Results

By type

          2022-05-17 05:01:26,886 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-05-17 05:01:27,543 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-05-17 05:01:28.162  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
May 17, 2022 5:01:29 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
May 17, 2022 5:01:29 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
May 17, 2022 5:01:29 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
May 17, 2022 5:01:29 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-05-17 05:01:29.934 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-05-17 05:01:30.129  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-05-17 05:01:30.233  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-05-17 05:01:30.745 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-05-17 05:01:30.747 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-05-17 05:01:30.748 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-05-17 05:01:30.750 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-05-17 05:01:30.776 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
2022-05-17 05:01:30.778 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-05-17 05:01:30.852 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-05-17 05:01:31.280 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
May 17, 2022 5:01:31 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-05-17 05:01:31.924  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 5.54 seconds (JVM running for 6.589)
May 17, 2022 5:02:03 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-05-17 05:02:22.338  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-17 05:02:22.353 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-17 05:02:22.382 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-17 05:02:22.385 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-17 05:02:22.395  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-17 05:02:22.398  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-17 05:02:22.398  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-17 05:02:22.399 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-17 05:02:22.400 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 05:02:22.402 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-17 05:02:22.407 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-17 05:02:22.409 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-17 05:02:22.435 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-17 05:02:22.440 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 05:02:22.440 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 05:02:22.443 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 05:02:23.005  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-17 05:02:23.007  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-17 05:02:23.008 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-17 05:02:23.009 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 05:02:23.015  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-17 05:02:23.015  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-17 05:02:23.016 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 05:02:23.016 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 05:02:23.017 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 05:02:23.029 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 05:02:23.029 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 05:02:23.029 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 05:02:23.034 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 05:02:23.034 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 05:02:23.035 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 05:02:23.036 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-17 05:02:23.056 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 203457712909023764278553164763592215750323130250
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 17 04:59:12 UTC 2022
           Final Date: Sun May 16 04:59:11 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [48:2b:9f:d0:1f:cc:51:0b:9e:02:6c:b2:87:03:71:2f:28:21:dc:7a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7338217088f28589112db4b6aabcfcd24bc80326
                       51a766e03d6a36ff84e23c530bea2d2873b1e972
                       bb72c5c8d57d82f7f180343d00b6d438790c1aae
                       7aba69ae76ff402b62185717c92bfa9387b95707
                       2fa5b7b4616efb624662b010e227aa0ee2094a94
                       e89d78f94c81c1d45e109634ca5e8d4023da369b
                       a2dcb3b9d7df6067e31165667d3e90c96b7924b6
                       625aa80e3b5ba05ef2e97429db6d116dade497ce
                       387342d548314b04cbca339f1945cf8140da93b0
                       6fba1fbc8be5cce92e92c739c82a476fd04e92e6
                       4474dfb1f05cb8ca63893702db9c4a1d63710d13
                       2a102561442307ff5ce8424891ccd2ee999e0445
                       4bb018024bb2082f8804531bff9cc50161c90e93
                       7d571e004b3b872d68831358776b95d46832c50b
                       a034c40e838e551813c3cf1235b233baf7992d51
                       336d3dcae8334bbee17692e59821f39f567c367d
                       712dac3aee713a2b186cb2e34e7de1bf9248d9d1
                       765a0b665f2b12c64acda5fac30771ec1682d921
                       f6adfd46ee7be22336aa49ef2b7f0446bce3b039
                       c3c7ba91
