Results

By type

          2022-11-17 20:49:14,130 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-11-17 20:49:15,354 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-11-17 20:49:16.054  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Nov 17, 2022 8:49:18 PM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Nov 17, 2022 8:49:18 PM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Nov 17, 2022 8:49:18 PM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Nov 17, 2022 8:49:18 PM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-11-17 20:49:18.915 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-11-17 20:49:19.251  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-11-17 20:49:19.431  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-11-17 20:49:20.177 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-11-17 20:49:20.180 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-11-17 20:49:20.181 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-11-17 20:49:20.186 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-11-17 20:49:20.240 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-11-17 20:49:20.249 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-11-17 20:49:20.385 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-11-17 20:49:21.154 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Nov 17, 2022 8:49:22 PM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-11-17 20:49:22.477  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 9.192 seconds (JVM running for 11.099)
Nov 17, 2022 8:49:46 PM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-11-17 20:50:05.747  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-17 20:50:05.754 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-17 20:50:05.808 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-17 20:50:05.821 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-17 20:50:05.853  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-17 20:50:05.855  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-17 20:50:05.856  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-17 20:50:05.859 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-17 20:50:05.860 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 20:50:05.865 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-17 20:50:05.877 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-17 20:50:05.882 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-17 20:50:05.933 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-17 20:50:05.950 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 20:50:05.951 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 20:50:05.954 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 20:50:06.522  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-17 20:50:06.525  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-17 20:50:06.525 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-17 20:50:06.527 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 20:50:06.544  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-17 20:50:06.545  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-17 20:50:06.546 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 20:50:06.546 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 20:50:06.547 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 20:50:06.562 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 20:50:06.562 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 20:50:06.563 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 20:50:06.569 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 20:50:06.570 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 20:50:06.570 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 20:50:06.572 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-17 20:50:06.602 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 105055088824460757724826588454537169766201391948
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 17 20:47:16 UTC 2022
           Final Date: Tue Nov 16 20:47:15 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f2:24:e4:ff:4a:1e:29:7d:3f:46:a3:35:3b:6e:ac:d6:9f:73:25:88],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 863347638005a30c7721a1b1ab59e3d9dff7547c
                       11cf005fbfb69407dcf39a6cc4817d7d40822d58
                       3a1ee45421475084a3e76eec23428c69fbd2a302
                       4cf53abad466a8a99828babd1daf6f99e35326c3
                       680536c03b6ee2e5cfc728187b51d8f22345198c
                       41dcd5bb07238693faa2930f742ac89d01283d85
                       e3775e43572fcfa72f758932a83d945df987ac70
                       620a32eaca5fe6d47fbe8bd2ae2a3526f7e63803
                       2338cc1b15a4de0806a3bef368ecf71af9348f9e
                       9784204c0da1e1a522d7ce1f0b0eccceae337279
                       7ff9ef7ba7ee2b1e23dc27eff1ab6e143896aefc
                       e9c14093e83b0e11c67424a7bd780a29188798da
                       9deb87fed1ef6c04afe687c6f835084f41426b00
                       cd4a6b4a15bffedf9cff3a6049d7f48109f84c63
                       2269e1d123dacca3477f35dcc082eec15a4dbf2c
                       cfacf012d6a18dade7e44523931ae0023e3a86aa
                       a69fbd8b9c7f7b1aba879b9a8497c470c9dba4e6
                       40d92b44e83cfed41f01e77e173550a6fff6eb36
