Results

By type

          2022-11-06 02:56:26,855 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-11-06 02:56:27,840 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-11-06 02:56:28.629  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Nov 06, 2022 2:56:30 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Nov 06, 2022 2:56:30 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Nov 06, 2022 2:56:30 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Nov 06, 2022 2:56:30 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-11-06 02:56:31.187 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-11-06 02:56:31.471  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-11-06 02:56:31.633  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-11-06 02:56:32.329 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-11-06 02:56:32.332 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-11-06 02:56:32.334 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-11-06 02:56:32.337 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-11-06 02:56:32.377 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-11-06 02:56:32.380 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-11-06 02:56:32.523 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-11-06 02:56:33.098 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Nov 06, 2022 2:56:33 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-11-06 02:56:33.986  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.89 seconds (JVM running for 9.803)
Nov 06, 2022 2:57:03 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-11-06 02:57:24.794  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-06 02:57:24.804 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-06 02:57:24.848 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-06 02:57:24.851 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-06 02:57:24.868  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-06 02:57:24.871  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-06 02:57:24.873  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-06 02:57:24.874 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-06 02:57:24.875 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 02:57:24.881 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-06 02:57:24.890 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-06 02:57:24.895 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-06 02:57:24.942 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-06 02:57:24.947 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 02:57:24.948 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 02:57:24.951 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 02:57:27.095  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-06 02:57:27.102  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-06 02:57:27.104 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-06 02:57:27.106 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 02:57:27.119  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-06 02:57:27.120  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-06 02:57:27.121 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 02:57:27.122 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 02:57:27.122 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 02:57:27.133 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 02:57:27.133 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 02:57:27.134 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 02:57:27.140 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 02:57:27.140 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 02:57:27.141 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 02:57:27.142 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-06 02:57:27.169 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 91406964376128204240651996369758983778924045075
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 06 02:54:27 UTC 2022
           Final Date: Fri Nov 05 02:54:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d4:8c:4a:4b:ea:48:9e:2e:c3:e9:82:82:93:42:67:29:0c:92:81:1f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 292558e13472ebe84ff3cf3f695a8d5966eb7807
                       9bccb725082e5afb9478342892eb39db5fc945ea
                       bf78f8d962f7c2c196b7c9c3aa9851d613d310fd
                       c99dafb21a27414526b552188cd3f1eb430afa13
                       2cb08391c73d24849f20586f4ea9c1080a88c1b1
                       fca23867a74749bf75097f2d6f498430c1e15005
                       3b9b111d777aacb3101d3128877f0f569e415909
                       ef615fc93bc89cf660d2724906c1fe37e228c78f
                       0a065cf5e993857ca7e007a322afe551655180fa
                       d1e8bea262b401968cf7be3a9a67bfa2822c50ad
                       c6610a99ad74161bc6ec1180a52f423d0512f64c
                       3bfd797c00ed4fe9fb490b55318db443b828faa9
                       ee07b551ed8fc799a6403903e0302462e373ba2c
                       dfc3830171ffdac1128a306ba7e562e5ac71750c
                       dfce8b1257ffd9954a150de1c4dfd643f2a7620a
                       1431e178e3945228ec2a5aecdfadd50a0eded46a
                       7246abbb28a21e72d035bec22f97c2a887c923b6
                       1577cae3faeec5a1651b7f1c92d4bf658a9f96fe
                       49d27686762b63e311d8fc474b7808eb4b91cc99
                       261737d4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [87:a5:02:04:99:2c:b3:90:5f:30:da:ff:7b:e7:8b:c1:a9:9b:a2:ef]
