Results

By type

          2022-05-04 05:33:38,668 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-05-04 05:33:41,190 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-05-04 05:33:42.592  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
May 04, 2022 5:33:45 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
May 04, 2022 5:33:45 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
May 04, 2022 5:33:45 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
May 04, 2022 5:33:45 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-05-04 05:33:46.017 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-05-04 05:33:46.377  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-05-04 05:33:46.605  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-05-04 05:33:47.491 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-05-04 05:33:47.494 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-05-04 05:33:47.496 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-05-04 05:33:47.501 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-05-04 05:33:47.549 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-05-04 05:33:47.553 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-05-04 05:33:47.708 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-05-04 05:33:48.478 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
May 04, 2022 5:33:49 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-05-04 05:33:49.820  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 13.627 seconds (JVM running for 35.911)
May 04, 2022 5:33:54 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-05-04 06:31:17.109  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-04 06:31:17.136 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-04 06:31:17.201 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-04 06:31:17.210 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-04 06:31:17.250  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-04 06:31:17.255  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-04 06:31:17.257  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-04 06:31:17.261 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-04 06:31:17.262 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-04 06:31:17.271 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-04 06:31:17.286 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-04 06:31:17.294 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-04 06:31:17.369 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-04 06:31:17.380 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-04 06:31:17.381 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-04 06:31:17.391 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-04 06:31:18.503  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-04 06:31:18.513  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-04 06:31:18.514 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-04 06:31:18.517 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-04 06:31:18.540  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-04 06:31:18.542  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-04 06:31:18.544 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-04 06:31:18.547 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-04 06:31:18.548 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-04 06:31:18.579 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-04 06:31:18.581 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-04 06:31:18.581 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-04 06:31:18.593 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-04 06:31:18.595 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-04 06:31:18.595 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-04 06:31:18.598 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-04 06:31:18.651 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 72392099214337833787786480680221102601748653296
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 04 05:09:42 UTC 2022
           Final Date: Mon May 03 05:09:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [69:84:63:39:8a:f3:28:a4:a8:99:24:12:79:08:04:10:7a:8d:bf:12]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5cdd5587c66bf7bdd6c334abc5da7a16ce88a8f2
                       20395e06931c80cb15aa9aacebaea80e1614e0cd
                       c6abe89b6c6b22f528a422386ee6bc24e2577226
                       a9c8a650793da7179fe3feda1c42613b878cf1e9
                       1e90c70f0f78b0e670c9f25e4061dbf5555be1d7
                       8fda2b29cc09a87d4b41eefe5387771b686e4121
                       63af7ca1c6c0eba9e362636dd302b3128baa7751
                       66a3aba85c46ca24754a14b54b8e8a83133609b9
                       4af511cc3405a05348ee07d9c81ffff8457f997a
                       b0e9b695d324734dcdc081d65106f4a6f4439d2a
                       76cd6f92cb61bd947ac1b3082dca38bf781cc2a5
                       920cdf186dafec3bcbffd00ba2434266bd0fdc3a
                       b8c8b14665faa39cfe15e5529ba0c1d955e32576
                       84621db54a6d99ed99fb92dc04dda7cfcd1f2b7e
                       d2563db097ee5b3723e74b9845094b8537089144
                       cb1de6e59c8a9eadb1f9eaaef3c5404de2cfc798
                       c459800baa5f97e7a75435d10ba312cef6958cf0
                       fe58017dcf42b0b43f9e0d7b47fe7450801b23a2