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [62:4d:20:7c:15:c2:b4:4c:ef:3d:8c:a7:2e:55:24:d5:d8:56:71:77]
            modulus: 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
    public exponent: 10001

] 
2022-05-17 06:08:17.937  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-17 06:08:17.939 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-17 06:08:17.942 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-17 06:08:17.943 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-17 06:08:17.943  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-17 06:08:17.944  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-17 06:08:17.944  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-17 06:08:17.944 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-17 06:08:17.945 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-17 06:08:17.945 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-17 06:08:17.953 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-17 06:08:17.954 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 06:08:17.954 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 06:08:17.954 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 06:08:18.174  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-17 06:08:18.175  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-17 06:08:18.175 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-17 06:08:18.175 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 06:08:18.177  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-17 06:08:18.177  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-17 06:08:18.178 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 06:08:18.178 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 06:08:18.178 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 06:08:18.179 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 06:08:18.179 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 06:08:18.179 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 06:08:18.180 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 06:08:18.180 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 06:08:18.181 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 06:08:18.181 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-17 06:08:18.184 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 203457712909023764278553164763592215750323130250
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 17 04:59:12 UTC 2022
           Final Date: Sun May 16 04:59:11 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [48:2b:9f:d0:1f:cc:51:0b:9e:02:6c:b2:87:03:71:2f:28:21:dc:7a]
            modulus: a48ca4323048963d6c4b250e02b8798af3df58a1fc61d252e1d37e321645540a4ab81982dd4e154da19f0e3e0d9ca3a9415e45cb6095eadf69aa2ebf181bff88dc7c1a7ab5b4c90d68419384d81fa0f2750301240b98feddbbbc370d60e89360ea528b946399f3bc6fca9b4f4e9bb4fc333d315b8fd933687fcdf515abd3be9af04d0935c4d12a089b58fb3f8af0cd93a206b71704ba222e5869736a6d0ba76130d932cf4739ebd0c2cc05ec816742cb3eb48a08d89813124138b770a54d9c32b6d3f2e1a6a6593a252e563f945d471023fdbc516519dd2d6849a101a05773c9d70f9c8875000ee59e947014f049ab14d27b857ccd39acf0c57b43f9d0d291fe35cc2dac24259baf9e7c22ea3416f526d90317ce5baed9d445e6bb2c05fa0dc283cd3cc7af1f9a12d48c66605bf9b3971c65b59f8e1f92416f5f62127135385969942270aae764bde5d820b6a4be97b06e102e2b9de41b2ef274334951a5b00b4f2f78c3e800da1eff0aab3c01feb9069e45edf12d07d6a1a17801a68e86d21f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7338217088f28589112db4b6aabcfcd24bc80326
                       51a766e03d6a36ff84e23c530bea2d2873b1e972
                       bb72c5c8d57d82f7f180343d00b6d438790c1aae
                       7aba69ae76ff402b62185717c92bfa9387b95707
                       2fa5b7b4616efb624662b010e227aa0ee2094a94
                       e89d78f94c81c1d45e109634ca5e8d4023da369b
                       a2dcb3b9d7df6067e31165667d3e90c96b7924b6
                       625aa80e3b5ba05ef2e97429db6d116dade497ce
                       387342d548314b04cbca339f1945cf8140da93b0
                       6fba1fbc8be5cce92e92c739c82a476fd04e92e6
                       4474dfb1f05cb8ca63893702db9c4a1d63710d13
                       2a102561442307ff5ce8424891ccd2ee999e0445
                       4bb018024bb2082f8804531bff9cc50161c90e93
                       7d571e004b3b872d68831358776b95d46832c50b
                       a034c40e838e551813c3cf1235b233baf7992d51
                       336d3dcae8334bbee17692e59821f39f567c367d
                       712dac3aee713a2b186cb2e34e7de1bf9248d9d1
                       765a0b665f2b12c64acda5fac30771ec1682d921
                       f6adfd46ee7be22336aa49ef2b7f0446bce3b039
                       c3c7ba91
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2b:da:2b:fd:f6:3f:8a:ac:d5:19:94:52:11:8e:98:64:68:13:fa:55]
            modulus: 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
    public exponent: 10001

] 
