Results

By type

          2022-11-15 03:02:12,652 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-11-15 03:02:13,527 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-11-15 03:02:14.174  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Nov 15, 2022 3:02:15 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Nov 15, 2022 3:02:15 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Nov 15, 2022 3:02:15 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Nov 15, 2022 3:02:15 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-11-15 03:02:16.624 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-11-15 03:02:16.876  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-11-15 03:02:17.039  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-11-15 03:02:17.677 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-11-15 03:02:17.680 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-11-15 03:02:17.681 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-11-15 03:02:17.684 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-11-15 03:02:17.720 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-11-15 03:02:17.723 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-11-15 03:02:17.806 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-11-15 03:02:18.303 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Nov 15, 2022 3:02:19 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-11-15 03:02:19.234  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.262 seconds (JVM running for 8.591)
Nov 15, 2022 3:02:48 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-11-15 03:03:09.708  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-15 03:03:09.716 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-15 03:03:09.747 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-15 03:03:09.751 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-15 03:03:09.763  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-15 03:03:09.765  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-15 03:03:09.766  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-15 03:03:09.768 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-15 03:03:09.768 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 03:03:09.771 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-15 03:03:09.778 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-15 03:03:09.781 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-15 03:03:09.813 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-15 03:03:09.819 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 03:03:09.820 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 03:03:09.824 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 03:03:10.371  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-15 03:03:10.374  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-15 03:03:10.374 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-15 03:03:10.375 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 03:03:10.382  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-15 03:03:10.383  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-15 03:03:10.384 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 03:03:10.384 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 03:03:10.384 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 03:03:10.393 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 03:03:10.394 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 03:03:10.394 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 03:03:10.399 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 03:03:10.400 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 03:03:10.400 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 03:03:10.401 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-15 03:03:10.426 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 561824809579493790279822863592937895766905438676
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 15 02:58:56 UTC 2022
           Final Date: Sun Nov 14 02:58:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d9:42:9e:88:b4:3b:18:bd:55:2a:f5:c8:75:9d:0a:ad:03:b1:02:a9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 33b1a783642e6a906311b32598da708818b809c9
                       04a38c2a43ade183c02fb11f6c85a9bf6ac81238
                       1f21f9ea7932500f010e96f03df85dd1012e6d62
                       d5b8a8017d4c3ad377d8b58b7d3dba82429081a9
                       0b7eb5490a4e17978333bdca1eaae5337bf51cf2
                       7f4f110943950351cfc3808ddb702e4a193efabd
                       7f650c457b3bb157758bb5e34141153430eae297
                       8261ac59deaa8d3100f8e102a012de6081214167
                       20f91226b1e4169d4bb5d38778e81151dddef479
                       5c4c6f42ed7b917753114453b7f3aa04ce4ba1e4
                       4d762cc7a50543ebba248c930113d40643536273
                       d407ed4e05521bbcd30c9782d60847afb410b409
                       6de6d53516eca2cfa7d037f26109a3bbbeecec29
                       99b64f14b855704e67793094bdbd485811249f19
                       4b54d213c1110238ce3a7161d6039dab7ac97afd
                       9ed8b7b405a889666b68393a6d3fce835ac69766
                       1632d577e244ca12fac9afcb73dceca212975124
                       6da5e183f7a0b938185516919a12236b9dce8b35
                       1edba072f237f60ff4857a44a57f48e99d473d87