                       777cafadb6e275ad524b2d81cb9d391b19e7cad3
                       6de570be
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [14:98:75:a9:7e:80:e0:d3:40:ca:15:b3:b5:80:4e:9c:e3:e4:8a:57]
            modulus: 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
    public exponent: 10001

] 
2022-05-04 06:31:18.944  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-04 06:31:18.946 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-04 06:31:18.949 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-04 06:31:18.950 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-04 06:31:18.951  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-04 06:31:18.954  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-04 06:31:18.956  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-04 06:31:18.957 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-04 06:31:18.961 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-04 06:31:18.963 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-04 06:31:18.986 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-04 06:31:18.990 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-04 06:31:18.993 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-04 06:31:18.994 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-04 06:31:19.130  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-04 06:31:19.131  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-04 06:31:19.132 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-04 06:31:19.132 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-04 06:31:19.144  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-04 06:31:19.145  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-04 06:31:19.146 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-04 06:31:19.147 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-04 06:31:19.147 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-04 06:31:19.150 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-04 06:31:19.151 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-04 06:31:19.152 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-04 06:31:19.154 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-04 06:31:19.156 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-04 06:31:19.156 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-04 06:31:19.159 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-04 06:31:19.174 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 72392099214337833787786480680221102601748653296
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 04 05:09:42 UTC 2022
           Final Date: Mon May 03 05:09:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [69:84:63:39:8a:f3:28:a4:a8:99:24:12:79:08:04:10:7a:8d:bf:12]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5cdd5587c66bf7bdd6c334abc5da7a16ce88a8f2
                       20395e06931c80cb15aa9aacebaea80e1614e0cd
                       c6abe89b6c6b22f528a422386ee6bc24e2577226
                       a9c8a650793da7179fe3feda1c42613b878cf1e9
                       1e90c70f0f78b0e670c9f25e4061dbf5555be1d7
                       8fda2b29cc09a87d4b41eefe5387771b686e4121
                       63af7ca1c6c0eba9e362636dd302b3128baa7751
                       66a3aba85c46ca24754a14b54b8e8a83133609b9
                       4af511cc3405a05348ee07d9c81ffff8457f997a
                       b0e9b695d324734dcdc081d65106f4a6f4439d2a
                       76cd6f92cb61bd947ac1b3082dca38bf781cc2a5
                       920cdf186dafec3bcbffd00ba2434266bd0fdc3a
                       b8c8b14665faa39cfe15e5529ba0c1d955e32576
                       84621db54a6d99ed99fb92dc04dda7cfcd1f2b7e
                       d2563db097ee5b3723e74b9845094b8537089144
                       cb1de6e59c8a9eadb1f9eaaef3c5404de2cfc798
                       c459800baa5f97e7a75435d10ba312cef6958cf0
                       fe58017dcf42b0b43f9e0d7b47fe7450801b23a2
                       777cafadb6e275ad524b2d81cb9d391b19e7cad3
                       6de570be
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7e:51:eb:3d:2a:d3:09:21:f3:e0:56:29:80:73:a5:a2:da:45:0a:29]
            modulus: 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
    public exponent: 10001

] 
2022-05-04 06:33:06.741  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-04 06:33:06.746 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-04 06:33:06.754 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-04 06:33:06.756 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-04 06:33:06.757  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-04 06:33:06.758  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-04 06:33:06.759  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-04 06:33:06.760 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-04 06:33:06.761 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-04 06:33:06.773 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-04 06:33:06.786 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-04 06:33:06.788 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-04 06:33:06.788 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-04 06:33:06.789 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-04 06:33:06.979  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-04 06:33:06.980  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-04 06:33:06.981 