                       60d0ee86393e2a84340e546b70ee3defc70e512e
                       8320f3e6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3b:1b:c6:23:f9:4d:52:d3:48:03:00:91:f7:b2:72:0d:06:13:1f:d1],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-17 22:24:27.257  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-17 22:24:27.261 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-17 22:24:27.265 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-17 22:24:27.267 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-17 22:24:27.268  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-17 22:24:27.269  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-17 22:24:27.270  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-17 22:24:27.271 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-17 22:24:27.272 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-17 22:24:27.272 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-17 22:24:27.279 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-17 22:24:27.282 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 22:24:27.283 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 22:24:27.283 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 22:24:27.566  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-17 22:24:27.567  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-17 22:24:27.568 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-17 22:24:27.568 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 22:24:27.571  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-17 22:24:27.571  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-17 22:24:27.572 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 22:24:27.572 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 22:24:27.573 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 22:24:27.574 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 22:24:27.574 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 22:24:27.575 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 22:24:27.576 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 22:24:27.576 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 22:24:27.576 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 22:24:27.577 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-17 22:24:27.582 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 105055088824460757724826588454537169766201391948
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 17 20:47:16 UTC 2022
           Final Date: Tue Nov 16 20:47:15 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f2:24:e4:ff:4a:1e:29:7d:3f:46:a3:35:3b:6e:ac:d6:9f:73:25:88],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 863347638005a30c7721a1b1ab59e3d9dff7547c
                       11cf005fbfb69407dcf39a6cc4817d7d40822d58
                       3a1ee45421475084a3e76eec23428c69fbd2a302
                       4cf53abad466a8a99828babd1daf6f99e35326c3
                       680536c03b6ee2e5cfc728187b51d8f22345198c
                       41dcd5bb07238693faa2930f742ac89d01283d85
                       e3775e43572fcfa72f758932a83d945df987ac70
                       620a32eaca5fe6d47fbe8bd2ae2a3526f7e63803
                       2338cc1b15a4de0806a3bef368ecf71af9348f9e
                       9784204c0da1e1a522d7ce1f0b0eccceae337279
                       7ff9ef7ba7ee2b1e23dc27eff1ab6e143896aefc
                       e9c14093e83b0e11c67424a7bd780a29188798da
                       9deb87fed1ef6c04afe687c6f835084f41426b00
                       cd4a6b4a15bffedf9cff3a6049d7f48109f84c63
                       2269e1d123dacca3477f35dcc082eec15a4dbf2c
                       cfacf012d6a18dade7e44523931ae0023e3a86aa
                       a69fbd8b9c7f7b1aba879b9a8497c470c9dba4e6
                       40d92b44e83cfed41f01e77e173550a6fff6eb36
                       60d0ee86393e2a84340e546b70ee3defc70e512e
                       8320f3e6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c3:3a:44:37:88:e6:c7:67:d6:41:bd:17:6f:55:3b:e2:8a:61:3a:18],[56:66:d1:a4]
        modulus: 9b428a405111f7b844e663ae1a3c490b99230205a645b24b5c1776ef5dd1a68f3a607dc7a0d0f1bd82a621ec7922940353b62dfa562a224f9d4cc0abaaab85b4a730a8859b3b24fb17ba8ee70df39d5e8de9531db500261cd142038cd356a15089f292171155af154ad8e31e186755da3e9d64c4f75ce78f11dbefe4b53b55240d9f4203ad63bb1c80a0d09cc44b25adc942043b982db81d8a221b39be22f40b5d708caf726ede7d8aa61d998080d92a25a0dc5f9088e73d3642bc7081a27b8a5bdda779287ded8a31c4cf04fd58d45820f305fc18e292f9d8ee6d08d80373048f24566548e41f79ad3eeec50016cd034a6186d7778149b2d83ff3ffa78066fd
public exponent: 10001

] 