2022-05-17 06:08:18.435  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-17 06:08:18.436 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-17 06:08:18.437 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-17 06:08:18.438 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-17 06:08:18.438  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-17 06:08:18.438  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-17 06:08:18.439  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-17 06:08:18.439 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-17 06:08:18.439 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-17 06:08:18.440 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-17 06:08:18.450 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-17 06:08:18.452 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 06:08:18.452 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 06:08:18.453 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 06:08:18.574  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-17 06:08:18.575  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-17 06:08:18.576 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-17 06:08:18.576 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 06:08:18.579  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-17 06:08:18.579  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-17 06:08:18.579 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 06:08:18.580 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 06:08:18.580 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 06:08:18.581 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 06:08:18.581 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 06:08:18.581 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 06:08:18.582 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 06:08:18.582 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 06:08:18.582 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 06:08:18.583 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-17 06:08:18.586 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 203457712909023764278553164763592215750323130250
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 17 04:59:12 UTC 2022
           Final Date: Sun May 16 04:59:11 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [48:2b:9f:d0:1f:cc:51:0b:9e:02:6c:b2:87:03:71:2f:28:21:dc:7a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7338217088f28589112db4b6aabcfcd24bc80326
                       51a766e03d6a36ff84e23c530bea2d2873b1e972
                       bb72c5c8d57d82f7f180343d00b6d438790c1aae
                       7aba69ae76ff402b62185717c92bfa9387b95707
                       2fa5b7b4616efb624662b010e227aa0ee2094a94
                       e89d78f94c81c1d45e109634ca5e8d4023da369b
                       a2dcb3b9d7df6067e31165667d3e90c96b7924b6
                       625aa80e3b5ba05ef2e97429db6d116dade497ce
                       387342d548314b04cbca339f1945cf8140da93b0
                       6fba1fbc8be5cce92e92c739c82a476fd04e92e6
                       4474dfb1f05cb8ca63893702db9c4a1d63710d13
                       2a102561442307ff5ce8424891ccd2ee999e0445
                       4bb018024bb2082f8804531bff9cc50161c90e93
                       7d571e004b3b872d68831358776b95d46832c50b
                       a034c40e838e551813c3cf1235b233baf7992d51
                       336d3dcae8334bbee17692e59821f39f567c367d
                       712dac3aee713a2b186cb2e34e7de1bf9248d9d1
                       765a0b665f2b12c64acda5fac30771ec1682d921
                       f6adfd46ee7be22336aa49ef2b7f0446bce3b039
                       c3c7ba91
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e5:51:d4:91:0f:7b:8c:1e:6b:40:b7:8b:53:bb:e8:f1:c1:e7:ab:63]
            modulus: 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
    public exponent: 10001

] 
2022-05-17 06:10:05.310  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-17 06:10:05.311 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-17 06:10:05.312 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-17 06:10:05.313 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-17 06:10:05.313  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-17 06:10:05.313  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-17 06:10:05.314  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-17 06:10:05.314 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-17 06:10:05.314 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-17 06:10:05.314 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-17 06:10:05.317 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-17 06:10:05.318 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 06:10:05.318 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 06:10:05.318 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 06:10:05.470  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-17 06:10:05.471  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-17 06:10:05.471 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-17 06:10:05.472 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 06:10:05.473  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-17 06:10:05.474  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-17 06:10:05.474 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 06:10:05.474 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 06:10:05.475 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 06:10:05.492 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 06:10:05.492 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 06:10:05.492 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 06:10:05.493 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 06:10:05.493 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 06:10:05.493 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 06:10:05.494 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-17 06:10:05.498 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 203457712909023764278553164763592215750323130250