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-04 06:33:06.981 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-04 06:33:06.983  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-04 06:33:06.984  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-04 06:33:06.985 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-04 06:33:06.985 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-04 06:33:06.985 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-04 06:33:06.987 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-04 06:33:06.987 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-04 06:33:06.987 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-04 06:33:06.989 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-04 06:33:06.989 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-04 06:33:06.989 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-04 06:33:06.990 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-04 06:33:06.995 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 72392099214337833787786480680221102601748653296
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 04 05:09:42 UTC 2022
           Final Date: Mon May 03 05:09:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [69:84:63:39:8a:f3:28:a4:a8:99:24:12:79:08:04:10:7a:8d:bf:12]
            modulus: d1645336af67c8acb697f7acb726658fc4c9ed36f923602e6228553cd333b5250e5bb9b943e3c57e4ba85c6e1db5573e7360bfcbb568bc23a535c746b56e7855bf7a7b146fb01a89eec5ce8164254d63684d416b7aaf4ff1c7743995ef24667b978e02c0979b7ba9ec5baf95a05a7bfb5d70d47f4c01c46a34e35ed18b4785c0e77ad71095689b0db90cd71299ab7df4a18bd6bb3180192a044aff7470603cd8c2976853b82be06551921cf517245989395908f11659335b2cd9b0af846e27009eb188f0ee737acf124795538c40327851182fe44954e3796085a6e6f125127e47d360c7cf8f8c169f6847bbe540942c4c02564bd26a6eb40cfa604cb4745ae1074d58863fd00a4d10f673cd469ecca0488b29ed6cf62b2f70bb3dc1579d8ce6e44bbb72ce8b295efc570d8aa9d3fe81b04c4f685e5792409c8e95b300b0021f22ab6e2bf3d72f7af1cf4e739f93f8325c9ce114aa2fc78b977aaa6a51d06f84eed2493b0dc58d0c00d1cf3bd81a5ee7957a8d5845f4fb50a63d6668f6055e0b
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5cdd5587c66bf7bdd6c334abc5da7a16ce88a8f2
                       20395e06931c80cb15aa9aacebaea80e1614e0cd
                       c6abe89b6c6b22f528a422386ee6bc24e2577226
                       a9c8a650793da7179fe3feda1c42613b878cf1e9
                       1e90c70f0f78b0e670c9f25e4061dbf5555be1d7
                       8fda2b29cc09a87d4b41eefe5387771b686e4121
                       63af7ca1c6c0eba9e362636dd302b3128baa7751
                       66a3aba85c46ca24754a14b54b8e8a83133609b9
                       4af511cc3405a05348ee07d9c81ffff8457f997a
                       b0e9b695d324734dcdc081d65106f4a6f4439d2a
                       76cd6f92cb61bd947ac1b3082dca38bf781cc2a5
                       920cdf186dafec3bcbffd00ba2434266bd0fdc3a
                       b8c8b14665faa39cfe15e5529ba0c1d955e32576
                       84621db54a6d99ed99fb92dc04dda7cfcd1f2b7e
                       d2563db097ee5b3723e74b9845094b8537089144
                       cb1de6e59c8a9eadb1f9eaaef3c5404de2cfc798
                       c459800baa5f97e7a75435d10ba312cef6958cf0
                       fe58017dcf42b0b43f9e0d7b47fe7450801b23a2
                       777cafadb6e275ad524b2d81cb9d391b19e7cad3
                       6de570be
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [99:14:a8:15:5e:d9:e8:24:2d:21:c0:96:36:d2:e7:e1:59:a6:d6:64]
            modulus: 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
    public exponent: 10001

] 
2022-05-04 06:34:18.542  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-04 06:34:18.544 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-04 06:34:18.545 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-04 06:34:18.546 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-04 06:34:18.547  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-04 06:34:18.548  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-04 06:34:18.548  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-04 06:34:18.549 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-04 06:34:18.549 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-04 06:34:18.550 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-04 06:34:18.556 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-04 06:34:18.557 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-04 06:34:18.558 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-04 06:34:18.558 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-04 06:34:18.707  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-04 06:34:18.708  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-04 06:34:18.709 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-04 06:34:18.709 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-04 06:34:18.713  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-04 06:34:18.713  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-04 06:34:18.715 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-04 06:34:18.715 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-04 06:34:18.716 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-04 06:34:18.717 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-04 06:34:18.718 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-04 06:34:18.718 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-04 06:34:18.725 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-04 06:34:18.727 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-04 06:34:18.728 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-04 06:34:18.730 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-04 06:34:18.739 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 72392099214337833787786480680221102601748653296
