:22:55.660 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-02 04:22:55.661 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-02 04:22:55.661 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-02 04:22:55.663 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-02 04:22:55.668 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 725916378755123069895397563436528930287468036649
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 02 02:50:25 UTC 2022
           Final Date: Mon Nov 01 02:50:24 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e1:2e:25:60:cc:73:e6:32:2e:b9:17:18:1d:34:23:87:3d:49:95:8f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ad6fbde92c7967a575a9e0ee540ba2b2bfd3e1e9
                       e09429ebbe1f515713654ab56ecfe4a82bea373c
                       d3bd0a6a12a45ebdc511ffe218113f40e6eca069
                       3ffa42cabb4747d004518482ad1bef3b48b40f46
                       b32ed8141a768226e5b40247ce8c82a4d1fbb025
                       c56df8e5b3d6e9e8900a78b61457504c67ecc719
                       8729df5053864ea24a63f432c96d8f298fba7dbc
                       eefc802dac480ecfc0d200dc85cbad418de77b25
                       b46195ac9589c97395c79c846e59218fd4003713
                       070b0006eee2cd511878ed14c6e8eb82f2b9963e
                       14e8e521ede6ebfa2d593abf98cd118676c3375b
                       045e9a81cb0cf5b3df51e22aaa22b493ee31e422
                       1e7eb106a79824de47a5fe058c4b077a8b8529fc
                       d047fd41d642fc428ffdc86418f3853577dcf6b3
                       d6c4af26237062533d5f7973a74ac4d28424d9a4
                       077f48d1426a1b38786013d0607d9621dcb43667
                       bf1cbc822ddf7c2648f879a0bd637da4ca5ee0c5
                       57eb32b10e99e2f75deb15a5b04c538d1a42d06b
                       e398e248db1e3237a425d60fa8cbb5024e378cce
                       a42d0521
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f3:6e:59:ed:db:c1:28:8b:3f:2c:f3:cc:80:83:96:7e:6d:91:24:9a]
            modulus: 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
    public exponent: 10001

] 
2022-11-02 04:29:03.216  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-02 04:29:03.219 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-02 04:29:03.222 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-02 04:29:03.223 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-02 04:29:03.224  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-02 04:29:03.225  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-02 04:29:03.225  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-02 04:29:03.225 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-02 04:29:03.226 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-02 04:29:03.226 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-02 04:29:03.233 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-02 04:29:03.234 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-02 04:29:03.234 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-02 04:29:03.235 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-02 04:29:03.368  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-02 04:29:03.369  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-02 04:29:03.369 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-02 04:29:03.370 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-02 04:29:03.372  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-02 04:29:03.372  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-02 04:29:03.373 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-02 04:29:03.373 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-02 04:29:03.373 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-02 04:29:03.374 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-02 04:29:03.375 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-02 04:29:03.375 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-02 04:29:03.376 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-02 04:29:03.376 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-02 04:29:03.376 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-02 04:29:03.377 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-02 04:29:03.383 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 725916378755123069895397563436528930287468036649
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 02 02:50:25 UTC 2022
           Final Date: Mon Nov 01 02:50:24 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e1:2e:25:60:cc:73:e6:32:2e:b9:17:18:1d:34:23:87:3d:49:95:8f]
            modulus: cf4a089b5eeb58b4b53e43012f305dcf1b38a833bf131aa349bdfde5cba1d2280e4272f9da4f8440325d4084ace7a3694110a062db2a7f645f3aaf34fe3696bff8ab2e785c72cb4137cc66bf3aba54e0a1094672ce74ee290ba143de79408398b160cbad2c9bf0685282d597d0829add94198e37c5d0ebcf3d2af09e1cb24e0bdabfcdcf59c683d06d22759503c54ee38954976861ac0cdad269de75f8444b9b5980bf34892bc8437bb11ce9a153c2eac2a9f8a301aff34636fdff131c9845e7e1600628aa0b6f851df858eb45d7aef2bb5409deaf672ef4965f5d9a13daca3f63f84c9107f2200803139d570895e3a9590c68a29ce3df6d9e92597224c5d19fe8c48fb174f12f45ff7542873f5592eb0c22bd61095af99687529dcf6bcb2ea0d6560c8a5e3bb4c63271d73138917405fa8f8e5fab86ceb2cee7b7aad4227389b741e72a3ddbf87d62e6c106f19ea496f8aef66e74cde957c6e28d7401f64b84a8f988574b84a655783a7445de374eea5f317921b635d8261c123587759a6c8d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ad6fbde92c7967a575a9e0ee540ba2b2bfd3e1e9
                       e09429ebbe1f515713654ab56ecfe4a82bea373c
                       d3bd0a6a12a45ebdc511ffe218113f40e6eca069
                       3ffa42cabb4747d004518482ad1bef3b48b40f46
                       b32ed8141a768226e5b40247ce8c82a4d1fbb025
                       c56df8e5b3d6e9e8900a78b61457504c67ecc719
                       8729df5053864ea24a63f432c96d8f298fba7dbc