                       a3742532
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5d:8e:2b:88:f1:0f:d5:7c:22:30:35:a4:db:8a:3c:6f:79:b2:7c:d6]
            modulus: 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
    public exponent: 10001

] 
2022-11-15 04:13:24.124  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-15 04:13:24.126 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-15 04:13:24.128 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-15 04:13:24.129 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-15 04:13:24.130  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-15 04:13:24.131  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-15 04:13:24.131  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-15 04:13:24.131 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-15 04:13:24.132 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-15 04:13:24.132 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-15 04:13:24.139 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-15 04:13:24.140 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 04:13:24.141 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 04:13:24.141 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 04:13:24.399  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-15 04:13:24.400  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-15 04:13:24.400 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-15 04:13:24.401 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 04:13:24.403  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-15 04:13:24.403  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-15 04:13:24.403 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 04:13:24.404 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 04:13:24.404 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 04:13:24.405 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 04:13:24.405 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 04:13:24.405 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 04:13:24.406 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 04:13:24.406 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 04:13:24.407 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 04:13:24.408 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-15 04:13:24.412 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 561824809579493790279822863592937895766905438676
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 15 02:58:56 UTC 2022
           Final Date: Sun Nov 14 02:58:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d9:42:9e:88:b4:3b:18:bd:55:2a:f5:c8:75:9d:0a:ad:03:b1:02:a9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 33b1a783642e6a906311b32598da708818b809c9
                       04a38c2a43ade183c02fb11f6c85a9bf6ac81238
                       1f21f9ea7932500f010e96f03df85dd1012e6d62
                       d5b8a8017d4c3ad377d8b58b7d3dba82429081a9
                       0b7eb5490a4e17978333bdca1eaae5337bf51cf2
                       7f4f110943950351cfc3808ddb702e4a193efabd
                       7f650c457b3bb157758bb5e34141153430eae297
                       8261ac59deaa8d3100f8e102a012de6081214167
                       20f91226b1e4169d4bb5d38778e81151dddef479
                       5c4c6f42ed7b917753114453b7f3aa04ce4ba1e4
                       4d762cc7a50543ebba248c930113d40643536273
                       d407ed4e05521bbcd30c9782d60847afb410b409
                       6de6d53516eca2cfa7d037f26109a3bbbeecec29
                       99b64f14b855704e67793094bdbd485811249f19
                       4b54d213c1110238ce3a7161d6039dab7ac97afd
                       9ed8b7b405a889666b68393a6d3fce835ac69766
                       1632d577e244ca12fac9afcb73dceca212975124
                       6da5e183f7a0b938185516919a12236b9dce8b35
                       1edba072f237f60ff4857a44a57f48e99d473d87
                       a3742532
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [18:e6:97:70:41:30:b8:b8:a0:e3:d5:1e:15:6e:55:29:97:30:65:89]
            modulus: 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
    public exponent: 10001

] 
2022-11-15 04:15:05.639  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-15 04:15:05.640 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-15 04:15:05.643 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-15 04:15:05.645 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-15 04:15:05.646  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-15 04:15:05.646  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-15 04:15:05.647  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-15 04:15:05.647 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-15 04:15:05.648 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-15 04:15:05.649 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-15 04:15:05.654 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-15 04:15:05.655 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 04:15:05.656 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 04:15:05.656 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 04:15:05.839  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-15 04:15:05.840  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-15 04:15:05.841 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-15 04:15:05.841 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 