Results

By type

          2022-05-26 05:05:15,076 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-05-26 05:05:15,972 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-05-26 05:05:16.731  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
May 26, 2022 5:05:18 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
May 26, 2022 5:05:18 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
May 26, 2022 5:05:18 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
May 26, 2022 5:05:18 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-05-26 05:05:19.239 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-05-26 05:05:19.556  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-05-26 05:05:19.733  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-05-26 05:05:20.446 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-05-26 05:05:20.449 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-05-26 05:05:20.450 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-05-26 05:05:20.454 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-05-26 05:05:20.495 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-05-26 05:05:20.498 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-05-26 05:05:20.618 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-05-26 05:05:21.424 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
May 26, 2022 5:05:22 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-05-26 05:05:22.405  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.112 seconds (JVM running for 9.887)
May 26, 2022 5:05:52 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-05-26 05:06:04.376  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-26 05:06:04.385 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-26 05:06:04.420 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-26 05:06:04.424 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-26 05:06:04.440  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-26 05:06:04.442  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-26 05:06:04.443  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-26 05:06:04.444 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-26 05:06:04.445 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 05:06:04.449 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-26 05:06:04.454 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-26 05:06:04.457 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-26 05:06:04.493 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-26 05:06:04.496 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 05:06:04.497 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 05:06:04.500 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 05:06:05.002  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-26 05:06:05.004  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-26 05:06:05.005 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-26 05:06:05.007 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 05:06:05.016  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-26 05:06:05.017  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-26 05:06:05.018 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 05:06:05.019 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 05:06:05.019 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 05:06:05.030 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 05:06:05.031 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 05:06:05.031 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 05:06:05.037 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 05:06:05.037 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 05:06:05.038 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 05:06:05.040 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-26 05:06:05.067 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 80968420564083896030799722300751179441404654153
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 26 05:03:05 UTC 2022
           Final Date: Tue May 25 05:03:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e0:af:a2:9c:81:e7:32:57:b7:55:2b:17:1d:48:50:9b:95:51:4c:e0]
            modulus: a705f07a358249a9ac5a5b12c8228205854fe4fb57e3da50987dfd29dbe7b44f914f51238cda2a01a2c596147a9286f1b813b1d535d6e0b9e0d2c7aa871389593e1abede372232a61b4196602aa37e43620b8fb268f7e089afb8027ee3b5ad61363913b7bb4029dbcec0e46aa8fe8403d2569ce02011dd3cae26e4efe249d7d1be08812232c0b9119fb84ddf225599d50b158e3761177331510f68b251f41a5688d859910521c40d5e464b21001ec65e596613020a77fed294ad242c0c97dee8068f17142d5d213b24625f89bb47564cb5853c383f77d018d7e563c19611b345b7f07db8b100196f4110ade34e5c754d583dbb278b236c170acba0579f600e46528ada652d0892d920ac7b8195e1a320fb3f823c3fe397037dad10da60aab0fb5e84bf67c45aeeb80367e9ffdeeff256f1eb7c0a4b8ca9dabf29fac3c17089e88d7e1c04e8394423d74f2ce2c9e095c1af1a384df281f4da7191d7c453c2c698eaa99fa7b28528f5a1ec027bc10e5a33967eac9339a06d9c7ba304f505bd3b0d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 89c04f04c2d3b943f08cd9f2ea5e2992cf6f98a8
                       12f9444acd3c269242ce613ce3760aa2182db6ea
                       083b8b984b8d17176435c65ffc1e3120cac8763b
                       9ee4ac3becc476776029ba4d6c2689d6f495ff5b
                       4f6c2f562e06cf264f4a6ecac43a89df808559b2
                       74795c218e67c6849dbb53b31ab25917ac24abda
                       0e21798451aad8bb07c5edc88f4a6e19bf1c3532
                       06bda55600623bb0bfcdf66961951748fd02d18b
                       a91c744208225f67fad45287a0be8641f0836286
                       a9c41c5d5fa270e41f17c49c5fe1c3ba70c9df1b
                       a3f58a4c29579a32b55aa79fc55d932fa78e3a71
                       f475fea1c5c850bbe62a1f8d58b8abe5134d1e9e
                       5dc247f2c9a08cd49be5c731f3cf3db537082fb9
                       ae7299230f2f3813247c8a856efabe69a13d44ce
                       09b3c62019f67d8cf61b78401c40538a595ba39d
                       7f8e889584d045aab68035f59cf3e694661294e2
                       b320879de0ce720dc908a67c73c4c62bea9bd517
                       a94df41b5a69795dc7d6c15f9e908146eabe64a7
                       1d55c474791a08162a3329865db38935505464f3
                       1616d5db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [27:d5:25:df:3d:fc:ba:0b:21:55:c7:3d:57:4f:bd:47:b0:86:9b:f1]
            modulus: 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
    public exponent: 10001