                       eefc802dac480ecfc0d200dc85cbad418de77b25
                       b46195ac9589c97395c79c846e59218fd4003713
                       070b0006eee2cd511878ed14c6e8eb82f2b9963e
                       14e8e521ede6ebfa2d593abf98cd118676c3375b
                       045e9a81cb0cf5b3df51e22aaa22b493ee31e422
                       1e7eb106a79824de47a5fe058c4b077a8b8529fc
                       d047fd41d642fc428ffdc86418f3853577dcf6b3
                       d6c4af26237062533d5f7973a74ac4d28424d9a4
                       077f48d1426a1b38786013d0607d9621dcb43667
                       bf1cbc822ddf7c2648f879a0bd637da4ca5ee0c5
                       57eb32b10e99e2f75deb15a5b04c538d1a42d06b
                       e398e248db1e3237a425d60fa8cbb5024e378cce
                       a42d0521
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d3:93:0e:ed:90:ae:db:67:0e:d6:4d:54:0f:f6:ca:e9:a5:01:88:21]
            modulus: 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
    public exponent: 10001

] 
2022-11-02 04:33:28.791  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-02 04:33:28.792 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-02 04:33:28.794 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-02 04:33:28.795 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-02 04:33:28.796  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-02 04:33:28.797  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-02 04:33:28.797  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-02 04:33:28.798 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-02 04:33:28.798 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-02 04:33:28.799 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-02 04:33:28.805 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-02 04:33:28.806 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-02 04:33:28.806 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-02 04:33:28.806 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-02 04:33:28.949  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-02 04:33:28.950  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-02 04:33:28.950 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-02 04:33:28.951 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-02 04:33:28.952  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-02 04:33:28.953  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-02 04:33:28.953 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-02 04:33:28.954 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-02 04:33:28.954 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-02 04:33:28.955 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-02 04:33:28.955 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-02 04:33:28.956 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-02 04:33:28.957 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-02 04:33:28.957 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-02 04:33:28.957 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-02 04:33:28.958 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-02 04:33:28.962 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 725916378755123069895397563436528930287468036649
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 02 02:50:25 UTC 2022
           Final Date: Mon Nov 01 02:50:24 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e1:2e:25:60:cc:73:e6:32:2e:b9:17:18:1d:34:23:87:3d:49:95:8f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ad6fbde92c7967a575a9e0ee540ba2b2bfd3e1e9
                       e09429ebbe1f515713654ab56ecfe4a82bea373c
                       d3bd0a6a12a45ebdc511ffe218113f40e6eca069
                       3ffa42cabb4747d004518482ad1bef3b48b40f46
                       b32ed8141a768226e5b40247ce8c82a4d1fbb025
                       c56df8e5b3d6e9e8900a78b61457504c67ecc719
                       8729df5053864ea24a63f432c96d8f298fba7dbc
                       eefc802dac480ecfc0d200dc85cbad418de77b25
                       b46195ac9589c97395c79c846e59218fd4003713
                       070b0006eee2cd511878ed14c6e8eb82f2b9963e
                       14e8e521ede6ebfa2d593abf98cd118676c3375b
                       045e9a81cb0cf5b3df51e22aaa22b493ee31e422
                       1e7eb106a79824de47a5fe058c4b077a8b8529fc
                       d047fd41d642fc428ffdc86418f3853577dcf6b3
                       d6c4af26237062533d5f7973a74ac4d28424d9a4
                       077f48d1426a1b38786013d0607d9621dcb43667
                       bf1cbc822ddf7c2648f879a0bd637da4ca5ee0c5
                       57eb32b10e99e2f75deb15a5b04c538d1a42d06b
                       e398e248db1e3237a425d60fa8cbb5024e378cce
                       a42d0521
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5b:a8:b9:8b:07:3c:2f:fb:3a:1e:7a:40:64:22:5e:3c:d5:73:b7:dd]
            modulus: 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
    public exponent: 10001

] 
2022-11-02 04:39:34.239  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-02 04:39:34.242 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-02 04:39:34.245 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-02 04:39:34.246 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-02 04:39:34.246  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-02 04:39:34.247  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-02 04:39:34.248  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-02 04:39:34.248 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-02 04:39:34.249 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-02 04:39:34.250 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-02 04:39:34.258 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-02 04:39:34.260 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-02 04:39:34.260 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-02 