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 17 04:59:12 UTC 2022
           Final Date: Sun May 16 04:59:11 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [48:2b:9f:d0:1f:cc:51:0b:9e:02:6c:b2:87:03:71:2f:28:21:dc:7a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7338217088f28589112db4b6aabcfcd24bc80326
                       51a766e03d6a36ff84e23c530bea2d2873b1e972
                       bb72c5c8d57d82f7f180343d00b6d438790c1aae
                       7aba69ae76ff402b62185717c92bfa9387b95707
                       2fa5b7b4616efb624662b010e227aa0ee2094a94
                       e89d78f94c81c1d45e109634ca5e8d4023da369b
                       a2dcb3b9d7df6067e31165667d3e90c96b7924b6
                       625aa80e3b5ba05ef2e97429db6d116dade497ce
                       387342d548314b04cbca339f1945cf8140da93b0
                       6fba1fbc8be5cce92e92c739c82a476fd04e92e6
                       4474dfb1f05cb8ca63893702db9c4a1d63710d13
                       2a102561442307ff5ce8424891ccd2ee999e0445
                       4bb018024bb2082f8804531bff9cc50161c90e93
                       7d571e004b3b872d68831358776b95d46832c50b
                       a034c40e838e551813c3cf1235b233baf7992d51
                       336d3dcae8334bbee17692e59821f39f567c367d
                       712dac3aee713a2b186cb2e34e7de1bf9248d9d1
                       765a0b665f2b12c64acda5fac30771ec1682d921
                       f6adfd46ee7be22336aa49ef2b7f0446bce3b039
                       c3c7ba91
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [23:66:fe:6b:0f:64:60:59:90:ab:fe:8f:4b:7f:dc:81:e5:55:f4:ff]
            modulus: bf03277033ea7249f4e6f747d064e2384637d942c8885d1a0f99087bd7e78bc69dc273b3e57e6c5164c438c4c2ecaadf61f35acf5e8d6e2613b491fe2ddeff79132b61fde99ac0ce16759f4e2b88ffae70e0c5ce707c43c526855c0b266aff027e94e829c038551e8231171e706fb727b848218a7564eb90ef4dca0d584612ed8e24a17334bb833b6783f40ab19fea267607b55a310fe980e49b1b728c432961008d3d61aca8f387b339e7f15f077e2e0f7bd37f2f1f538fcfebda751fc5050721d2222d2ccd2b26376a664db4a159292fc2dbd7fcd3f2faaa2fa9fae9ccbb527988fa81850c43c0493c3a5899afa472f51ae03185c01519b70730d606f7561d
    public exponent: 10001

] 
2022-05-17 06:11:10.758  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-17 06:11:10.760 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-17 06:11:10.762 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-17 06:11:10.763 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-17 06:11:10.763  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-17 06:11:10.764  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-17 06:11:10.764  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-17 06:11:10.764 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-17 06:11:10.765 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-17 06:11:10.765 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-17 06:11:10.768 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-17 06:11:10.769 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 06:11:10.769 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 06:11:10.769 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 06:11:10.902  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-17 06:11:10.903  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-17 06:11:10.903 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-17 06:11:10.904 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 06:11:10.906  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-17 06:11:10.907  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-17 06:11:10.907 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 06:11:10.908 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 06:11:10.908 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 06:11:10.909 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 06:11:10.909 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 06:11:10.909 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 06:11:10.910 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 06:11:10.910 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 06:11:10.910 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 06:11:10.911 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-17 06:11:10.914 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 203457712909023764278553164763592215750323130250
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 17 04:59:12 UTC 2022
           Final Date: Sun May 16 04:59:11 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [48:2b:9f:d0:1f:cc:51:0b:9e:02:6c:b2:87:03:71:2f:28:21:dc:7a]
            modulus: a48ca4323048963d6c4b250e02b8798af3df58a1fc61d252e1d37e321645540a4ab81982dd4e154da19f0e3e0d9ca3a9415e45cb6095eadf69aa2ebf181bff88dc7c1a7ab5b4c90d68419384d81fa0f2750301240b98feddbbbc370d60e89360ea528b946399f3bc6fca9b4f4e9bb4fc333d315b8fd933687fcdf515abd3be9af04d0935c4d12a089b58fb3f8af0cd93a206b71704ba222e5869736a6d0ba76130d932cf4739ebd0c2cc05ec816742cb3eb48a08d89813124138b770a54d9c32b6d3f2e1a6a6593a252e563f945d471023fdbc516519dd2d6849a101a05773c9d70f9c8875000ee59e947014f049ab14d27b857ccd39acf0c57b43f9d0d291fe35cc2dac24259baf9e7c22ea3416f526d90317ce5baed9d445e6bb2c05fa0dc283cd3cc7af1f9a12d48c66605bf9b3971c65b59f8e1f92416f5f62127135385969942270aae764bde5d820b6a4be97b06e102e2b9de41b2ef274334951a5b00b4f2f78c3e800da1eff0aab3c01feb9069e45edf12d07d6a1a17801a68e86d21f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7338217088f28589112db4b6aabcfcd24bc80326