] 
2022-05-26 06:17:29.326  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-26 06:17:29.330 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-26 06:17:29.333 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-26 06:17:29.334 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-26 06:17:29.335  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-26 06:17:29.336  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-26 06:17:29.337  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-26 06:17:29.337 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-26 06:17:29.338 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-26 06:17:29.338 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-26 06:17:29.345 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-26 06:17:29.347 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 06:17:29.347 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 06:17:29.348 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 06:17:29.542  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-26 06:17:29.543  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-26 06:17:29.543 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-26 06:17:29.544 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 06:17:29.547  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-26 06:17:29.548  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-26 06:17:29.548 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 06:17:29.549 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 06:17:29.550 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 06:17:29.551 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 06:17:29.552 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 06:17:29.552 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 06:17:29.553 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 06:17:29.554 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 06:17:29.554 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 06:17:29.556 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-26 06:17:29.561 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 80968420564083896030799722300751179441404654153
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 26 05:03:05 UTC 2022
           Final Date: Tue May 25 05:03:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e0:af:a2:9c:81:e7:32:57:b7:55:2b:17:1d:48:50:9b:95:51:4c:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 89c04f04c2d3b943f08cd9f2ea5e2992cf6f98a8
                       12f9444acd3c269242ce613ce3760aa2182db6ea
                       083b8b984b8d17176435c65ffc1e3120cac8763b
                       9ee4ac3becc476776029ba4d6c2689d6f495ff5b
                       4f6c2f562e06cf264f4a6ecac43a89df808559b2
                       74795c218e67c6849dbb53b31ab25917ac24abda
                       0e21798451aad8bb07c5edc88f4a6e19bf1c3532
                       06bda55600623bb0bfcdf66961951748fd02d18b
                       a91c744208225f67fad45287a0be8641f0836286
                       a9c41c5d5fa270e41f17c49c5fe1c3ba70c9df1b
                       a3f58a4c29579a32b55aa79fc55d932fa78e3a71
                       f475fea1c5c850bbe62a1f8d58b8abe5134d1e9e
                       5dc247f2c9a08cd49be5c731f3cf3db537082fb9
                       ae7299230f2f3813247c8a856efabe69a13d44ce
                       09b3c62019f67d8cf61b78401c40538a595ba39d
                       7f8e889584d045aab68035f59cf3e694661294e2
                       b320879de0ce720dc908a67c73c4c62bea9bd517
                       a94df41b5a69795dc7d6c15f9e908146eabe64a7
                       1d55c474791a08162a3329865db38935505464f3
                       1616d5db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [be:4d:3d:49:16:a3:b4:77:0b:da:42:77:7e:6a:2a:75:85:05:a1:dc]
            modulus: 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
    public exponent: 10001