04:39:34.261 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-02 04:39:34.379  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-02 04:39:34.379  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-02 04:39:34.380 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-02 04:39:34.380 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-02 04:39:34.382  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-02 04:39:34.382  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-02 04:39:34.382 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-02 04:39:34.383 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-02 04:39:34.383 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-02 04:39:34.384 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-02 04:39:34.384 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-02 04:39:34.384 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-02 04:39:34.385 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-02 04:39:34.385 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-02 04:39:34.385 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-02 04:39:34.386 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-02 04:39:34.390 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 725916378755123069895397563436528930287468036649
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 02 02:50:25 UTC 2022
           Final Date: Mon Nov 01 02:50:24 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e1:2e:25:60:cc:73:e6:32:2e:b9:17:18:1d:34:23:87:3d:49:95:8f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ad6fbde92c7967a575a9e0ee540ba2b2bfd3e1e9
                       e09429ebbe1f515713654ab56ecfe4a82bea373c
                       d3bd0a6a12a45ebdc511ffe218113f40e6eca069
                       3ffa42cabb4747d004518482ad1bef3b48b40f46
                       b32ed8141a768226e5b40247ce8c82a4d1fbb025
                       c56df8e5b3d6e9e8900a78b61457504c67ecc719
                       8729df5053864ea24a63f432c96d8f298fba7dbc
                       eefc802dac480ecfc0d200dc85cbad418de77b25
                       b46195ac9589c97395c79c846e59218fd4003713
                       070b0006eee2cd511878ed14c6e8eb82f2b9963e
                       14e8e521ede6ebfa2d593abf98cd118676c3375b
                       045e9a81cb0cf5b3df51e22aaa22b493ee31e422
                       1e7eb106a79824de47a5fe058c4b077a8b8529fc
                       d047fd41d642fc428ffdc86418f3853577dcf6b3
                       d6c4af26237062533d5f7973a74ac4d28424d9a4
                       077f48d1426a1b38786013d0607d9621dcb43667
                       bf1cbc822ddf7c2648f879a0bd637da4ca5ee0c5
                       57eb32b10e99e2f75deb15a5b04c538d1a42d06b
                       e398e248db1e3237a425d60fa8cbb5024e378cce
                       a42d0521
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [be:4c:cc:2d:07:dd:cb:7a:de:ef:e5:0f:bf:82:ff:5c:08:95:3b:51]
            modulus: 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
    public exponent: 10001

] 
2022-11-02 04:45:03.539  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-02 04:45:03.543 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-02 04:45:03.546 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-02 04:45:03.548 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-02 04:45:03.548  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-02 04:45:03.549  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-02 04:45:03.550  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-02 04:45:03.550 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-02 04:45:03.551 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-02 04:45:03.551 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-02 04:45:03.557 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-02 04:45:03.558 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-02 04:45:03.559 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-02 04:45:03.559 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-02 04:45:03.661  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-02 04:45:03.662  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-02 04:45:03.663 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-02 04:45:03.663 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-02 04:45:03.665  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-02 04:45:03.665  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-02 04:45:03.666 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-02 04:45:03.666 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-02 04:45:03.667 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-02 04:45:03.668 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-02 04:45:03.668 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-02 04:45:03.669 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-02 04:45:03.670 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-02 04:45:03.670 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-02 04:45:03.670 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-02 04:45:03.671 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-02 04:45:03.676 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 725916378755123069895397563436528930287468036649
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 02 02:50:25 UTC 2022
           Final Date: Mon Nov 01 02:50:24 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e1:2e:25:60:cc:73:e6:32:2e:b9:17:18:1d:34:23:87:3d:49:95:8f]