            modulus: 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
    public exponent: 10001

] 
2022-11-06 04:10:11.633  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-06 04:10:11.636 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-06 04:10:11.639 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-06 04:10:11.641 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-06 04:10:11.642  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-06 04:10:11.643  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-06 04:10:11.644  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-06 04:10:11.645 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-06 04:10:11.645 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-06 04:10:11.646 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-06 04:10:11.669 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-06 04:10:11.671 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 04:10:11.672 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 04:10:11.672 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 04:10:11.900  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-06 04:10:11.901  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-06 04:10:11.901 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-06 04:10:11.902 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 04:10:11.906  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-06 04:10:11.906  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-06 04:10:11.907 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 04:10:11.908 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 04:10:11.908 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 04:10:11.909 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 04:10:11.910 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 04:10:11.910 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 04:10:11.911 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 04:10:11.912 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 04:10:11.912 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 04:10:11.914 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-06 04:10:11.920 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 91406964376128204240651996369758983778924045075
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 06 02:54:27 UTC 2022
           Final Date: Fri Nov 05 02:54:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d4:8c:4a:4b:ea:48:9e:2e:c3:e9:82:82:93:42:67:29:0c:92:81:1f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 292558e13472ebe84ff3cf3f695a8d5966eb7807
                       9bccb725082e5afb9478342892eb39db5fc945ea
                       bf78f8d962f7c2c196b7c9c3aa9851d613d310fd
                       c99dafb21a27414526b552188cd3f1eb430afa13
                       2cb08391c73d24849f20586f4ea9c1080a88c1b1
                       fca23867a74749bf75097f2d6f498430c1e15005
                       3b9b111d777aacb3101d3128877f0f569e415909
                       ef615fc93bc89cf660d2724906c1fe37e228c78f
                       0a065cf5e993857ca7e007a322afe551655180fa
                       d1e8bea262b401968cf7be3a9a67bfa2822c50ad
                       c6610a99ad74161bc6ec1180a52f423d0512f64c
                       3bfd797c00ed4fe9fb490b55318db443b828faa9
                       ee07b551ed8fc799a6403903e0302462e373ba2c
                       dfc3830171ffdac1128a306ba7e562e5ac71750c
                       dfce8b1257ffd9954a150de1c4dfd643f2a7620a
                       1431e178e3945228ec2a5aecdfadd50a0eded46a
                       7246abbb28a21e72d035bec22f97c2a887c923b6
                       1577cae3faeec5a1651b7f1c92d4bf658a9f96fe
                       49d27686762b63e311d8fc474b7808eb4b91cc99
                       261737d4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9b:3e:23:f4:5c:31:fc:9e:12:dc:f9:e3:9d:be:52:3c:b8:92:a4:38]
            modulus: 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
    public exponent: 10001

] 
2022-11-06 04:11:43.959  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-06 04:11:43.961 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-06 04:11:43.962 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-06 04:11:43.963 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-06 04:11:43.964  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-06 04:11:43.965  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-06 04:11:43.966  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-06 04:11:43.966 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-06 04:11:43.966 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-06 04:11:43.967 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-06 04:11:43.983 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-06 04:11:43.985 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 04:11:43.985 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 04:11:43.985 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 04:11:44.145  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-06 04:11:44.146  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-06 04:11:44.147 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-06 04:11:44.147 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 04:11:44.150  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-06 04:11:44.150  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-06 04:11:44.151 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 04:11:44.151 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 04:11:44.152 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 04:11:44.153 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 04:11:44.153 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 04:11:44.154 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 04:11:44.154 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 04:11:44.155 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 04:11:44.155 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 04:11:44.156 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-06 04:11:44.160 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 91406964376128204240651996369758983778924045075