04:15:05.843  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-15 04:15:05.844  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-15 04:15:05.844 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 04:15:05.844 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 04:15:05.845 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 04:15:05.846 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 04:15:05.846 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 04:15:05.846 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 04:15:05.847 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 04:15:05.847 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 04:15:05.847 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 04:15:05.848 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-15 04:15:05.851 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 561824809579493790279822863592937895766905438676
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 15 02:58:56 UTC 2022
           Final Date: Sun Nov 14 02:58:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d9:42:9e:88:b4:3b:18:bd:55:2a:f5:c8:75:9d:0a:ad:03:b1:02:a9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 33b1a783642e6a906311b32598da708818b809c9
                       04a38c2a43ade183c02fb11f6c85a9bf6ac81238
                       1f21f9ea7932500f010e96f03df85dd1012e6d62
                       d5b8a8017d4c3ad377d8b58b7d3dba82429081a9
                       0b7eb5490a4e17978333bdca1eaae5337bf51cf2
                       7f4f110943950351cfc3808ddb702e4a193efabd
                       7f650c457b3bb157758bb5e34141153430eae297
                       8261ac59deaa8d3100f8e102a012de6081214167
                       20f91226b1e4169d4bb5d38778e81151dddef479
                       5c4c6f42ed7b917753114453b7f3aa04ce4ba1e4
                       4d762cc7a50543ebba248c930113d40643536273
                       d407ed4e05521bbcd30c9782d60847afb410b409
                       6de6d53516eca2cfa7d037f26109a3bbbeecec29
                       99b64f14b855704e67793094bdbd485811249f19
                       4b54d213c1110238ce3a7161d6039dab7ac97afd
                       9ed8b7b405a889666b68393a6d3fce835ac69766
                       1632d577e244ca12fac9afcb73dceca212975124
                       6da5e183f7a0b938185516919a12236b9dce8b35
                       1edba072f237f60ff4857a44a57f48e99d473d87
                       a3742532
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2e:67:fa:b5:23:83:a8:e1:80:25:d1:0f:49:46:61:38:6b:24:4f:80]
            modulus: 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
    public exponent: 10001

] 
2022-11-15 04:16:21.648  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-15 04:16:21.650 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-15 04:16:21.652 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-15 04:16:21.653 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-15 04:16:21.653  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-15 04:16:21.654  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-15 04:16:21.654  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-15 04:16:21.654 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-15 04:16:21.655 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-15 04:16:21.655 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-15 04:16:21.660 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-15 04:16:21.661 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 04:16:21.662 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 04:16:21.662 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 04:16:21.914  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-15 04:16:21.916  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-15 04:16:21.917 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-15 04:16:21.917 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 04:16:21.920  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-15 04:16:21.920  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-15 04:16:21.921 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 04:16:21.921 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 04:16:21.921 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 04:16:21.922 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 04:16:21.922 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 04:16:21.923 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 04:16:21.924 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 04:16:21.924 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 04:16:21.924 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 04:16:21.925 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-15 04:16:21.930 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 561824809579493790279822863592937895766905438676
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 15 02:58:56 UTC 2022
           Final Date: Sun Nov 14 02:58:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d9:42:9e:88:b4:3b:18:bd:55:2a:f5:c8:75:9d:0a:ad:03:b1:02:a9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 33b1a783642e6a906311b32598da708818b809c9
                       04a38c2a43ade183c02fb11f6c85a9bf6ac81238
                       1f21f9ea7932500f010e96f03df85dd1012e6d62
                       d5b8a8017d4c3ad377d8b58b7d3dba82429081a9
                       0b7eb5490a4e17978333bdca1eaae5337bf51cf2