2022-11-17 22:26:15.159  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-17 22:26:15.161 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-17 22:26:15.163 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-17 22:26:15.164 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-17 22:26:15.165  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-17 22:26:15.166  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-17 22:26:15.166  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-17 22:26:15.167 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-17 22:26:15.167 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-17 22:26:15.168 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-17 22:26:15.173 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-17 22:26:15.173 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 22:26:15.173 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 22:26:15.174 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 22:26:15.322  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-17 22:26:15.323  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-17 22:26:15.324 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-17 22:26:15.324 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 22:26:15.327  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-17 22:26:15.328  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-17 22:26:15.329 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 22:26:15.330 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 22:26:15.330 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 22:26:15.332 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 22:26:15.333 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 22:26:15.333 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 22:26:15.335 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 22:26:15.335 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 22:26:15.336 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 22:26:15.338 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-17 22:26:15.344 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 105055088824460757724826588454537169766201391948
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 17 20:47:16 UTC 2022
           Final Date: Tue Nov 16 20:47:15 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f2:24:e4:ff:4a:1e:29:7d:3f:46:a3:35:3b:6e:ac:d6:9f:73:25:88],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 863347638005a30c7721a1b1ab59e3d9dff7547c
                       11cf005fbfb69407dcf39a6cc4817d7d40822d58
                       3a1ee45421475084a3e76eec23428c69fbd2a302
                       4cf53abad466a8a99828babd1daf6f99e35326c3
                       680536c03b6ee2e5cfc728187b51d8f22345198c
                       41dcd5bb07238693faa2930f742ac89d01283d85
                       e3775e43572fcfa72f758932a83d945df987ac70
                       620a32eaca5fe6d47fbe8bd2ae2a3526f7e63803
                       2338cc1b15a4de0806a3bef368ecf71af9348f9e
                       9784204c0da1e1a522d7ce1f0b0eccceae337279
                       7ff9ef7ba7ee2b1e23dc27eff1ab6e143896aefc
                       e9c14093e83b0e11c67424a7bd780a29188798da
                       9deb87fed1ef6c04afe687c6f835084f41426b00
                       cd4a6b4a15bffedf9cff3a6049d7f48109f84c63
                       2269e1d123dacca3477f35dcc082eec15a4dbf2c
                       cfacf012d6a18dade7e44523931ae0023e3a86aa
                       a69fbd8b9c7f7b1aba879b9a8497c470c9dba4e6
                       40d92b44e83cfed41f01e77e173550a6fff6eb36
                       60d0ee86393e2a84340e546b70ee3defc70e512e
                       8320f3e6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [de:eb:31:9c:b8:f8:56:7c:b8:f3:19:58:ac:e6:8f:65:9c:88:f0:8f],[56:66:d1:a4]
        modulus: ab86eb55e67d02ed4595d1ddfa31f1968784e1fdd90775e03bfcaccf39d5d9ca1c5274bc23a388ec20e243356f4b5247314d36433b7e87e4e85d4bdcafdf80c8cc885c534ffab5a0140099698a6d7adebc32a4b29268e0a0c7a69105363bb4c110154ab31354813263ee923d66bebfc366be04a561baf8ea689214a933e3cf2fdd92398e2908b9f5dc0ca9c6d5ac060976808276c4def31910bafd59373de381abc3f57449cd8ef1306b7e17dc8f5286ef62984657e077b7a38c6b3645f95453411f983381ea92e222615197f97b3d9b806d7708b04a9e5dfb03969e60fce4a99e9dcdd3bf39204e7415f95a2708040a8771dc65237dae6fc84d194976393e4d
public exponent: 10001

] 
2022-11-17 22:27:55.579  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-17 22:27:55.581 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-17 22:27:55.582 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-17 22:27:55.583 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-17 22:27:55.583  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-17 22:27:55.584  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-17 22:27:55.584  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-17 22:27:55.585 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-17 22:27:55.585 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-17 22:27:55.585 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-17 22:27:55.589 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-17 22:27:55.589 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 22:27:55.590 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 22:27:55.590 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 22:27:55.740  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-17 22:27:55.741  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-17 22:27:55.742 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-17 22:27:55.742 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 22:27:55.744  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-17 22:27:55.745  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-17 22:27:55.746 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 22:27:55.746 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 22:27:55.747 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 22:27:55.748 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 22:27:55.748 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 22:27:55.749 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 22:27:55.750 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 22:27:55.750 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 22:27:55.751 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 22:27:55.752 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-17 22:27:55.757 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 105055088824460757724826588454537169766201391948