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 04 05:09:42 UTC 2022
           Final Date: Mon May 03 05:09:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [69:84:63:39:8a:f3:28:a4:a8:99:24:12:79:08:04:10:7a:8d:bf:12]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5cdd5587c66bf7bdd6c334abc5da7a16ce88a8f2
                       20395e06931c80cb15aa9aacebaea80e1614e0cd
                       c6abe89b6c6b22f528a422386ee6bc24e2577226
                       a9c8a650793da7179fe3feda1c42613b878cf1e9
                       1e90c70f0f78b0e670c9f25e4061dbf5555be1d7
                       8fda2b29cc09a87d4b41eefe5387771b686e4121
                       63af7ca1c6c0eba9e362636dd302b3128baa7751
                       66a3aba85c46ca24754a14b54b8e8a83133609b9
                       4af511cc3405a05348ee07d9c81ffff8457f997a
                       b0e9b695d324734dcdc081d65106f4a6f4439d2a
                       76cd6f92cb61bd947ac1b3082dca38bf781cc2a5
                       920cdf186dafec3bcbffd00ba2434266bd0fdc3a
                       b8c8b14665faa39cfe15e5529ba0c1d955e32576
                       84621db54a6d99ed99fb92dc04dda7cfcd1f2b7e
                       d2563db097ee5b3723e74b9845094b8537089144
                       cb1de6e59c8a9eadb1f9eaaef3c5404de2cfc798
                       c459800baa5f97e7a75435d10ba312cef6958cf0
                       fe58017dcf42b0b43f9e0d7b47fe7450801b23a2
                       777cafadb6e275ad524b2d81cb9d391b19e7cad3
                       6de570be
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6e:5f:22:b4:86:82:45:88:ac:83:29:bd:28:65:ae:b6:52:d7:99:6c]
            modulus: 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
    public exponent: 10001

] 
2022-05-04 06:36:29.307  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-04 06:36:29.309 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-04 06:36:29.314 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-04 06:36:29.315 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-04 06:36:29.315  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-04 06:36:29.316  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-04 06:36:29.316  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-04 06:36:29.317 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-04 06:36:29.318 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-04 06:36:29.318 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-04 06:36:29.329 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-04 06:36:29.330 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-04 06:36:29.331 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-04 06:36:29.334 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-04 06:36:29.475  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-04 06:36:29.476  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-04 06:36:29.476 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-04 06:36:29.477 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-04 06:36:29.479  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-04 06:36:29.479  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-04 06:36:29.480 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-04 06:36:29.480 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-04 06:36:29.481 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-04 06:36:29.482 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-04 06:36:29.482 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-04 06:36:29.482 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-04 06:36:29.483 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-04 06:36:29.484 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-04 06:36:29.484 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-04 06:36:29.485 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-04 06:36:29.492 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 72392099214337833787786480680221102601748653296
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 04 05:09:42 UTC 2022
           Final Date: Mon May 03 05:09:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [69:84:63:39:8a:f3:28:a4:a8:99:24:12:79:08:04:10:7a:8d:bf:12]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5cdd5587c66bf7bdd6c334abc5da7a16ce88a8f2
                       20395e06931c80cb15aa9aacebaea80e1614e0cd
                       c6abe89b6c6b22f528a422386ee6bc24e2577226
                       a9c8a650793da7179fe3feda1c42613b878cf1e9
                       1e90c70f0f78b0e670c9f25e4061dbf5555be1d7
                       8fda2b29cc09a87d4b41eefe5387771b686e4121
                       63af7ca1c6c0eba9e362636dd302b3128baa7751
                       66a3aba85c46ca24754a14b54b8e8a83133609b9
                       4af511cc3405a05348ee07d9c81ffff8457f997a
                       b0e9b695d324734dcdc081d65106f4a6f4439d2a
                       76cd6f92cb61bd947ac1b3082dca38bf781cc2a5
                       920cdf186dafec3bcbffd00ba2434266bd0fdc3a
                       b8c8b14665faa39cfe15e5529ba0c1d955e32576