                       7f4f110943950351cfc3808ddb702e4a193efabd
                       7f650c457b3bb157758bb5e34141153430eae297
                       8261ac59deaa8d3100f8e102a012de6081214167
                       20f91226b1e4169d4bb5d38778e81151dddef479
                       5c4c6f42ed7b917753114453b7f3aa04ce4ba1e4
                       4d762cc7a50543ebba248c930113d40643536273
                       d407ed4e05521bbcd30c9782d60847afb410b409
                       6de6d53516eca2cfa7d037f26109a3bbbeecec29
                       99b64f14b855704e67793094bdbd485811249f19
                       4b54d213c1110238ce3a7161d6039dab7ac97afd
                       9ed8b7b405a889666b68393a6d3fce835ac69766
                       1632d577e244ca12fac9afcb73dceca212975124
                       6da5e183f7a0b938185516919a12236b9dce8b35
                       1edba072f237f60ff4857a44a57f48e99d473d87
                       a3742532
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e3:83:9f:7e:ec:2e:b0:4e:22:2f:8a:84:49:e3:38:68:cc:b7:5b:83]
            modulus: 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
    public exponent: 10001

] 
2022-11-15 04:18:20.609  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-15 04:18:20.613 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-15 04:18:20.615 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-15 04:18:20.616 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-15 04:18:20.617  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-15 04:18:20.619  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-15 04:18:20.619  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-15 04:18:20.620 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-15 04:18:20.620 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-15 04:18:20.621 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-15 04:18:20.624 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-15 04:18:20.625 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 04:18:20.625 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 04:18:20.626 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 04:18:20.828  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-15 04:18:20.829  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-15 04:18:20.830 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-15 04:18:20.830 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 04:18:20.832  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-15 04:18:20.832  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-15 04:18:20.833 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 04:18:20.833 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 04:18:20.833 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 04:18:20.834 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 04:18:20.834 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 04:18:20.834 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 04:18:20.835 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 04:18:20.835 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 04:18:20.836 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 04:18:20.836 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-15 04:18:20.840 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 561824809579493790279822863592937895766905438676
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 15 02:58:56 UTC 2022
           Final Date: Sun Nov 14 02:58:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d9:42:9e:88:b4:3b:18:bd:55:2a:f5:c8:75:9d:0a:ad:03:b1:02:a9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 33b1a783642e6a906311b32598da708818b809c9
                       04a38c2a43ade183c02fb11f6c85a9bf6ac81238
                       1f21f9ea7932500f010e96f03df85dd1012e6d62
                       d5b8a8017d4c3ad377d8b58b7d3dba82429081a9
                       0b7eb5490a4e17978333bdca1eaae5337bf51cf2
                       7f4f110943950351cfc3808ddb702e4a193efabd
                       7f650c457b3bb157758bb5e34141153430eae297
                       8261ac59deaa8d3100f8e102a012de6081214167
                       20f91226b1e4169d4bb5d38778e81151dddef479
                       5c4c6f42ed7b917753114453b7f3aa04ce4ba1e4
                       4d762cc7a50543ebba248c930113d40643536273
                       d407ed4e05521bbcd30c9782d60847afb410b409
                       6de6d53516eca2cfa7d037f26109a3bbbeecec29
                       99b64f14b855704e67793094bdbd485811249f19
                       4b54d213c1110238ce3a7161d6039dab7ac97afd
                       9ed8b7b405a889666b68393a6d3fce835ac69766
                       1632d577e244ca12fac9afcb73dceca212975124
                       6da5e183f7a0b938185516919a12236b9dce8b35
                       1edba072f237f60ff4857a44a57f48e99d473d87
                       a3742532
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c1:f1:79:a2:98:55:f4:7d:5f:58:fd:26:16:52:58:62:d8:ba:6c:f7]
            modulus: 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
    public exponent: 10001

] 