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 17 20:47:16 UTC 2022
           Final Date: Tue Nov 16 20:47:15 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f2:24:e4:ff:4a:1e:29:7d:3f:46:a3:35:3b:6e:ac:d6:9f:73:25:88],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 863347638005a30c7721a1b1ab59e3d9dff7547c
                       11cf005fbfb69407dcf39a6cc4817d7d40822d58
                       3a1ee45421475084a3e76eec23428c69fbd2a302
                       4cf53abad466a8a99828babd1daf6f99e35326c3
                       680536c03b6ee2e5cfc728187b51d8f22345198c
                       41dcd5bb07238693faa2930f742ac89d01283d85
                       e3775e43572fcfa72f758932a83d945df987ac70
                       620a32eaca5fe6d47fbe8bd2ae2a3526f7e63803
                       2338cc1b15a4de0806a3bef368ecf71af9348f9e
                       9784204c0da1e1a522d7ce1f0b0eccceae337279
                       7ff9ef7ba7ee2b1e23dc27eff1ab6e143896aefc
                       e9c14093e83b0e11c67424a7bd780a29188798da
                       9deb87fed1ef6c04afe687c6f835084f41426b00
                       cd4a6b4a15bffedf9cff3a6049d7f48109f84c63
                       2269e1d123dacca3477f35dcc082eec15a4dbf2c
                       cfacf012d6a18dade7e44523931ae0023e3a86aa
                       a69fbd8b9c7f7b1aba879b9a8497c470c9dba4e6
                       40d92b44e83cfed41f01e77e173550a6fff6eb36
                       60d0ee86393e2a84340e546b70ee3defc70e512e
                       8320f3e6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [95:4f:6d:e1:f8:18:61:a6:ed:cb:0a:c1:e1:09:ab:26:31:c2:7f:59],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-17 22:30:31.811  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-17 22:30:31.812 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-17 22:30:31.814 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-17 22:30:31.815 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-17 22:30:31.815  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-17 22:30:31.816  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-17 22:30:31.816  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-17 22:30:31.817 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-17 22:30:31.817 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-17 22:30:31.817 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-17 22:30:31.821 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-17 22:30:31.822 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 22:30:31.822 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 22:30:31.822 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 22:30:31.956  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-17 22:30:31.957  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-17 22:30:31.957 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-17 22:30:31.957 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 22:30:31.959  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-17 22:30:31.959  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-17 22:30:31.960 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 22:30:31.960 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 22:30:31.960 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 22:30:31.961 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 22:30:31.961 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 22:30:31.963 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 22:30:31.965 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 22:30:31.966 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 22:30:31.966 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 22:30:31.968 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-17 22:30:31.972 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 105055088824460757724826588454537169766201391948
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 17 20:47:16 UTC 2022
           Final Date: Tue Nov 16 20:47:15 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f2:24:e4:ff:4a:1e:29:7d:3f:46:a3:35:3b:6e:ac:d6:9f:73:25:88],[56:66:d1:a4]
        modulus: bac12379587777e20a1b6234f86db53f1afacb82ce9735b4104a2425be82347e5b345fe72a1ac30e65d1977ae5ff35726c8b3eac8f3464d33c1ff488b27ec7038fb8e15e32217e79d253ab1554fea63dcd26543c5e185fbbebfcbdffab029e8272c020963de68a782577b0b605079f0a0a7aed3767716eb5776b0fe07d238fd22d58aa0be0dc3941a70aa984dde763e139efd1f1774929abc329a5525d2fe5758361765f6b9e485c6990d4e640afd56ef6b271186293ec084e5ff6d3c3b23efbb77f0f1c009db4230e4bf1c441072f81092727d7f42f05161b6f9d428e65055a60f08f666b9446ad6ec14e8b3eebba07d2ebe5042f0edea74649116be2ddb763daff1256dbcdf2c9805ba5af003b0946f6a1ed5af2b75fbb5415fd452c89ffff7f5120dd97e0253fbdcdf7dde1a91fe70208a6f282e851ab8eab4e8ec46373f547f0ca660fe6cb9975f00189ad8cdfd14453e57b5f7607eea79de6b51f090d40d134379c3b6abf838284b2d0858693376c64269d687979924c2be5538f07bae5