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 06 02:54:27 UTC 2022
           Final Date: Fri Nov 05 02:54:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d4:8c:4a:4b:ea:48:9e:2e:c3:e9:82:82:93:42:67:29:0c:92:81:1f]
            modulus: af5d8840e3b07c2cc0ce43d7668a28d712bf14d7e5716a48900ab9a1c27a07ef40ab5186b706eccd1701fa5585ab18fb30e5d25218dc32138a2777e7bf5831927262f4d3fcd60509b99e701ec6cfbf767a30d07285f649d1c57b60310763d191ec9ecf7c2fdc2afe95f5ffe4b0f5227898e8eaa1aed5fe4d2b0f088f730232f2621e991cd0dc052c003084ca28f226a2e107c48f6ca24f19e1f05140c480ce9ddce43dbe05fd288f3ab97120856c38eb10a986da5ca86e364e1408a08087ad85da37f56187eb5638f3c9507ab4eb4945a911191fbbe89cc0aa50575c88111e3d4b20ee9230cb904fdb9b1f5b25e2426b5c05f23aaf82c9a084b0d0aba9e03f7c24546e4622efe985e3e18991d900a14d333c7abc638ce5eb213a1fdc9d7ef817e1d4de3173ff618fb21749845cb26d829f3bcde72f6348b7735f61d5039a43ba1152303f54f5fba80646760cd5ca7410c7e12e007477897fa4d6df96d881f4862584b16dc102dd39b11c71e4e778d3bfccde0efd1dbf76815b5d6f11d720853f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 292558e13472ebe84ff3cf3f695a8d5966eb7807
                       9bccb725082e5afb9478342892eb39db5fc945ea
                       bf78f8d962f7c2c196b7c9c3aa9851d613d310fd
                       c99dafb21a27414526b552188cd3f1eb430afa13
                       2cb08391c73d24849f20586f4ea9c1080a88c1b1
                       fca23867a74749bf75097f2d6f498430c1e15005
                       3b9b111d777aacb3101d3128877f0f569e415909
                       ef615fc93bc89cf660d2724906c1fe37e228c78f
                       0a065cf5e993857ca7e007a322afe551655180fa
                       d1e8bea262b401968cf7be3a9a67bfa2822c50ad
                       c6610a99ad74161bc6ec1180a52f423d0512f64c
                       3bfd797c00ed4fe9fb490b55318db443b828faa9
                       ee07b551ed8fc799a6403903e0302462e373ba2c
                       dfc3830171ffdac1128a306ba7e562e5ac71750c
                       dfce8b1257ffd9954a150de1c4dfd643f2a7620a
                       1431e178e3945228ec2a5aecdfadd50a0eded46a
                       7246abbb28a21e72d035bec22f97c2a887c923b6
                       1577cae3faeec5a1651b7f1c92d4bf658a9f96fe
                       49d27686762b63e311d8fc474b7808eb4b91cc99
                       261737d4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d6:af:f6:08:59:43:dc:19:d0:f3:37:7e:8d:53:a3:e3:2d:d1:fc:90]
            modulus: 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
    public exponent: 10001

] 
2022-11-06 04:13:05.357  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-06 04:13:05.359 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-06 04:13:05.361 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-06 04:13:05.361 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-06 04:13:05.362  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-06 04:13:05.363  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-06 04:13:05.363  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-06 04:13:05.364 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-06 04:13:05.364 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-06 04:13:05.365 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-06 04:13:05.371 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-06 04:13:05.372 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 04:13:05.372 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 04:13:05.372 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 04:13:05.504  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-06 04:13:05.505  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-06 04:13:05.505 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-06 04:13:05.505 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 04:13:05.508  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-06 04:13:05.508  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-06 04:13:05.509 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 04:13:05.509 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 04:13:05.510 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 04:13:05.511 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 04:13:05.511 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 04:13:05.512 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 04:13:05.513 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 04:13:05.513 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 04:13:05.514 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 04:13:05.515 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-06 04:13:05.518 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 91406964376128204240651996369758983778924045075