2022-11-15 04:24:43.265  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-15 04:24:43.268 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-15 04:24:43.270 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-15 04:24:43.270 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-15 04:24:43.271  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-15 04:24:43.271  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-15 04:24:43.272  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-15 04:24:43.272 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-15 04:24:43.272 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-15 04:24:43.273 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-15 04:24:43.279 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-15 04:24:43.281 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 04:24:43.281 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 04:24:43.281 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 04:24:43.481  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-15 04:24:43.482  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-15 04:24:43.482 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-15 04:24:43.482 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 04:24:43.484  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-15 04:24:43.485  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-15 04:24:43.488 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 04:24:43.488 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 04:24:43.488 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 04:24:43.489 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 04:24:43.489 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 04:24:43.489 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 04:24:43.490 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 04:24:43.490 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 04:24:43.490 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 04:24:43.491 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-15 04:24:43.510 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 561824809579493790279822863592937895766905438676
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 15 02:58:56 UTC 2022
           Final Date: Sun Nov 14 02:58:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d9:42:9e:88:b4:3b:18:bd:55:2a:f5:c8:75:9d:0a:ad:03:b1:02:a9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 33b1a783642e6a906311b32598da708818b809c9
                       04a38c2a43ade183c02fb11f6c85a9bf6ac81238
                       1f21f9ea7932500f010e96f03df85dd1012e6d62
                       d5b8a8017d4c3ad377d8b58b7d3dba82429081a9
                       0b7eb5490a4e17978333bdca1eaae5337bf51cf2
                       7f4f110943950351cfc3808ddb702e4a193efabd
                       7f650c457b3bb157758bb5e34141153430eae297
                       8261ac59deaa8d3100f8e102a012de6081214167
                       20f91226b1e4169d4bb5d38778e81151dddef479
                       5c4c6f42ed7b917753114453b7f3aa04ce4ba1e4
                       4d762cc7a50543ebba248c930113d40643536273
                       d407ed4e05521bbcd30c9782d60847afb410b409
                       6de6d53516eca2cfa7d037f26109a3bbbeecec29
                       99b64f14b855704e67793094bdbd485811249f19
                       4b54d213c1110238ce3a7161d6039dab7ac97afd
                       9ed8b7b405a889666b68393a6d3fce835ac69766
                       1632d577e244ca12fac9afcb73dceca212975124
                       6da5e183f7a0b938185516919a12236b9dce8b35
                       1edba072f237f60ff4857a44a57f48e99d473d87
                       a3742532
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9a:a9:db:22:c8:9c:ff:65:62:05:db:05:11:80:28:df:e7:84:93:25]
            modulus: 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
    public exponent: 10001

] 
2022-11-15 04:28:39.300  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-15 04:28:39.302 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-15 04:28:39.303 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-15 04:28:39.304 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-15 04:28:39.304  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-15 04:28:39.305  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-15 04:28:39.305  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-15 04:28:39.305 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-15 04:28:39.305 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-15 04:28:39.306 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-15 04:28:39.309 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-15 04:28:39.310 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 04:28:39.310 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 04:28:39.310 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 04:28:39.489  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-15 04:28:39.490  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-15 04:28:39.490 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-15 04:28:39.490 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 04:28:39.491  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-15 04:28:39.491  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-15 04:28:39.491 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 04:28:39.492 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 04:28:39.492 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 04:28:39.492 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 04:28:39.492 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 04:28:39.493 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 04:28:39.493 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 04:28:39.493 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 04:28:39.493 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 04:28:39.494 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-15 04:28:39.497 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 561824809579493790279822863592937895766905438676