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 863347638005a30c7721a1b1ab59e3d9dff7547c
                       11cf005fbfb69407dcf39a6cc4817d7d40822d58
                       3a1ee45421475084a3e76eec23428c69fbd2a302
                       4cf53abad466a8a99828babd1daf6f99e35326c3
                       680536c03b6ee2e5cfc728187b51d8f22345198c
                       41dcd5bb07238693faa2930f742ac89d01283d85
                       e3775e43572fcfa72f758932a83d945df987ac70
                       620a32eaca5fe6d47fbe8bd2ae2a3526f7e63803
                       2338cc1b15a4de0806a3bef368ecf71af9348f9e
                       9784204c0da1e1a522d7ce1f0b0eccceae337279
                       7ff9ef7ba7ee2b1e23dc27eff1ab6e143896aefc
                       e9c14093e83b0e11c67424a7bd780a29188798da
                       9deb87fed1ef6c04afe687c6f835084f41426b00
                       cd4a6b4a15bffedf9cff3a6049d7f48109f84c63
                       2269e1d123dacca3477f35dcc082eec15a4dbf2c
                       cfacf012d6a18dade7e44523931ae0023e3a86aa
                       a69fbd8b9c7f7b1aba879b9a8497c470c9dba4e6
                       40d92b44e83cfed41f01e77e173550a6fff6eb36
                       60d0ee86393e2a84340e546b70ee3defc70e512e
                       8320f3e6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8f:5c:e0:f1:01:52:de:52:c4:53:29:a3:f8:9c:00:7f:da:1e:78:c3],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-17 22:37:38.500  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-17 22:37:38.503 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-17 22:37:38.506 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-17 22:37:38.507 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-17 22:37:38.508  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-17 22:37:38.508  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-17 22:37:38.509  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-17 22:37:38.509 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-17 22:37:38.510 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-17 22:37:38.510 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-17 22:37:38.516 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-17 22:37:38.518 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 22:37:38.518 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 22:37:38.519 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 22:37:38.717  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-17 22:37:38.718  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-17 22:37:38.718 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-17 22:37:38.719 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 22:37:38.721  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-17 22:37:38.721  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-17 22:37:38.721 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 22:37:38.722 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 22:37:38.723 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 22:37:38.723 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 22:37:38.724 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 22:37:38.724 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 22:37:38.725 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 22:37:38.725 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 22:37:38.725 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 22:37:38.726 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-17 22:37:38.729 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 105055088824460757724826588454537169766201391948
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 17 20:47:16 UTC 2022
           Final Date: Tue Nov 16 20:47:15 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f2:24:e4:ff:4a:1e:29:7d:3f:46:a3:35:3b:6e:ac:d6:9f:73:25:88],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 863347638005a30c7721a1b1ab59e3d9dff7547c
                       11cf005fbfb69407dcf39a6cc4817d7d40822d58
                       3a1ee45421475084a3e76eec23428c69fbd2a302
                       4cf53abad466a8a99828babd1daf6f99e35326c3
                       680536c03b6ee2e5cfc728187b51d8f22345198c
                       41dcd5bb07238693faa2930f742ac89d01283d85
                       e3775e43572fcfa72f758932a83d945df987ac70
                       620a32eaca5fe6d47fbe8bd2ae2a3526f7e63803
                       2338cc1b15a4de0806a3bef368ecf71af9348f9e
                       9784204c0da1e1a522d7ce1f0b0eccceae337279
                       7ff9ef7ba7ee2b1e23dc27eff1ab6e143896aefc
                       e9c14093e83b0e11c67424a7bd780a29188798da
                       9deb87fed1ef6c04afe687c6f835084f41426b00
                       cd4a6b4a15bffedf9cff3a6049d7f48109f84c63
                       2269e1d123dacca3477f35dcc082eec15a4dbf2c
                       cfacf012d6a18dade7e44523931ae0023e3a86aa
                       a69fbd8b9c7f7b1aba879b9a8497c470c9dba4e6
                       40d92b44e83cfed41f01e77e173550a6fff6eb36
                       60d0ee86393e2a84340e546b70ee3defc70e512e