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 06 02:54:27 UTC 2022
           Final Date: Fri Nov 05 02:54:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d4:8c:4a:4b:ea:48:9e:2e:c3:e9:82:82:93:42:67:29:0c:92:81:1f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 292558e13472ebe84ff3cf3f695a8d5966eb7807
                       9bccb725082e5afb9478342892eb39db5fc945ea
                       bf78f8d962f7c2c196b7c9c3aa9851d613d310fd
                       c99dafb21a27414526b552188cd3f1eb430afa13
                       2cb08391c73d24849f20586f4ea9c1080a88c1b1
                       fca23867a74749bf75097f2d6f498430c1e15005
                       3b9b111d777aacb3101d3128877f0f569e415909
                       ef615fc93bc89cf660d2724906c1fe37e228c78f
                       0a065cf5e993857ca7e007a322afe551655180fa
                       d1e8bea262b401968cf7be3a9a67bfa2822c50ad
                       c6610a99ad74161bc6ec1180a52f423d0512f64c
                       3bfd797c00ed4fe9fb490b55318db443b828faa9
                       ee07b551ed8fc799a6403903e0302462e373ba2c
                       dfc3830171ffdac1128a306ba7e562e5ac71750c
                       dfce8b1257ffd9954a150de1c4dfd643f2a7620a
                       1431e178e3945228ec2a5aecdfadd50a0eded46a
                       7246abbb28a21e72d035bec22f97c2a887c923b6
                       1577cae3faeec5a1651b7f1c92d4bf658a9f96fe
                       49d27686762b63e311d8fc474b7808eb4b91cc99
                       261737d4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [24:c0:8d:8e:b1:ad:52:94:1c:da:9e:28:b8:b2:9f:a8:0e:f9:ac:e5]
            modulus: 9a16b64c79bba692dd8644c81c690cd4bee08670868c2d53970ce039b8974d2b86d74e5b0629a55274af200100d274654a009096df2463bac08cf240ce0d50829c71e9ec988fd9c2f0ca7c244b61b2c7a252d6b2f2cd4b4408137cfcc2b9b6c8432f2143d2592c2e5218833b2a45f11db149990c496165cee295306811ac9d29812d056bd15dc627c45b20a95bad37795b802f57af5dc188d8b6f303f08d6d9fe65d35df3a62b64a97735120a3aa8d032811ebd7d197dca374508d5e9446498fa0b410e07433ee4865d1950083efdd7e1fa76d28a7c65981adc65e02fdacfe202ef4aa902ff5171eea66fb7679022028c159ac93e73cab49323370ccae312dcd
    public exponent: 10001

] 
2022-11-06 04:14:43.609  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-06 04:14:43.612 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-06 04:14:43.614 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-06 04:14:43.615 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-06 04:14:43.616  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-06 04:14:43.617  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-06 04:14:43.617  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-06 04:14:43.618 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-06 04:14:43.618 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-06 04:14:43.619 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-06 04:14:43.624 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-06 04:14:43.625 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 04:14:43.626 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 04:14:43.626 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 04:14:43.802  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-06 04:14:43.803  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-06 04:14:43.804 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-06 04:14:43.804 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 04:14:43.806  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-06 04:14:43.807  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-06 04:14:43.808 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 04:14:43.808 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 04:14:43.809 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 04:14:43.810 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 04:14:43.810 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 04:14:43.811 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 04:14:43.812 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 04:14:43.812 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 04:14:43.813 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 04:14:43.813 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-06 04:14:43.817 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 91406964376128204240651996369758983778924045075
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 06 02:54:27 UTC 2022
           Final Date: Fri Nov 05 02:54:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d4:8c:4a:4b:ea:48:9e:2e:c3:e9:82:82:93:42:67:29:0c:92:81:1f]
            modulus: af5d8840e3b07c2cc0ce43d7668a28d712bf14d7e5716a48900ab9a1c27a07ef40ab5186b706eccd1701fa5585ab18fb30e5d25218dc32138a2777e7bf5831927262f4d3fcd60509b99e701ec6cfbf767a30d07285f649d1c57b60310763d191ec9ecf7c2fdc2afe95f5ffe4b0f5227898e8eaa1aed5fe4d2b0f088f730232f2621e991cd0dc052c003084ca28f226a2e107c48f6ca24f19e1f05140c480ce9ddce43dbe05fd288f3ab97120856c38eb10a986da5ca86e364e1408a08087ad85da37f56187eb5638f3c9507ab4eb4945a911191fbbe89cc0aa50575c88111e3d4b20ee9230cb904fdb9b1f5b25e2426b5c05f23aaf82c9a084b0d0aba9e03f7c24546e4622efe985e3e18991d900a14d333c7abc638ce5eb213a1fdc9d7ef817e1d4de3173ff618fb21749845cb26d829f3bcde72f6348b7735f61d5039a43ba1152303f54f5fba80646760cd5ca7410c7e12e007477897fa4d6df96d881f4862584b16dc102dd39b11c71e4e778d3bfccde0efd1dbf76815b5d6f11d720853f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 292558e13472ebe84ff3cf3f695a8d5966eb7807