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 15 02:58:56 UTC 2022
           Final Date: Sun Nov 14 02:58:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d9:42:9e:88:b4:3b:18:bd:55:2a:f5:c8:75:9d:0a:ad:03:b1:02:a9]
            modulus: a6c52e68f4b321cb2df4c37b8c69b56331b002d5382be9acdadaf444c387eb6ff059ecf238c520c00c38368b4adfeb1d6c6c65f3a0e6ea772b9a487466a3881ef6d88ebaded5711508137bb01be5f85593bbe55f96c2a95cd52cc7759805073b1f8b6324dd28497942cc1e522430eedd3d0b0e989c32ef966a80251934bd78be6e1f5eae1c45d84b0669fbf392f065b45cbc6043ca7f460f1aa7658139fa5a6dd589dfa058957b573dbb398a46174fb0150ffc227c5c25f5ec37e711c44025005bdda98ce7228e183b6393943cab76bd32b5b3011a69c2b06572847f82dd8b858fef8b6830237fc8e80be4a44240fd02fc38a0042cb21cc61d3037e3e13b75f164b67c437f2bb8fb714ceb7cfbc499d9cd1adb6f747b3fd66ef304a7a1a51fec01dfdf4bf2dfd5f55a783c9fca2b0ea357c3a5a2357184c6e040515133234c42670af5624102d0176874b30da781db26dcd3956a6feb15bdf574330e451b66c73480081112b4815eef1dd47b7be29cbd51e9f52c5fb40644bbed1ce3b9c264bf
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 33b1a783642e6a906311b32598da708818b809c9
                       04a38c2a43ade183c02fb11f6c85a9bf6ac81238
                       1f21f9ea7932500f010e96f03df85dd1012e6d62
                       d5b8a8017d4c3ad377d8b58b7d3dba82429081a9
                       0b7eb5490a4e17978333bdca1eaae5337bf51cf2
                       7f4f110943950351cfc3808ddb702e4a193efabd
                       7f650c457b3bb157758bb5e34141153430eae297
                       8261ac59deaa8d3100f8e102a012de6081214167
                       20f91226b1e4169d4bb5d38778e81151dddef479
                       5c4c6f42ed7b917753114453b7f3aa04ce4ba1e4
                       4d762cc7a50543ebba248c930113d40643536273
                       d407ed4e05521bbcd30c9782d60847afb410b409
                       6de6d53516eca2cfa7d037f26109a3bbbeecec29
                       99b64f14b855704e67793094bdbd485811249f19
                       4b54d213c1110238ce3a7161d6039dab7ac97afd
                       9ed8b7b405a889666b68393a6d3fce835ac69766
                       1632d577e244ca12fac9afcb73dceca212975124
                       6da5e183f7a0b938185516919a12236b9dce8b35
                       1edba072f237f60ff4857a44a57f48e99d473d87
                       a3742532
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [40:10:61:53:26:38:16:dc:9d:b5:5a:6f:56:6d:d2:b8:1e:83:b3:af]
            modulus: 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
    public exponent: 10001

] 
2022-11-15 04:35:12.642  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-15 04:35:12.644 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-15 04:35:12.646 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-15 04:35:12.646 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-15 04:35:12.647  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-15 04:35:12.647  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-15 04:35:12.647  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-15 04:35:12.647 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-15 04:35:12.648 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-15 04:35:12.648 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-15 04:35:12.651 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-15 04:35:12.652 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 04:35:12.652 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 04:35:12.653 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 04:35:12.879  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-15 04:35:12.880  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-15 04:35:12.881 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-15 04:35:12.881 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 04:35:12.882  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-15 04:35:12.883  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-15 04:35:12.883 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 04:35:12.883 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 04:35:12.884 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 04:35:12.885 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 04:35:12.885 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 04:35:12.885 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 04:35:12.886 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 04:35:12.886 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 04:35:12.886 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 04:35:12.887 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-15 04:35:12.894 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 561824809579493790279822863592937895766905438676
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 15 02:58:56 UTC 2022
           Final Date: Sun Nov 14 02:58:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d9:42:9e:88:b4:3b:18:bd:55:2a:f5:c8:75:9d:0a:ad:03:b1:02:a9]