                       8320f3e6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [97:81:15:75:13:94:7f:1a:2f:da:e1:10:56:e4:6f:28:f6:c1:17:a7],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-17 22:45:53.151  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-17 22:45:53.154 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-17 22:45:53.157 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-17 22:45:53.158 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-17 22:45:53.159  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-17 22:45:53.161  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-17 22:45:53.162  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-17 22:45:53.163 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-17 22:45:53.163 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-17 22:45:53.164 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-17 22:45:53.168 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-17 22:45:53.169 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 22:45:53.170 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 22:45:53.170 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 22:45:53.317  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-17 22:45:53.317  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-17 22:45:53.318 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-17 22:45:53.318 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 22:45:53.320  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-17 22:45:53.320  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-17 22:45:53.321 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 22:45:53.321 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 22:45:53.321 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 22:45:53.322 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 22:45:53.323 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 22:45:53.323 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 22:45:53.324 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 22:45:53.325 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 22:45:53.325 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 22:45:53.326 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-17 22:45:53.331 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 105055088824460757724826588454537169766201391948
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 17 20:47:16 UTC 2022
           Final Date: Tue Nov 16 20:47:15 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f2:24:e4:ff:4a:1e:29:7d:3f:46:a3:35:3b:6e:ac:d6:9f:73:25:88],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 863347638005a30c7721a1b1ab59e3d9dff7547c
                       11cf005fbfb69407dcf39a6cc4817d7d40822d58
                       3a1ee45421475084a3e76eec23428c69fbd2a302
                       4cf53abad466a8a99828babd1daf6f99e35326c3
                       680536c03b6ee2e5cfc728187b51d8f22345198c
                       41dcd5bb07238693faa2930f742ac89d01283d85
                       e3775e43572fcfa72f758932a83d945df987ac70
                       620a32eaca5fe6d47fbe8bd2ae2a3526f7e63803
                       2338cc1b15a4de0806a3bef368ecf71af9348f9e
                       9784204c0da1e1a522d7ce1f0b0eccceae337279
                       7ff9ef7ba7ee2b1e23dc27eff1ab6e143896aefc
                       e9c14093e83b0e11c67424a7bd780a29188798da
                       9deb87fed1ef6c04afe687c6f835084f41426b00
                       cd4a6b4a15bffedf9cff3a6049d7f48109f84c63
                       2269e1d123dacca3477f35dcc082eec15a4dbf2c
                       cfacf012d6a18dade7e44523931ae0023e3a86aa
                       a69fbd8b9c7f7b1aba879b9a8497c470c9dba4e6
                       40d92b44e83cfed41f01e77e173550a6fff6eb36
                       60d0ee86393e2a84340e546b70ee3defc70e512e
                       8320f3e6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [45:7e:c2:72:28:6e:ce:d6:75:4d:bf:b6:56:ce:d2:4f:fb:79:00:13],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-17 22:46:16.237  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-17 22:46:16.238 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-17 22:46:16.240 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-17 22:46:16.240 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-17 22:46:16.241  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-17 22:46:16.241  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-17 22:46:16.242  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-17 22:46:16.242 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-17 22:46:16.243 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-17 22:46:16.243 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-17 22:46:16.246 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-17 22:46:16.247 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 22:46:16.248 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 22:46:16.248 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 22:46:16.379  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-17 22:46:16.380  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-17 22:46:16.381 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-17 22:46:16.381 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 22:46:16.382  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-17 22:46:16.383  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-17 22:46:16.383 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 22:46:16.383 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 22:46:16.384 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 22:46:16.384 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 22:46:16.385 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 22:46:16.385 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 22:46:16.386 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 22:46:16.386 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 22:46:16.386 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 22:46:16.387 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-17 22:46:16.390 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 105055088824460757724826588454537169766201391948