                       84621db54a6d99ed99fb92dc04dda7cfcd1f2b7e
                       d2563db097ee5b3723e74b9845094b8537089144
                       cb1de6e59c8a9eadb1f9eaaef3c5404de2cfc798
                       c459800baa5f97e7a75435d10ba312cef6958cf0
                       fe58017dcf42b0b43f9e0d7b47fe7450801b23a2
                       777cafadb6e275ad524b2d81cb9d391b19e7cad3
                       6de570be
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [42:02:da:7a:80:5b:8a:c8:e5:21:4e:f6:ac:46:19:c2:1c:2a:75:42]
            modulus: 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
    public exponent: 10001

] 
2022-05-04 06:36:32.032  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-04 06:36:32.034 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-04 06:36:32.036 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-04 06:36:32.037 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-04 06:36:32.037  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-04 06:36:32.039  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-04 06:36:32.039  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-04 06:36:32.039 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-04 06:36:32.040 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-04 06:36:32.041 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-04 06:36:32.048 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-04 06:36:32.049 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-04 06:36:32.049 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-04 06:36:32.050 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-04 06:36:32.157  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-04 06:36:32.158  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-04 06:36:32.158 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-04 06:36:32.159 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-04 06:36:32.161  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-04 06:36:32.162  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-04 06:36:32.163 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-04 06:36:32.163 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-04 06:36:32.164 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-04 06:36:32.165 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-04 06:36:32.166 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-04 06:36:32.166 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-04 06:36:32.167 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-04 06:36:32.168 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-04 06:36:32.168 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-04 06:36:32.169 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-04 06:36:32.173 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 72392099214337833787786480680221102601748653296
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 04 05:09:42 UTC 2022
           Final Date: Mon May 03 05:09:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [69:84:63:39:8a:f3:28:a4:a8:99:24:12:79:08:04:10:7a:8d:bf:12]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5cdd5587c66bf7bdd6c334abc5da7a16ce88a8f2
                       20395e06931c80cb15aa9aacebaea80e1614e0cd
                       c6abe89b6c6b22f528a422386ee6bc24e2577226
                       a9c8a650793da7179fe3feda1c42613b878cf1e9
                       1e90c70f0f78b0e670c9f25e4061dbf5555be1d7
                       8fda2b29cc09a87d4b41eefe5387771b686e4121
                       63af7ca1c6c0eba9e362636dd302b3128baa7751
                       66a3aba85c46ca24754a14b54b8e8a83133609b9
                       4af511cc3405a05348ee07d9c81ffff8457f997a
                       b0e9b695d324734dcdc081d65106f4a6f4439d2a
                       76cd6f92cb61bd947ac1b3082dca38bf781cc2a5
                       920cdf186dafec3bcbffd00ba2434266bd0fdc3a
                       b8c8b14665faa39cfe15e5529ba0c1d955e32576
                       84621db54a6d99ed99fb92dc04dda7cfcd1f2b7e
                       d2563db097ee5b3723e74b9845094b8537089144
                       cb1de6e59c8a9eadb1f9eaaef3c5404de2cfc798
                       c459800baa5f97e7a75435d10ba312cef6958cf0
                       fe58017dcf42b0b43f9e0d7b47fe7450801b23a2
                       777cafadb6e275ad524b2d81cb9d391b19e7cad3
                       6de570be
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9f:95:6e:2e:e2:12:cc:c0:6e:fe:30:14:16:da:f0:8f:7e:35:67:5e]
            modulus: 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
    public exponent: 10001

] 
2022-05-04 06:36:42.402  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-04 06:36:42.404 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-04 06:36:42.406 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-04 06:36:42.407 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-04 06:36:42.408  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-04 06:36:42.409  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-04 06:36:42.410  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-04 06:36:42.410 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-04 06:36:42.411 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-04 06:36:42.411 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-04 06:36:42.418 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-04 06:36:42.419 