                       51a766e03d6a36ff84e23c530bea2d2873b1e972
                       bb72c5c8d57d82f7f180343d00b6d438790c1aae
                       7aba69ae76ff402b62185717c92bfa9387b95707
                       2fa5b7b4616efb624662b010e227aa0ee2094a94
                       e89d78f94c81c1d45e109634ca5e8d4023da369b
                       a2dcb3b9d7df6067e31165667d3e90c96b7924b6
                       625aa80e3b5ba05ef2e97429db6d116dade497ce
                       387342d548314b04cbca339f1945cf8140da93b0
                       6fba1fbc8be5cce92e92c739c82a476fd04e92e6
                       4474dfb1f05cb8ca63893702db9c4a1d63710d13
                       2a102561442307ff5ce8424891ccd2ee999e0445
                       4bb018024bb2082f8804531bff9cc50161c90e93
                       7d571e004b3b872d68831358776b95d46832c50b
                       a034c40e838e551813c3cf1235b233baf7992d51
                       336d3dcae8334bbee17692e59821f39f567c367d
                       712dac3aee713a2b186cb2e34e7de1bf9248d9d1
                       765a0b665f2b12c64acda5fac30771ec1682d921
                       f6adfd46ee7be22336aa49ef2b7f0446bce3b039
                       c3c7ba91
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [37:e8:13:99:69:f9:55:36:f7:b8:b6:74:65:8a:9a:d1:ff:74:43:30]
            modulus: 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
    public exponent: 10001

] 
2022-05-17 06:12:31.200  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-17 06:12:31.202 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-17 06:12:31.204 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-17 06:12:31.205 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-17 06:12:31.205  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-17 06:12:31.206  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-17 06:12:31.206  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-17 06:12:31.207 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-17 06:12:31.207 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-17 06:12:31.207 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-17 06:12:31.212 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-17 06:12:31.213 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 06:12:31.213 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 06:12:31.213 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 06:12:31.354  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-17 06:12:31.355  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-17 06:12:31.356 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-17 06:12:31.356 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 06:12:31.357  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-17 06:12:31.358  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-17 06:12:31.358 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 06:12:31.359 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 06:12:31.359 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 06:12:31.360 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 06:12:31.360 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 06:12:31.361 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 06:12:31.362 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 06:12:31.362 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 06:12:31.362 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 06:12:31.363 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-17 06:12:31.367 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 203457712909023764278553164763592215750323130250
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 17 04:59:12 UTC 2022
           Final Date: Sun May 16 04:59:11 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [48:2b:9f:d0:1f:cc:51:0b:9e:02:6c:b2:87:03:71:2f:28:21:dc:7a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7338217088f28589112db4b6aabcfcd24bc80326
                       51a766e03d6a36ff84e23c530bea2d2873b1e972
                       bb72c5c8d57d82f7f180343d00b6d438790c1aae
                       7aba69ae76ff402b62185717c92bfa9387b95707
                       2fa5b7b4616efb624662b010e227aa0ee2094a94
                       e89d78f94c81c1d45e109634ca5e8d4023da369b
                       a2dcb3b9d7df6067e31165667d3e90c96b7924b6
                       625aa80e3b5ba05ef2e97429db6d116dade497ce
                       387342d548314b04cbca339f1945cf8140da93b0
                       6fba1fbc8be5cce92e92c739c82a476fd04e92e6
                       4474dfb1f05cb8ca63893702db9c4a1d63710d13
                       2a102561442307ff5ce8424891ccd2ee999e0445
                       4bb018024bb2082f8804531bff9cc50161c90e93
                       7d571e004b3b872d68831358776b95d46832c50b
                       a034c40e838e551813c3cf1235b233baf7992d51
                       336d3dcae8334bbee17692e59821f39f567c367d
                       712dac3aee713a2b186cb2e34e7de1bf9248d9d1
                       765a0b665f2b12c64acda5fac30771ec1682d921
                       f6adfd46ee7be22336aa49ef2b7f0446bce3b039
                       c3c7ba91
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [81:a3:e2:e4:39:4b:10:d2:20:ec:fc:d1:92:ef:61:ce:5b:59:a0:51]
            modulus: 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
    public exponent: 10001

] 