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 17 20:47:16 UTC 2022
           Final Date: Tue Nov 16 20:47:15 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f2:24:e4:ff:4a:1e:29:7d:3f:46:a3:35:3b:6e:ac:d6:9f:73:25:88],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 863347638005a30c7721a1b1ab59e3d9dff7547c
                       11cf005fbfb69407dcf39a6cc4817d7d40822d58
                       3a1ee45421475084a3e76eec23428c69fbd2a302
                       4cf53abad466a8a99828babd1daf6f99e35326c3
                       680536c03b6ee2e5cfc728187b51d8f22345198c
                       41dcd5bb07238693faa2930f742ac89d01283d85
                       e3775e43572fcfa72f758932a83d945df987ac70
                       620a32eaca5fe6d47fbe8bd2ae2a3526f7e63803
                       2338cc1b15a4de0806a3bef368ecf71af9348f9e
                       9784204c0da1e1a522d7ce1f0b0eccceae337279
                       7ff9ef7ba7ee2b1e23dc27eff1ab6e143896aefc
                       e9c14093e83b0e11c67424a7bd780a29188798da
                       9deb87fed1ef6c04afe687c6f835084f41426b00
                       cd4a6b4a15bffedf9cff3a6049d7f48109f84c63
                       2269e1d123dacca3477f35dcc082eec15a4dbf2c
                       cfacf012d6a18dade7e44523931ae0023e3a86aa
                       a69fbd8b9c7f7b1aba879b9a8497c470c9dba4e6
                       40d92b44e83cfed41f01e77e173550a6fff6eb36
                       60d0ee86393e2a84340e546b70ee3defc70e512e
                       8320f3e6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f1:74:91:96:7c:84:d9:04:7e:10:c2:68:1f:0a:46:21:bc:4a:2c:1e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-17 23:12:30.751  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-17 23:12:30.754 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-17 23:12:30.757 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-17 23:12:30.758 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-17 23:12:30.759  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-17 23:12:30.760  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-17 23:12:30.760  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-17 23:12:30.761 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-17 23:12:30.761 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-17 23:12:30.762 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-17 23:12:30.766 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-17 23:12:30.767 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 23:12:30.767 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 23:12:30.768 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 23:12:30.912  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-17 23:12:30.913  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-17 23:12:30.913 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-17 23:12:30.914 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 23:12:30.915  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-17 23:12:30.916  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-17 23:12:30.916 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 23:12:30.917 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 23:12:30.917 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 23:12:30.918 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 23:12:30.918 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 23:12:30.919 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 23:12:30.920 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 23:12:30.920 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 23:12:30.920 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 23:12:30.921 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-17 23:12:30.925 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 105055088824460757724826588454537169766201391948
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 17 20:47:16 UTC 2022
           Final Date: Tue Nov 16 20:47:15 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f2:24:e4:ff:4a:1e:29:7d:3f:46:a3:35:3b:6e:ac:d6:9f:73:25:88],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 863347638005a30c7721a1b1ab59e3d9dff7547c
                       11cf005fbfb69407dcf39a6cc4817d7d40822d58
                       3a1ee45421475084a3e76eec23428c69fbd2a302
                       4cf53abad466a8a99828babd1daf6f99e35326c3
                       680536c03b6ee2e5cfc728187b51d8f22345198c
                       41dcd5bb07238693faa2930f742ac89d01283d85
                       e3775e43572fcfa72f758932a83d945df987ac70
                       620a32eaca5fe6d47fbe8bd2ae2a3526f7e63803
                       2338cc1b15a4de0806a3bef368ecf71af9348f9e
                       9784204c0da1e1a522d7ce1f0b0eccceae337279
                       7ff9ef7ba7ee2b1e23dc27eff1ab6e143896aefc