            modulus: a6c52e68f4b321cb2df4c37b8c69b56331b002d5382be9acdadaf444c387eb6ff059ecf238c520c00c38368b4adfeb1d6c6c65f3a0e6ea772b9a487466a3881ef6d88ebaded5711508137bb01be5f85593bbe55f96c2a95cd52cc7759805073b1f8b6324dd28497942cc1e522430eedd3d0b0e989c32ef966a80251934bd78be6e1f5eae1c45d84b0669fbf392f065b45cbc6043ca7f460f1aa7658139fa5a6dd589dfa058957b573dbb398a46174fb0150ffc227c5c25f5ec37e711c44025005bdda98ce7228e183b6393943cab76bd32b5b3011a69c2b06572847f82dd8b858fef8b6830237fc8e80be4a44240fd02fc38a0042cb21cc61d3037e3e13b75f164b67c437f2bb8fb714ceb7cfbc499d9cd1adb6f747b3fd66ef304a7a1a51fec01dfdf4bf2dfd5f55a783c9fca2b0ea357c3a5a2357184c6e040515133234c42670af5624102d0176874b30da781db26dcd3956a6feb15bdf574330e451b66c73480081112b4815eef1dd47b7be29cbd51e9f52c5fb40644bbed1ce3b9c264bf
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 33b1a783642e6a906311b32598da708818b809c9
                       04a38c2a43ade183c02fb11f6c85a9bf6ac81238
                       1f21f9ea7932500f010e96f03df85dd1012e6d62
                       d5b8a8017d4c3ad377d8b58b7d3dba82429081a9
                       0b7eb5490a4e17978333bdca1eaae5337bf51cf2
                       7f4f110943950351cfc3808ddb702e4a193efabd
                       7f650c457b3bb157758bb5e34141153430eae297
                       8261ac59deaa8d3100f8e102a012de6081214167
                       20f91226b1e4169d4bb5d38778e81151dddef479
                       5c4c6f42ed7b917753114453b7f3aa04ce4ba1e4
                       4d762cc7a50543ebba248c930113d40643536273
                       d407ed4e05521bbcd30c9782d60847afb410b409
                       6de6d53516eca2cfa7d037f26109a3bbbeecec29
                       99b64f14b855704e67793094bdbd485811249f19
                       4b54d213c1110238ce3a7161d6039dab7ac97afd
                       9ed8b7b405a889666b68393a6d3fce835ac69766
                       1632d577e244ca12fac9afcb73dceca212975124
                       6da5e183f7a0b938185516919a12236b9dce8b35
                       1edba072f237f60ff4857a44a57f48e99d473d87
                       a3742532
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d1:57:b5:17:de:cf:90:e2:9c:b1:52:80:eb:2b:7b:8b:09:6d:b7:f3]
            modulus: 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
    public exponent: 10001

] 
2022-11-15 04:39:57.317  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-15 04:39:57.318 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-15 04:39:57.322 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-15 04:39:57.323 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-15 04:39:57.324  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-15 04:39:57.325  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-15 04:39:57.325  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-15 04:39:57.325 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-15 04:39:57.325 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-15 04:39:57.326 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-15 04:39:57.329 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-15 04:39:57.331 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 04:39:57.331 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 04:39:57.331 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 04:39:57.504  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-15 04:39:57.505  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-15 04:39:57.506 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-15 04:39:57.506 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 04:39:57.508  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-15 04:39:57.508  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-15 04:39:57.508 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 04:39:57.509 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 04:39:57.509 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 04:39:57.510 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 04:39:57.510 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 04:39:57.510 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 04:39:57.511 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 04:39:57.511 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 04:39:57.514 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 04:39:57.515 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-15 04:39:57.519 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 561824809579493790279822863592937895766905438676
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 15 02:58:56 UTC 2022
           Final Date: Sun Nov 14 02:58:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d9:42:9e:88:b4:3b:18:bd:55:2a:f5:c8:75:9d:0a:ad:03:b1:02:a9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 33b1a783642e6a906311b32598da708818b809c9
                       04a38c2a43ade183c02fb11f6c85a9bf6ac81238
                       1f21f9ea7932500f010e96f03df85dd1012e6d62
                       d5b8a8017d4c3ad377d8b58b7d3dba82429081a9
                       0b7eb5490a4e17978333bdca1eaae5337bf51cf2
                       7f4f110943950351cfc3808ddb702e4a193efabd
                       7f650c457b3bb157758bb5e34141153430eae297
                       8261ac59deaa8d3100f8e102a012de6081214167
                       20f91226b1e4169d4bb5d38778e81151dddef479
                       5c4c6f42ed7b917753114453b7f3aa04ce4ba1e4
                       4d762cc7a50543ebba248c930113d40643536273
                       d407ed4e05521bbcd30c9782d60847afb410b409