                       9bccb725082e5afb9478342892eb39db5fc945ea
                       bf78f8d962f7c2c196b7c9c3aa9851d613d310fd
                       c99dafb21a27414526b552188cd3f1eb430afa13
                       2cb08391c73d24849f20586f4ea9c1080a88c1b1
                       fca23867a74749bf75097f2d6f498430c1e15005
                       3b9b111d777aacb3101d3128877f0f569e415909
                       ef615fc93bc89cf660d2724906c1fe37e228c78f
                       0a065cf5e993857ca7e007a322afe551655180fa
                       d1e8bea262b401968cf7be3a9a67bfa2822c50ad
                       c6610a99ad74161bc6ec1180a52f423d0512f64c
                       3bfd797c00ed4fe9fb490b55318db443b828faa9
                       ee07b551ed8fc799a6403903e0302462e373ba2c
                       dfc3830171ffdac1128a306ba7e562e5ac71750c
                       dfce8b1257ffd9954a150de1c4dfd643f2a7620a
                       1431e178e3945228ec2a5aecdfadd50a0eded46a
                       7246abbb28a21e72d035bec22f97c2a887c923b6
                       1577cae3faeec5a1651b7f1c92d4bf658a9f96fe
                       49d27686762b63e311d8fc474b7808eb4b91cc99
                       261737d4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [93:57:db:47:2b:d0:29:4f:e4:d5:0c:3a:d0:f1:73:2e:43:54:2e:a0]
            modulus: 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
    public exponent: 10001

] 
2022-11-06 04:21:33.181  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-06 04:21:33.183 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-06 04:21:33.185 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-06 04:21:33.185 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-06 04:21:33.199  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-06 04:21:33.200  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-06 04:21:33.200  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-06 04:21:33.201 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-06 04:21:33.201 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-06 04:21:33.201 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-06 04:21:33.209 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-06 04:21:33.209 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 04:21:33.210 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 04:21:33.210 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 04:21:33.374  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-06 04:21:33.375  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-06 04:21:33.375 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-06 04:21:33.376 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 04:21:33.377  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-06 04:21:33.378  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-06 04:21:33.378 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 04:21:33.379 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 04:21:33.379 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 04:21:33.380 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 04:21:33.380 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 04:21:33.381 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 04:21:33.382 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 04:21:33.383 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 04:21:33.383 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 04:21:33.384 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-06 04:21:33.389 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 91406964376128204240651996369758983778924045075
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 06 02:54:27 UTC 2022
           Final Date: Fri Nov 05 02:54:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d4:8c:4a:4b:ea:48:9e:2e:c3:e9:82:82:93:42:67:29:0c:92:81:1f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 292558e13472ebe84ff3cf3f695a8d5966eb7807
                       9bccb725082e5afb9478342892eb39db5fc945ea
                       bf78f8d962f7c2c196b7c9c3aa9851d613d310fd
                       c99dafb21a27414526b552188cd3f1eb430afa13
                       2cb08391c73d24849f20586f4ea9c1080a88c1b1
                       fca23867a74749bf75097f2d6f498430c1e15005
                       3b9b111d777aacb3101d3128877f0f569e415909
                       ef615fc93bc89cf660d2724906c1fe37e228c78f
                       0a065cf5e993857ca7e007a322afe551655180fa
                       d1e8bea262b401968cf7be3a9a67bfa2822c50ad
                       c6610a99ad74161bc6ec1180a52f423d0512f64c
                       3bfd797c00ed4fe9fb490b55318db443b828faa9
                       ee07b551ed8fc799a6403903e0302462e373ba2c
                       dfc3830171ffdac1128a306ba7e562e5ac71750c
                       dfce8b1257ffd9954a150de1c4dfd643f2a7620a
                       1431e178e3945228ec2a5aecdfadd50a0eded46a
                       7246abbb28a21e72d035bec22f97c2a887c923b6
                       1577cae3faeec5a1651b7f1c92d4bf658a9f96fe
                       49d27686762b63e311d8fc474b7808eb4b91cc99
                       261737d4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [68:34:35:80:4c:d8:91:e9:e5:86:3c:cb:88:c7:d6:18:62:9d:a5:72]
            modulus: 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
    public exponent: 10001

] 