2022-05-17 06:12:44.110  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-17 06:12:44.112 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-17 06:12:44.113 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-17 06:12:44.113 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-17 06:12:44.114  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-17 06:12:44.114  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-17 06:12:44.115  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-17 06:12:44.115 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-17 06:12:44.115 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-17 06:12:44.115 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-17 06:12:44.120 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-17 06:12:44.120 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 06:12:44.120 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 06:12:44.120 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 06:12:44.235  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-17 06:12:44.235  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-17 06:12:44.236 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-17 06:12:44.236 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 06:12:44.237  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-17 06:12:44.237  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-17 06:12:44.238 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 06:12:44.238 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 06:12:44.238 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 06:12:44.238 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 06:12:44.238 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 06:12:44.239 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 06:12:44.239 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 06:12:44.239 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 06:12:44.239 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 06:12:44.240 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-17 06:12:44.242 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 203457712909023764278553164763592215750323130250
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 17 04:59:12 UTC 2022
           Final Date: Sun May 16 04:59:11 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [48:2b:9f:d0:1f:cc:51:0b:9e:02:6c:b2:87:03:71:2f:28:21:dc:7a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7338217088f28589112db4b6aabcfcd24bc80326
                       51a766e03d6a36ff84e23c530bea2d2873b1e972
                       bb72c5c8d57d82f7f180343d00b6d438790c1aae
                       7aba69ae76ff402b62185717c92bfa9387b95707
                       2fa5b7b4616efb624662b010e227aa0ee2094a94
                       e89d78f94c81c1d45e109634ca5e8d4023da369b
                       a2dcb3b9d7df6067e31165667d3e90c96b7924b6
                       625aa80e3b5ba05ef2e97429db6d116dade497ce
                       387342d548314b04cbca339f1945cf8140da93b0
                       6fba1fbc8be5cce92e92c739c82a476fd04e92e6
                       4474dfb1f05cb8ca63893702db9c4a1d63710d13
                       2a102561442307ff5ce8424891ccd2ee999e0445
                       4bb018024bb2082f8804531bff9cc50161c90e93
                       7d571e004b3b872d68831358776b95d46832c50b
                       a034c40e838e551813c3cf1235b233baf7992d51
                       336d3dcae8334bbee17692e59821f39f567c367d
                       712dac3aee713a2b186cb2e34e7de1bf9248d9d1
                       765a0b665f2b12c64acda5fac30771ec1682d921
                       f6adfd46ee7be22336aa49ef2b7f0446bce3b039
                       c3c7ba91
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e6:ad:24:60:b0:a4:09:c6:99:75:34:53:be:84:dd:b8:51:2a:2b:f4]
            modulus: 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
    public exponent: 10001

] 
2022-05-17 06:13:19.236  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-17 06:13:19.237 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-17 06:13:19.243 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-17 06:13:19.245 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-17 06:13:19.245  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-17 06:13:19.246  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-17 06:13:19.246  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-17 06:13:19.246 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-17 06:13:19.246 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-17 06:13:19.246 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-17 06:13:19.252 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-17 06:13:19.252 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 06:13:19.253 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 06:13:19.253 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 06:13:19.391  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-17 06:13:19.392  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-17 06:13:19.392 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-17 06:13:19.392 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 06:13:19.393  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-17 06:13:19.394  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-17 06:13:19.394 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 06:13:19.394 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 06:13:19.394 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 06:13:19.395 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 06:13:19.395 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 06:13:19.395 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 06:13:19.396 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 06:13:19.396 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 06:13:19.396 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 06:13:19.396 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-17 06:13:19.399 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 203457712909023764278553164763592215750323130250