                       6de6d53516eca2cfa7d037f26109a3bbbeecec29
                       99b64f14b855704e67793094bdbd485811249f19
                       4b54d213c1110238ce3a7161d6039dab7ac97afd
                       9ed8b7b405a889666b68393a6d3fce835ac69766
                       1632d577e244ca12fac9afcb73dceca212975124
                       6da5e183f7a0b938185516919a12236b9dce8b35
                       1edba072f237f60ff4857a44a57f48e99d473d87
                       a3742532
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a3:47:4a:77:5d:49:b9:9f:3c:32:f4:19:e6:ec:3c:d4:63:d5:d5:3b]
            modulus: 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
    public exponent: 10001

] 
2022-11-15 04:40:14.850  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-15 04:40:14.850 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-15 04:40:14.852 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-15 04:40:14.852 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-15 04:40:14.852  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-15 04:40:14.853  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-15 04:40:14.853  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-15 04:40:14.853 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-15 04:40:14.853 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-15 04:40:14.853 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-15 04:40:14.857 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-15 04:40:14.858 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 04:40:14.858 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-15 04:40:14.858 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 04:40:15.046  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-15 04:40:15.046  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-15 04:40:15.047 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-15 04:40:15.047 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-15 04:40:15.048  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-15 04:40:15.049  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-15 04:40:15.049 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 04:40:15.049 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 04:40:15.049 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 04:40:15.049 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 04:40:15.050 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 04:40:15.050 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 04:40:15.051 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-15 04:40:15.051 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-15 04:40:15.052 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-15 04:40:15.052 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-15 04:40:15.054 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 561824809579493790279822863592937895766905438676
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 15 02:58:56 UTC 2022
           Final Date: Sun Nov 14 02:58:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d9:42:9e:88:b4:3b:18:bd:55:2a:f5:c8:75:9d:0a:ad:03:b1:02:a9]
            modulus: a6c52e68f4b321cb2df4c37b8c69b56331b002d5382be9acdadaf444c387eb6ff059ecf238c520c00c38368b4adfeb1d6c6c65f3a0e6ea772b9a487466a3881ef6d88ebaded5711508137bb01be5f85593bbe55f96c2a95cd52cc7759805073b1f8b6324dd28497942cc1e522430eedd3d0b0e989c32ef966a80251934bd78be6e1f5eae1c45d84b0669fbf392f065b45cbc6043ca7f460f1aa7658139fa5a6dd589dfa058957b573dbb398a46174fb0150ffc227c5c25f5ec37e711c44025005bdda98ce7228e183b6393943cab76bd32b5b3011a69c2b06572847f82dd8b858fef8b6830237fc8e80be4a44240fd02fc38a0042cb21cc61d3037e3e13b75f164b67c437f2bb8fb714ceb7cfbc499d9cd1adb6f747b3fd66ef304a7a1a51fec01dfdf4bf2dfd5f55a783c9fca2b0ea357c3a5a2357184c6e040515133234c42670af5624102d0176874b30da781db26dcd3956a6feb15bdf574330e451b66c73480081112b4815eef1dd47b7be29cbd51e9f52c5fb40644bbed1ce3b9c264bf
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 33b1a783642e6a906311b32598da708818b809c9
                       04a38c2a43ade183c02fb11f6c85a9bf6ac81238
                       1f21f9ea7932500f010e96f03df85dd1012e6d62
                       d5b8a8017d4c3ad377d8b58b7d3dba82429081a9
                       0b7eb5490a4e17978333bdca1eaae5337bf51cf2
                       7f4f110943950351cfc3808ddb702e4a193efabd
                       7f650c457b3bb157758bb5e34141153430eae297
                       8261ac59deaa8d3100f8e102a012de6081214167
                       20f91226b1e4169d4bb5d38778e81151dddef479
                       5c4c6f42ed7b917753114453b7f3aa04ce4ba1e4
                       4d762cc7a50543ebba248c930113d40643536273
                       d407ed4e05521bbcd30c9782d60847afb410b409
                       6de6d53516eca2cfa7d037f26109a3bbbeecec29
                       99b64f14b855704e67793094bdbd485811249f19
                       4b54d213c1110238ce3a7161d6039dab7ac97afd
                       9ed8b7b405a889666b68393a6d3fce835ac69766
                       1632d577e244ca12fac9afcb73dceca212975124
                       6da5e183f7a0b938185516919a12236b9dce8b35
                       1edba072f237f60ff4857a44a57f48e99d473d87
                       a3742532
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [af:8e:e3:8e:1e:ed:36:3f:22:2b:b1:53:d7:36:54:81:59:a4:ed:9a]
            modulus: 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
    public exponent: 10001

]