2022-11-06 04:25:22.955  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-06 04:25:22.959 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-06 04:25:22.962 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-06 04:25:22.964 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-06 04:25:22.964  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-06 04:25:22.965  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-06 04:25:22.965  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-06 04:25:22.966 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-06 04:25:22.967 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-06 04:25:22.967 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-06 04:25:22.973 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-06 04:25:22.974 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 04:25:22.975 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 04:25:22.975 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 04:25:23.140  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-06 04:25:23.141  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-06 04:25:23.141 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-06 04:25:23.142 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 04:25:23.143  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-06 04:25:23.144  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-06 04:25:23.144 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 04:25:23.144 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 04:25:23.145 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 04:25:23.145 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 04:25:23.146 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 04:25:23.146 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 04:25:23.147 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 04:25:23.147 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 04:25:23.148 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 04:25:23.148 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-06 04:25:23.153 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 91406964376128204240651996369758983778924045075
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 06 02:54:27 UTC 2022
           Final Date: Fri Nov 05 02:54:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d4:8c:4a:4b:ea:48:9e:2e:c3:e9:82:82:93:42:67:29:0c:92:81:1f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 292558e13472ebe84ff3cf3f695a8d5966eb7807
                       9bccb725082e5afb9478342892eb39db5fc945ea
                       bf78f8d962f7c2c196b7c9c3aa9851d613d310fd
                       c99dafb21a27414526b552188cd3f1eb430afa13
                       2cb08391c73d24849f20586f4ea9c1080a88c1b1
                       fca23867a74749bf75097f2d6f498430c1e15005
                       3b9b111d777aacb3101d3128877f0f569e415909
                       ef615fc93bc89cf660d2724906c1fe37e228c78f
                       0a065cf5e993857ca7e007a322afe551655180fa
                       d1e8bea262b401968cf7be3a9a67bfa2822c50ad
                       c6610a99ad74161bc6ec1180a52f423d0512f64c
                       3bfd797c00ed4fe9fb490b55318db443b828faa9
                       ee07b551ed8fc799a6403903e0302462e373ba2c
                       dfc3830171ffdac1128a306ba7e562e5ac71750c
                       dfce8b1257ffd9954a150de1c4dfd643f2a7620a
                       1431e178e3945228ec2a5aecdfadd50a0eded46a
                       7246abbb28a21e72d035bec22f97c2a887c923b6
                       1577cae3faeec5a1651b7f1c92d4bf658a9f96fe
                       49d27686762b63e311d8fc474b7808eb4b91cc99
                       261737d4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7b:bc:aa:a6:a2:64:17:5e:ae:94:11:b6:29:28:5b:1f:ab:16:ce:15]
            modulus: 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
    public exponent: 10001

] 
2022-11-06 04:31:55.011  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-06 04:31:55.012 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-06 04:31:55.014 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-06 04:31:55.014 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-06 04:31:55.015  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-06 04:31:55.015  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-06 04:31:55.016  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-06 04:31:55.016 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-06 04:31:55.016 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-06 04:31:55.017 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-06 04:31:55.022 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-06 04:31:55.022 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 04:31:55.022 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 04:31:55.023 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 04:31:55.174  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-06 04:31:55.175  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-06 04:31:55.175 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-06 04:31:55.175 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 04:31:55.177  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-06 04:31:55.177  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-06 04:31:55.177 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 04:31:55.177 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 04:31:55.178 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 04:31:55.178 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 04:31:55.178 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 04:31:55.179 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 04:31:55.179 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 04:31:55.180 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 04:31:55.180 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 04:31:55.181 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-06 04:31:55.187 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 91406964376128204240651996369758983778924045075