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-04 06:36:42.419 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-04 06:36:42.420 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-04 06:36:42.531  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-04 06:36:42.531  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-04 06:36:42.532 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-04 06:36:42.532 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-04 06:36:42.534  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-04 06:36:42.535  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-04 06:36:42.535 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-04 06:36:42.536 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-04 06:36:42.536 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-04 06:36:42.537 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-04 06:36:42.538 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-04 06:36:42.539 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-04 06:36:42.541 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-04 06:36:42.542 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-04 06:36:42.543 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-04 06:36:42.545 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-04 06:36:42.551 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 72392099214337833787786480680221102601748653296
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 04 05:09:42 UTC 2022
           Final Date: Mon May 03 05:09:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [69:84:63:39:8a:f3:28:a4:a8:99:24:12:79:08:04:10:7a:8d:bf:12]
            modulus: d1645336af67c8acb697f7acb726658fc4c9ed36f923602e6228553cd333b5250e5bb9b943e3c57e4ba85c6e1db5573e7360bfcbb568bc23a535c746b56e7855bf7a7b146fb01a89eec5ce8164254d63684d416b7aaf4ff1c7743995ef24667b978e02c0979b7ba9ec5baf95a05a7bfb5d70d47f4c01c46a34e35ed18b4785c0e77ad71095689b0db90cd71299ab7df4a18bd6bb3180192a044aff7470603cd8c2976853b82be06551921cf517245989395908f11659335b2cd9b0af846e27009eb188f0ee737acf124795538c40327851182fe44954e3796085a6e6f125127e47d360c7cf8f8c169f6847bbe540942c4c02564bd26a6eb40cfa604cb4745ae1074d58863fd00a4d10f673cd469ecca0488b29ed6cf62b2f70bb3dc1579d8ce6e44bbb72ce8b295efc570d8aa9d3fe81b04c4f685e5792409c8e95b300b0021f22ab6e2bf3d72f7af1cf4e739f93f8325c9ce114aa2fc78b977aaa6a51d06f84eed2493b0dc58d0c00d1cf3bd81a5ee7957a8d5845f4fb50a63d6668f6055e0b
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5cdd5587c66bf7bdd6c334abc5da7a16ce88a8f2
                       20395e06931c80cb15aa9aacebaea80e1614e0cd
                       c6abe89b6c6b22f528a422386ee6bc24e2577226
                       a9c8a650793da7179fe3feda1c42613b878cf1e9
                       1e90c70f0f78b0e670c9f25e4061dbf5555be1d7
                       8fda2b29cc09a87d4b41eefe5387771b686e4121
                       63af7ca1c6c0eba9e362636dd302b3128baa7751
                       66a3aba85c46ca24754a14b54b8e8a83133609b9
                       4af511cc3405a05348ee07d9c81ffff8457f997a
                       b0e9b695d324734dcdc081d65106f4a6f4439d2a
                       76cd6f92cb61bd947ac1b3082dca38bf781cc2a5
                       920cdf186dafec3bcbffd00ba2434266bd0fdc3a
                       b8c8b14665faa39cfe15e5529ba0c1d955e32576
                       84621db54a6d99ed99fb92dc04dda7cfcd1f2b7e
                       d2563db097ee5b3723e74b9845094b8537089144
                       cb1de6e59c8a9eadb1f9eaaef3c5404de2cfc798
                       c459800baa5f97e7a75435d10ba312cef6958cf0
                       fe58017dcf42b0b43f9e0d7b47fe7450801b23a2
                       777cafadb6e275ad524b2d81cb9d391b19e7cad3
                       6de570be
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [66:5b:77:86:f4:14:ad:ee:d7:d1:76:0f:24:c3:1b:5c:c7:1f:c6:9a]
            modulus: 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
    public exponent: 10001

] 
2022-05-04 06:39:04.984  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-04 06:39:04.986 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-04 06:39:04.987 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-04 06:39:04.988 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-04 06:39:04.989  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-04 06:39:04.990  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-04 06:39:04.990  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-04 06:39:04.991 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-04 06:39:04.991 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-04 06:39:04.992 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-04 06:39:04.997 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-04 06:39:04.998 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-04 06:39:04.998 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-04 06:39:04.999 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-04 06:39:05.189  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-04 06:39:05.190  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-04 06:39:05.191 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-04 06:39:05.191 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-04 06:39:05.193  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-04 06:39:05.194  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-04 06:39:05.194 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-04 06:39:05.195 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-04 06:39:05.195 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-04 06:39:05.196 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-04 06:39:05.197 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-04 06:39:05.197 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-04 06:39:05.198 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-04 06:39:05.198 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-04 06:39:05.198 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-04 06:39:05.200 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-04 06:39:05.205 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 72392099214337833787786480680221102601748653296