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 17 04:59:12 UTC 2022
           Final Date: Sun May 16 04:59:11 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [48:2b:9f:d0:1f:cc:51:0b:9e:02:6c:b2:87:03:71:2f:28:21:dc:7a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7338217088f28589112db4b6aabcfcd24bc80326
                       51a766e03d6a36ff84e23c530bea2d2873b1e972
                       bb72c5c8d57d82f7f180343d00b6d438790c1aae
                       7aba69ae76ff402b62185717c92bfa9387b95707
                       2fa5b7b4616efb624662b010e227aa0ee2094a94
                       e89d78f94c81c1d45e109634ca5e8d4023da369b
                       a2dcb3b9d7df6067e31165667d3e90c96b7924b6
                       625aa80e3b5ba05ef2e97429db6d116dade497ce
                       387342d548314b04cbca339f1945cf8140da93b0
                       6fba1fbc8be5cce92e92c739c82a476fd04e92e6
                       4474dfb1f05cb8ca63893702db9c4a1d63710d13
                       2a102561442307ff5ce8424891ccd2ee999e0445
                       4bb018024bb2082f8804531bff9cc50161c90e93
                       7d571e004b3b872d68831358776b95d46832c50b
                       a034c40e838e551813c3cf1235b233baf7992d51
                       336d3dcae8334bbee17692e59821f39f567c367d
                       712dac3aee713a2b186cb2e34e7de1bf9248d9d1
                       765a0b665f2b12c64acda5fac30771ec1682d921
                       f6adfd46ee7be22336aa49ef2b7f0446bce3b039
                       c3c7ba91
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2c:82:e4:4e:2d:b1:57:ab:ab:26:08:fe:fb:76:c0:50:da:75:b5:2d]
            modulus: a19cb75595ea7af194cbf3df1100f4a6ea0f4869c2b0c6ef038bbdcc7110426791f94f3422a55605ff09a254c1d0b3031aa353b54863d96a9118cb8625fc58b0736607d956ef9ceccf3dc333a4b7961b0f0a2ae8e688e5a2ec09e472b8ce6181b685ebf9dc606fe9fd865e39cea531ea132a9e9c589d086cb3c2ac07bae9fc78cd4ab26667a305b48bd74cf23361ceed484d95e87db2300ee48fbdd0780d1ffe9ac15d1930bd0ce5e819276e75a61da4389765cad3a489e55f4635bf7920dbe628659b39b369eb8ac2919a6a1c5a102ab87b35900be44b3f5e6613f876de788074b10283afb626ded8129d1e6ed4b99c8e575077c5f0d7d9e838f1aa692ae401
    public exponent: 10001

] 
2022-05-17 06:15:31.250  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-17 06:15:31.252 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-17 06:15:31.254 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-17 06:15:31.254 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-17 06:15:31.255  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-17 06:15:31.255  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-17 06:15:31.255  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-17 06:15:31.256 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-17 06:15:31.256 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-17 06:15:31.256 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-17 06:15:31.262 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-17 06:15:31.263 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 06:15:31.263 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 06:15:31.263 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 06:15:31.411  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-17 06:15:31.411  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-17 06:15:31.412 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-17 06:15:31.412 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 06:15:31.413  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-17 06:15:31.413  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-17 06:15:31.413 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 06:15:31.414 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 06:15:31.414 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 06:15:31.414 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 06:15:31.414 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 06:15:31.414 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 06:15:31.415 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 06:15:31.415 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 06:15:31.415 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 06:15:31.415 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-17 06:15:31.418 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 203457712909023764278553164763592215750323130250
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 17 04:59:12 UTC 2022
           Final Date: Sun May 16 04:59:11 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [48:2b:9f:d0:1f:cc:51:0b:9e:02:6c:b2:87:03:71:2f:28:21:dc:7a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7338217088f28589112db4b6aabcfcd24bc80326
                       51a766e03d6a36ff84e23c530bea2d2873b1e972
                       bb72c5c8d57d82f7f180343d00b6d438790c1aae
                       7aba69ae76ff402b62185717c92bfa9387b95707
                       2fa5b7b4616efb624662b010e227aa0ee2094a94
                       e89d78f94c81c1d45e109634ca5e8d4023da369b