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 06 02:54:27 UTC 2022
           Final Date: Fri Nov 05 02:54:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d4:8c:4a:4b:ea:48:9e:2e:c3:e9:82:82:93:42:67:29:0c:92:81:1f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 292558e13472ebe84ff3cf3f695a8d5966eb7807
                       9bccb725082e5afb9478342892eb39db5fc945ea
                       bf78f8d962f7c2c196b7c9c3aa9851d613d310fd
                       c99dafb21a27414526b552188cd3f1eb430afa13
                       2cb08391c73d24849f20586f4ea9c1080a88c1b1
                       fca23867a74749bf75097f2d6f498430c1e15005
                       3b9b111d777aacb3101d3128877f0f569e415909
                       ef615fc93bc89cf660d2724906c1fe37e228c78f
                       0a065cf5e993857ca7e007a322afe551655180fa
                       d1e8bea262b401968cf7be3a9a67bfa2822c50ad
                       c6610a99ad74161bc6ec1180a52f423d0512f64c
                       3bfd797c00ed4fe9fb490b55318db443b828faa9
                       ee07b551ed8fc799a6403903e0302462e373ba2c
                       dfc3830171ffdac1128a306ba7e562e5ac71750c
                       dfce8b1257ffd9954a150de1c4dfd643f2a7620a
                       1431e178e3945228ec2a5aecdfadd50a0eded46a
                       7246abbb28a21e72d035bec22f97c2a887c923b6
                       1577cae3faeec5a1651b7f1c92d4bf658a9f96fe
                       49d27686762b63e311d8fc474b7808eb4b91cc99
                       261737d4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [74:ec:cd:36:46:47:ad:f3:0b:e4:bd:ae:36:f1:40:53:ad:ca:f0:af]
            modulus: a0f0b9801f0cff23128959183f43ed5937a72bb03920ca045b2ff8e62f37d5c566ebf4ee5e350f07ad180787f17a9765dfb308b3cad722089c2c6cf1793634fbbc09c0946ed0d95fd58b011dcf2b5c1b775782f59180ba1ca3e1346b53af5f3472455209361fe0fa73bebe6f5165d16f1d6f2afaeb39df0a94011aebd23a1ffedd4b5dfe62f2b2de162871a7bba09e89149e041deaa3781ecf7fde90519c9e9c2bf52d87fe8f71523288c8c8618b73ee14c31fa246a7b62bf1ecd97de60f9555618a2615c8d2e8899e898f75799aee23345314a97c1f12a00f99c44ea2953201cbca531dcab59b7dc4aeac4158b0feef21caa39ed8974de24718702b1b7acec5
    public exponent: 10001

] 
2022-11-06 04:36:23.028  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-06 04:36:23.031 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-06 04:36:23.034 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-06 04:36:23.035 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-06 04:36:23.035  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-06 04:36:23.036  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-06 04:36:23.036  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-06 04:36:23.037 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-06 04:36:23.037 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-06 04:36:23.037 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-06 04:36:23.043 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-06 04:36:23.044 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 04:36:23.044 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 04:36:23.044 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 04:36:23.212  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-06 04:36:23.213  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-06 04:36:23.213 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-06 04:36:23.214 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 04:36:23.215  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-06 04:36:23.216  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-06 04:36:23.216 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 04:36:23.216 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 04:36:23.217 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 04:36:23.218 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 04:36:23.218 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 04:36:23.218 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 04:36:23.219 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 04:36:23.219 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 04:36:23.219 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 04:36:23.220 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-06 04:36:23.225 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 91406964376128204240651996369758983778924045075
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 06 02:54:27 UTC 2022
           Final Date: Fri Nov 05 02:54:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d4:8c:4a:4b:ea:48:9e:2e:c3:e9:82:82:93:42:67:29:0c:92:81:1f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 292558e13472ebe84ff3cf3f695a8d5966eb7807
                       9bccb725082e5afb9478342892eb39db5fc945ea
                       bf78f8d962f7c2c196b7c9c3aa9851d613d310fd
                       c99dafb21a27414526b552188cd3f1eb430afa13
                       2cb08391c73d24849f20586f4ea9c1080a88c1b1
                       fca23867a74749bf75097f2d6f498430c1e15005