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 04 05:09:42 UTC 2022
           Final Date: Mon May 03 05:09:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [69:84:63:39:8a:f3:28:a4:a8:99:24:12:79:08:04:10:7a:8d:bf:12]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5cdd5587c66bf7bdd6c334abc5da7a16ce88a8f2
                       20395e06931c80cb15aa9aacebaea80e1614e0cd
                       c6abe89b6c6b22f528a422386ee6bc24e2577226
                       a9c8a650793da7179fe3feda1c42613b878cf1e9
                       1e90c70f0f78b0e670c9f25e4061dbf5555be1d7
                       8fda2b29cc09a87d4b41eefe5387771b686e4121
                       63af7ca1c6c0eba9e362636dd302b3128baa7751
                       66a3aba85c46ca24754a14b54b8e8a83133609b9
                       4af511cc3405a05348ee07d9c81ffff8457f997a
                       b0e9b695d324734dcdc081d65106f4a6f4439d2a
                       76cd6f92cb61bd947ac1b3082dca38bf781cc2a5
                       920cdf186dafec3bcbffd00ba2434266bd0fdc3a
                       b8c8b14665faa39cfe15e5529ba0c1d955e32576
                       84621db54a6d99ed99fb92dc04dda7cfcd1f2b7e
                       d2563db097ee5b3723e74b9845094b8537089144
                       cb1de6e59c8a9eadb1f9eaaef3c5404de2cfc798
                       c459800baa5f97e7a75435d10ba312cef6958cf0
                       fe58017dcf42b0b43f9e0d7b47fe7450801b23a2
                       777cafadb6e275ad524b2d81cb9d391b19e7cad3
                       6de570be
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a7:5c:62:fa:e0:f5:d1:28:68:36:7c:49:d5:25:da:ed:16:35:9b:41]
            modulus: d6e672a13fddabb3fffe0caf683742ea96aa86eb2393b0bb185116c097d1e538c983b3c71d449e64c9efb647edec7fb13d2848667ba3b35a7e88ae27e874e38181a34e1c76f792452371641189b4a9fb28fa9827bcc8273ba32796a1bf60527f9b5c586428ba7880bb66eaf5b9d7ad9dfff49c70c6218cf9f1bd6e82a97440c561b53705b018f5350c68d1d0fe7911d1b6f99937dc6c3e40e9354cc82629bb42ded86d703125c9ee4004565100517987823a07e02955e7cdf39abd41e44ba366261992560cab5cded696345ec26c60d4957161c9c76ef8d795cfbdce819c08d42eee686cb5137ef4bb4ff5f9901d6f4ecf8aaed131f64a0e719afdad775d5329
    public exponent: 10001

] 
2022-05-04 06:41:17.371  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-04 06:41:17.373 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-04 06:41:17.374 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-04 06:41:17.375 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-04 06:41:17.376  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-04 06:41:17.376  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-04 06:41:17.377  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-04 06:41:17.377 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-04 06:41:17.377 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-04 06:41:17.378 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-04 06:41:17.382 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-04 06:41:17.383 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-04 06:41:17.384 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-04 06:41:17.384 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-04 06:41:17.520  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-04 06:41:17.521  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-04 06:41:17.521 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-04 06:41:17.521 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-04 06:41:17.523  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-04 06:41:17.523  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-04 06:41:17.529 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-04 06:41:17.529 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-04 06:41:17.530 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-04 06:41:17.531 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-04 06:41:17.531 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-04 06:41:17.532 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-04 06:41:17.533 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-04 06:41:17.533 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-04 06:41:17.533 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-04 06:41:17.535 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-04 06:41:17.540 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 72392099214337833787786480680221102601748653296
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 04 05:09:42 UTC 2022
           Final Date: Mon May 03 05:09:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [69:84:63:39:8a:f3:28:a4:a8:99:24:12:79:08:04:10:7a:8d:bf:12]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5cdd5587c66bf7bdd6c334abc5da7a16ce88a8f2