                       a2dcb3b9d7df6067e31165667d3e90c96b7924b6
                       625aa80e3b5ba05ef2e97429db6d116dade497ce
                       387342d548314b04cbca339f1945cf8140da93b0
                       6fba1fbc8be5cce92e92c739c82a476fd04e92e6
                       4474dfb1f05cb8ca63893702db9c4a1d63710d13
                       2a102561442307ff5ce8424891ccd2ee999e0445
                       4bb018024bb2082f8804531bff9cc50161c90e93
                       7d571e004b3b872d68831358776b95d46832c50b
                       a034c40e838e551813c3cf1235b233baf7992d51
                       336d3dcae8334bbee17692e59821f39f567c367d
                       712dac3aee713a2b186cb2e34e7de1bf9248d9d1
                       765a0b665f2b12c64acda5fac30771ec1682d921
                       f6adfd46ee7be22336aa49ef2b7f0446bce3b039
                       c3c7ba91
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [26:30:a3:45:29:43:8f:1c:85:8d:13:5b:22:45:d6:2f:61:3d:f9:b1]
            modulus: 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
    public exponent: 10001

] 
2022-05-17 06:20:04.620  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-17 06:20:04.621 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-17 06:20:04.622 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-17 06:20:04.623 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-17 06:20:04.623  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-17 06:20:04.623  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-17 06:20:04.623  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-17 06:20:04.624 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-17 06:20:04.624 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-17 06:20:04.624 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-17 06:20:04.627 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-17 06:20:04.627 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 06:20:04.628 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-17 06:20:04.628 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 06:20:04.804  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-17 06:20:04.804  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-17 06:20:04.805 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-17 06:20:04.805 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-17 06:20:04.806  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-17 06:20:04.806  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-17 06:20:04.806 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 06:20:04.807 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 06:20:04.807 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 06:20:04.807 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 06:20:04.807 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 06:20:04.807 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 06:20:04.808 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-17 06:20:04.808 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-17 06:20:04.808 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-17 06:20:04.808 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-17 06:20:04.810 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 203457712909023764278553164763592215750323130250
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 17 04:59:12 UTC 2022
           Final Date: Sun May 16 04:59:11 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [48:2b:9f:d0:1f:cc:51:0b:9e:02:6c:b2:87:03:71:2f:28:21:dc:7a]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7338217088f28589112db4b6aabcfcd24bc80326
                       51a766e03d6a36ff84e23c530bea2d2873b1e972
                       bb72c5c8d57d82f7f180343d00b6d438790c1aae
                       7aba69ae76ff402b62185717c92bfa9387b95707
                       2fa5b7b4616efb624662b010e227aa0ee2094a94
                       e89d78f94c81c1d45e109634ca5e8d4023da369b
                       a2dcb3b9d7df6067e31165667d3e90c96b7924b6
                       625aa80e3b5ba05ef2e97429db6d116dade497ce
                       387342d548314b04cbca339f1945cf8140da93b0
                       6fba1fbc8be5cce92e92c739c82a476fd04e92e6
                       4474dfb1f05cb8ca63893702db9c4a1d63710d13
                       2a102561442307ff5ce8424891ccd2ee999e0445
                       4bb018024bb2082f8804531bff9cc50161c90e93
                       7d571e004b3b872d68831358776b95d46832c50b
                       a034c40e838e551813c3cf1235b233baf7992d51
                       336d3dcae8334bbee17692e59821f39f567c367d
                       712dac3aee713a2b186cb2e34e7de1bf9248d9d1
                       765a0b665f2b12c64acda5fac30771ec1682d921
                       f6adfd46ee7be22336aa49ef2b7f0446bce3b039
                       c3c7ba91
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [14:b7:fb:8f:47:2f:c1:2e:8f:90:8b:4a:14:39:b9:63:e3:0f:50:ef]
            modulus: d496d7fef89bb8dc77a7ea0cdc8f24ee23052104b862df7fe3709deffa2231c3c1408cc7492ccb556f85d2dde844321cc40281d185c6e3238cf8a995a4fb43c0032bd2418f97997ba38ccfdc8508b1958abd942676f9984bc6d54a7d7c67848ef6607162d37cb40f108213b5f4222c0060cc29550f0d28acaf1107ec7cbdebfd6b385b8caef102bd6e941f4df412317658358a81d1c2a40e6517b2339d6d67691ae0db23dcdd62ed5b905ae7ec27b3273b51c7ffaf0cee667ea16bbbf4e9727eac37dfaaa961234101f97d93efb5da8ff9494b2bc07657ff4c09f8b0840055840b8ca4d5fa98ff708cfbc6952beb0bdfab3110b1839d9ff8b08c8e5aa4299911
    public exponent: 10001

]