                       3b9b111d777aacb3101d3128877f0f569e415909
                       ef615fc93bc89cf660d2724906c1fe37e228c78f
                       0a065cf5e993857ca7e007a322afe551655180fa
                       d1e8bea262b401968cf7be3a9a67bfa2822c50ad
                       c6610a99ad74161bc6ec1180a52f423d0512f64c
                       3bfd797c00ed4fe9fb490b55318db443b828faa9
                       ee07b551ed8fc799a6403903e0302462e373ba2c
                       dfc3830171ffdac1128a306ba7e562e5ac71750c
                       dfce8b1257ffd9954a150de1c4dfd643f2a7620a
                       1431e178e3945228ec2a5aecdfadd50a0eded46a
                       7246abbb28a21e72d035bec22f97c2a887c923b6
                       1577cae3faeec5a1651b7f1c92d4bf658a9f96fe
                       49d27686762b63e311d8fc474b7808eb4b91cc99
                       261737d4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e8:f6:2b:a3:42:06:dd:a8:12:97:26:33:c7:9a:8f:ab:23:64:3f:cc]
            modulus: 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
    public exponent: 10001

] 
2022-11-06 04:36:40.007  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-06 04:36:40.008 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-06 04:36:40.010 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-06 04:36:40.011 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-06 04:36:40.012  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-06 04:36:40.013  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-06 04:36:40.013  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-06 04:36:40.014 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-06 04:36:40.014 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-06 04:36:40.014 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-06 04:36:40.019 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-06 04:36:40.020 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 04:36:40.020 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 04:36:40.021 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 04:36:40.139  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-06 04:36:40.140  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-06 04:36:40.141 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-06 04:36:40.141 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 04:36:40.143  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-06 04:36:40.143  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-06 04:36:40.144 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 04:36:40.144 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 04:36:40.145 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 04:36:40.145 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 04:36:40.146 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 04:36:40.146 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 04:36:40.147 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 04:36:40.148 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 04:36:40.148 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 04:36:40.149 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-06 04:36:40.152 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 91406964376128204240651996369758983778924045075
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 06 02:54:27 UTC 2022
           Final Date: Fri Nov 05 02:54:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d4:8c:4a:4b:ea:48:9e:2e:c3:e9:82:82:93:42:67:29:0c:92:81:1f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 292558e13472ebe84ff3cf3f695a8d5966eb7807
                       9bccb725082e5afb9478342892eb39db5fc945ea
                       bf78f8d962f7c2c196b7c9c3aa9851d613d310fd
                       c99dafb21a27414526b552188cd3f1eb430afa13
                       2cb08391c73d24849f20586f4ea9c1080a88c1b1
                       fca23867a74749bf75097f2d6f498430c1e15005
                       3b9b111d777aacb3101d3128877f0f569e415909
                       ef615fc93bc89cf660d2724906c1fe37e228c78f
                       0a065cf5e993857ca7e007a322afe551655180fa
                       d1e8bea262b401968cf7be3a9a67bfa2822c50ad
                       c6610a99ad74161bc6ec1180a52f423d0512f64c
                       3bfd797c00ed4fe9fb490b55318db443b828faa9
                       ee07b551ed8fc799a6403903e0302462e373ba2c
                       dfc3830171ffdac1128a306ba7e562e5ac71750c
                       dfce8b1257ffd9954a150de1c4dfd643f2a7620a
                       1431e178e3945228ec2a5aecdfadd50a0eded46a
                       7246abbb28a21e72d035bec22f97c2a887c923b6
                       1577cae3faeec5a1651b7f1c92d4bf658a9f96fe
                       49d27686762b63e311d8fc474b7808eb4b91cc99
                       261737d4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [92:15:cf:5f:72:20:c4:89:69:3d:62:4d:37:4a:37:29:c7:c2:d4:14]
            modulus: a5b62b29b8343c0ddf76906b2619e03dd9ed2cc42af765e54a46c666f7082922f052417306a93c2ba96b88b6176c49b08d94ef929dc2fa3c36fdb74467660841ef9375ef7db4d7af2a2ca43777722df698d353076206994edb9243c15e45873fc33fdd1b65c39b8e9d9b001ecd4df3f217f475166ca96c4297341730fc236a04d45006bbc128c69c16d95ed21dcc10f68eeb683d588f60f0a71d1aedda08067de7603516aab4765b32eb633de1a9226a734979472bbac9dd8da3f97458e3ff076b498e95825b563b6fed523b397203e7c8ea20d5e4d99f134d6b82f76f2e42ef7d97f8124124536c78419d4d4d6e44ea00283cc9f1039a0bf97a016cb1a021a5
    public exponent: 10001

]