                       20395e06931c80cb15aa9aacebaea80e1614e0cd
                       c6abe89b6c6b22f528a422386ee6bc24e2577226
                       a9c8a650793da7179fe3feda1c42613b878cf1e9
                       1e90c70f0f78b0e670c9f25e4061dbf5555be1d7
                       8fda2b29cc09a87d4b41eefe5387771b686e4121
                       63af7ca1c6c0eba9e362636dd302b3128baa7751
                       66a3aba85c46ca24754a14b54b8e8a83133609b9
                       4af511cc3405a05348ee07d9c81ffff8457f997a
                       b0e9b695d324734dcdc081d65106f4a6f4439d2a
                       76cd6f92cb61bd947ac1b3082dca38bf781cc2a5
                       920cdf186dafec3bcbffd00ba2434266bd0fdc3a
                       b8c8b14665faa39cfe15e5529ba0c1d955e32576
                       84621db54a6d99ed99fb92dc04dda7cfcd1f2b7e
                       d2563db097ee5b3723e74b9845094b8537089144
                       cb1de6e59c8a9eadb1f9eaaef3c5404de2cfc798
                       c459800baa5f97e7a75435d10ba312cef6958cf0
                       fe58017dcf42b0b43f9e0d7b47fe7450801b23a2
                       777cafadb6e275ad524b2d81cb9d391b19e7cad3
                       6de570be
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [89:c6:20:b2:1b:e4:da:77:52:f5:41:60:c4:cb:41:53:7b:24:f5:08]
            modulus: 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
    public exponent: 10001

] 
2022-05-04 06:45:11.922  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-04 06:45:11.924 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-04 06:45:11.926 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-04 06:45:11.927 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-04 06:45:11.927  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-04 06:45:11.928  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-04 06:45:11.929  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-04 06:45:11.929 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-04 06:45:11.930 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-04 06:45:11.930 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-04 06:45:11.936 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-04 06:45:11.937 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-04 06:45:11.937 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-04 06:45:11.938 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-04 06:45:12.054  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-04 06:45:12.055  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-04 06:45:12.056 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-04 06:45:12.056 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-04 06:45:12.057  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-04 06:45:12.058  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-04 06:45:12.058 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-04 06:45:12.058 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-04 06:45:12.059 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-04 06:45:12.059 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-04 06:45:12.060 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-04 06:45:12.060 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-04 06:45:12.060 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-04 06:45:12.061 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-04 06:45:12.061 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-04 06:45:12.062 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-04 06:45:12.065 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 72392099214337833787786480680221102601748653296
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed May 04 05:09:42 UTC 2022
           Final Date: Mon May 03 05:09:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [69:84:63:39:8a:f3:28:a4:a8:99:24:12:79:08:04:10:7a:8d:bf:12]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5cdd5587c66bf7bdd6c334abc5da7a16ce88a8f2
                       20395e06931c80cb15aa9aacebaea80e1614e0cd
                       c6abe89b6c6b22f528a422386ee6bc24e2577226
                       a9c8a650793da7179fe3feda1c42613b878cf1e9
                       1e90c70f0f78b0e670c9f25e4061dbf5555be1d7
                       8fda2b29cc09a87d4b41eefe5387771b686e4121
                       63af7ca1c6c0eba9e362636dd302b3128baa7751
                       66a3aba85c46ca24754a14b54b8e8a83133609b9
                       4af511cc3405a05348ee07d9c81ffff8457f997a
                       b0e9b695d324734dcdc081d65106f4a6f4439d2a
                       76cd6f92cb61bd947ac1b3082dca38bf781cc2a5
                       920cdf186dafec3bcbffd00ba2434266bd0fdc3a
                       b8c8b14665faa39cfe15e5529ba0c1d955e32576
                       84621db54a6d99ed99fb92dc04dda7cfcd1f2b7e
                       d2563db097ee5b3723e74b9845094b8537089144
                       cb1de6e59c8a9eadb1f9eaaef3c5404de2cfc798
                       c459800baa5f97e7a75435d10ba312cef6958cf0
                       fe58017dcf42b0b43f9e0d7b47fe7450801b23a2
                       777cafadb6e275ad524b2d81cb9d391b19e7cad3
                       6de570be
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [41:af:54:7e:66:02:f9:4c:be:45:f0:20:86:9e:62:0c:44:8c:d0:9e]
            modulus: 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
    public exponent: 10001

]