            modulus: cf4a089b5eeb58b4b53e43012f305dcf1b38a833bf131aa349bdfde5cba1d2280e4272f9da4f8440325d4084ace7a3694110a062db2a7f645f3aaf34fe3696bff8ab2e785c72cb4137cc66bf3aba54e0a1094672ce74ee290ba143de79408398b160cbad2c9bf0685282d597d0829add94198e37c5d0ebcf3d2af09e1cb24e0bdabfcdcf59c683d06d22759503c54ee38954976861ac0cdad269de75f8444b9b5980bf34892bc8437bb11ce9a153c2eac2a9f8a301aff34636fdff131c9845e7e1600628aa0b6f851df858eb45d7aef2bb5409deaf672ef4965f5d9a13daca3f63f84c9107f2200803139d570895e3a9590c68a29ce3df6d9e92597224c5d19fe8c48fb174f12f45ff7542873f5592eb0c22bd61095af99687529dcf6bcb2ea0d6560c8a5e3bb4c63271d73138917405fa8f8e5fab86ceb2cee7b7aad4227389b741e72a3ddbf87d62e6c106f19ea496f8aef66e74cde957c6e28d7401f64b84a8f988574b84a655783a7445de374eea5f317921b635d8261c123587759a6c8d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ad6fbde92c7967a575a9e0ee540ba2b2bfd3e1e9
                       e09429ebbe1f515713654ab56ecfe4a82bea373c
                       d3bd0a6a12a45ebdc511ffe218113f40e6eca069
                       3ffa42cabb4747d004518482ad1bef3b48b40f46
                       b32ed8141a768226e5b40247ce8c82a4d1fbb025
                       c56df8e5b3d6e9e8900a78b61457504c67ecc719
                       8729df5053864ea24a63f432c96d8f298fba7dbc
                       eefc802dac480ecfc0d200dc85cbad418de77b25
                       b46195ac9589c97395c79c846e59218fd4003713
                       070b0006eee2cd511878ed14c6e8eb82f2b9963e
                       14e8e521ede6ebfa2d593abf98cd118676c3375b
                       045e9a81cb0cf5b3df51e22aaa22b493ee31e422
                       1e7eb106a79824de47a5fe058c4b077a8b8529fc
                       d047fd41d642fc428ffdc86418f3853577dcf6b3
                       d6c4af26237062533d5f7973a74ac4d28424d9a4
                       077f48d1426a1b38786013d0607d9621dcb43667
                       bf1cbc822ddf7c2648f879a0bd637da4ca5ee0c5
                       57eb32b10e99e2f75deb15a5b04c538d1a42d06b
                       e398e248db1e3237a425d60fa8cbb5024e378cce
                       a42d0521
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [40:cf:74:20:81:7e:06:53:a0:4e:b8:fb:a3:75:e3:63:e4:26:a1:9d]
            modulus: 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
    public exponent: 10001

] 
2022-11-02 04:45:26.430  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-02 04:45:26.432 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-02 04:45:26.433 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-02 04:45:26.433 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-02 04:45:26.433  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-02 04:45:26.434  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-02 04:45:26.435  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-02 04:45:26.435 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-02 04:45:26.435 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-02 04:45:26.436 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-02 04:45:26.440 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-02 04:45:26.441 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-02 04:45:26.441 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-02 04:45:26.441 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-02 04:45:26.552  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-02 04:45:26.552  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-02 04:45:26.553 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-02 04:45:26.553 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-02 04:45:26.555  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-02 04:45:26.555  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-02 04:45:26.556 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-02 04:45:26.556 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-02 04:45:26.556 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-02 04:45:26.557 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-02 04:45:26.557 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-02 04:45:26.557 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-02 04:45:26.558 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-02 04:45:26.558 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-02 04:45:26.559 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-02 04:45:26.559 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-02 04:45:26.563 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 725916378755123069895397563436528930287468036649
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 02 02:50:25 UTC 2022
           Final Date: Mon Nov 01 02:50:24 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e1:2e:25:60:cc:73:e6:32:2e:b9:17:18:1d:34:23:87:3d:49:95:8f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ad6fbde92c7967a575a9e0ee540ba2b2bfd3e1e9
                       e09429ebbe1f515713654ab56ecfe4a82bea373c
                       d3bd0a6a12a45ebdc511ffe218113f40e6eca069
                       3ffa42cabb4747d004518482ad1bef3b48b40f46
                       b32ed8141a768226e5b40247ce8c82a4d1fbb025
                       c56df8e5b3d6e9e8900a78b61457504c67ecc719
                       8729df5053864ea24a63f432c96d8f298fba7dbc
                       eefc802dac480ecfc0d200dc85cbad418de77b25
                       b46195ac9589c97395c79c846e59218fd4003713
                       070b0006eee2cd511878ed14c6e8eb82f2b9963e
                       14e8e521ede6ebfa2d593abf98cd118676c3375b
                       045e9a81cb0cf5b3df51e22aaa22b493ee31e422
                       1e7eb106a79824de47a5fe058c4b077a8b8529fc
                       d047fd41d642fc428ffdc86418f3853577dcf6b3
                       d6c4af26237062533d5f7973a74ac4d28424d9a4
                       077f48d1426a1b38786013d0607d9621dcb43667
                       bf1cbc822ddf7c2648f879a0bd637da4ca5ee0c5
                       57eb32b10e99e2f75deb15a5b04c538d1a42d06b
                       e398e248db1e3237a425d60fa8cbb5024e378cce
                       a42d0521
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f3:75:f2:8d:ae:0f:98:51:64:a1:a3:b9:88:e5:5e:ad:6e:20:bc:e5]
            modulus: 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
    public exponent: 10001

]