                       e9c14093e83b0e11c67424a7bd780a29188798da
                       9deb87fed1ef6c04afe687c6f835084f41426b00
                       cd4a6b4a15bffedf9cff3a6049d7f48109f84c63
                       2269e1d123dacca3477f35dcc082eec15a4dbf2c
                       cfacf012d6a18dade7e44523931ae0023e3a86aa
                       a69fbd8b9c7f7b1aba879b9a8497c470c9dba4e6
                       40d92b44e83cfed41f01e77e173550a6fff6eb36
                       60d0ee86393e2a84340e546b70ee3defc70e512e
                       8320f3e6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5d:67:e3:3e:c9:35:af:1f:20:ad:26:86:14:1b:be:cf:03:ff:8c:54],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-17 23:12:35.923  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-17 23:12:35.924 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-17 23:12:35.926 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-17 23:12:35.927 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-17 23:12:35.927  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-17 23:12:35.928  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-17 23:12:35.929  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-17 23:12:35.930 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-17 23:12:35.930 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-17 23:12:35.931 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-17 23:12:35.934 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-17 23:12:35.935 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 23:12:35.937 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 23:12:35.938 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 23:12:36.072  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-17 23:12:36.072  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-17 23:12:36.073 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-17 23:12:36.073 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 23:12:36.075  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-17 23:12:36.075  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-17 23:12:36.076 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 23:12:36.076 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 23:12:36.076 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 23:12:36.077 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 23:12:36.077 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 23:12:36.078 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 23:12:36.079 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 23:12:36.079 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 23:12:36.079 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 23:12:36.080 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-17 23:12:36.083 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 105055088824460757724826588454537169766201391948
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 17 20:47:16 UTC 2022
           Final Date: Tue Nov 16 20:47:15 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f2:24:e4:ff:4a:1e:29:7d:3f:46:a3:35:3b:6e:ac:d6:9f:73:25:88],[56:66:d1:a4]
        modulus: bac12379587777e20a1b6234f86db53f1afacb82ce9735b4104a2425be82347e5b345fe72a1ac30e65d1977ae5ff35726c8b3eac8f3464d33c1ff488b27ec7038fb8e15e32217e79d253ab1554fea63dcd26543c5e185fbbebfcbdffab029e8272c020963de68a782577b0b605079f0a0a7aed3767716eb5776b0fe07d238fd22d58aa0be0dc3941a70aa984dde763e139efd1f1774929abc329a5525d2fe5758361765f6b9e485c6990d4e640afd56ef6b271186293ec084e5ff6d3c3b23efbb77f0f1c009db4230e4bf1c441072f81092727d7f42f05161b6f9d428e65055a60f08f666b9446ad6ec14e8b3eebba07d2ebe5042f0edea74649116be2ddb763daff1256dbcdf2c9805ba5af003b0946f6a1ed5af2b75fbb5415fd452c89ffff7f5120dd97e0253fbdcdf7dde1a91fe70208a6f282e851ab8eab4e8ec46373f547f0ca660fe6cb9975f00189ad8cdfd14453e57b5f7607eea79de6b51f090d40d134379c3b6abf838284b2d0858693376c64269d687979924c2be5538f07bae5
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 863347638005a30c7721a1b1ab59e3d9dff7547c
                       11cf005fbfb69407dcf39a6cc4817d7d40822d58
                       3a1ee45421475084a3e76eec23428c69fbd2a302
                       4cf53abad466a8a99828babd1daf6f99e35326c3
                       680536c03b6ee2e5cfc728187b51d8f22345198c
                       41dcd5bb07238693faa2930f742ac89d01283d85
                       e3775e43572fcfa72f758932a83d945df987ac70
                       620a32eaca5fe6d47fbe8bd2ae2a3526f7e63803
                       2338cc1b15a4de0806a3bef368ecf71af9348f9e
                       9784204c0da1e1a522d7ce1f0b0eccceae337279
                       7ff9ef7ba7ee2b1e23dc27eff1ab6e143896aefc
                       e9c14093e83b0e11c67424a7bd780a29188798da
                       9deb87fed1ef6c04afe687c6f835084f41426b00
                       cd4a6b4a15bffedf9cff3a6049d7f48109f84c63
                       2269e1d123dacca3477f35dcc082eec15a4dbf2c
                       cfacf012d6a18dade7e44523931ae0023e3a86aa
                       a69fbd8b9c7f7b1aba879b9a8497c470c9dba4e6
                       40d92b44e83cfed41f01e77e173550a6fff6eb36
                       60d0ee86393e2a84340e546b70ee3defc70e512e
                       8320f3e6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [85:0e:a4:af:cc:b3:cb:ea:36:32:a8:25:77:26:2d:97:39:53:cb:9d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]