] 
2022-05-26 06:19:17.739  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-26 06:19:17.741 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-26 06:19:17.743 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-26 06:19:17.744 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-26 06:19:17.745  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-26 06:19:17.745  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-26 06:19:17.746  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-26 06:19:17.746 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-26 06:19:17.747 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-26 06:19:17.748 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-26 06:19:17.756 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-26 06:19:17.757 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 06:19:17.757 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 06:19:17.757 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 06:19:17.891  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-26 06:19:17.892  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-26 06:19:17.892 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-26 06:19:17.892 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 06:19:17.895  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-26 06:19:17.895  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-26 06:19:17.896 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 06:19:17.896 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 06:19:17.897 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 06:19:17.898 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 06:19:17.898 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 06:19:17.899 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 06:19:17.900 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 06:19:17.900 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 06:19:17.900 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 06:19:17.902 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-26 06:19:17.906 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 80968420564083896030799722300751179441404654153
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 26 05:03:05 UTC 2022
           Final Date: Tue May 25 05:03:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e0:af:a2:9c:81:e7:32:57:b7:55:2b:17:1d:48:50:9b:95:51:4c:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 89c04f04c2d3b943f08cd9f2ea5e2992cf6f98a8
                       12f9444acd3c269242ce613ce3760aa2182db6ea
                       083b8b984b8d17176435c65ffc1e3120cac8763b
                       9ee4ac3becc476776029ba4d6c2689d6f495ff5b
                       4f6c2f562e06cf264f4a6ecac43a89df808559b2
                       74795c218e67c6849dbb53b31ab25917ac24abda
                       0e21798451aad8bb07c5edc88f4a6e19bf1c3532
                       06bda55600623bb0bfcdf66961951748fd02d18b
                       a91c744208225f67fad45287a0be8641f0836286
                       a9c41c5d5fa270e41f17c49c5fe1c3ba70c9df1b
                       a3f58a4c29579a32b55aa79fc55d932fa78e3a71
                       f475fea1c5c850bbe62a1f8d58b8abe5134d1e9e
                       5dc247f2c9a08cd49be5c731f3cf3db537082fb9
                       ae7299230f2f3813247c8a856efabe69a13d44ce
                       09b3c62019f67d8cf61b78401c40538a595ba39d
                       7f8e889584d045aab68035f59cf3e694661294e2
                       b320879de0ce720dc908a67c73c4c62bea9bd517
                       a94df41b5a69795dc7d6c15f9e908146eabe64a7
                       1d55c474791a08162a3329865db38935505464f3
                       1616d5db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0b:17:0d:22:80:ff:b6:0b:34:d5:89:00:8e:a6:a3:95:fe:3a:8e:86]
            modulus: 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
    public exponent: 10001

] 
2022-05-26 06:20:27.707  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-26 06:20:27.708 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-26 06:20:27.709 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-26 06:20:27.710 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-26 06:20:27.711  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-26 06:20:27.712  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-26 06:20:27.712  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-26 06:20:27.712 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-26 06:20:27.713 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-26 06:20:27.713 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-26 06:20:27.718 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-26 06:20:27.719 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 06:20:27.719 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 06:20:27.720 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 06:20:27.836  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-26 06:20:27.837  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-26 06:20:27.837 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-26 06:20:27.837 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 06:20:27.839  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-26 06:20:27.839  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-26 06:20:27.840 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 06:20:27.840 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 06:20:27.841 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 06:20:27.841 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 06:20:27.842 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 06:20:27.842 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 06:20:27.843 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 06:20:27.843 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 06:20:27.843 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 06:20:27.844 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-26 06:20:27.849 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 80968420564083896030799722300751179441404654153
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 26 05:03:05 UTC 2022
           Final Date: Tue May 25 05:03:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e0:af:a2:9c:81:e7:32:57:b7:55:2b:17:1d:48:50:9b:95:51:4c:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 89c04f04c2d3b943f08cd9f2ea5e2992cf6f98a8
                       12f9444acd3c269242ce613ce3760aa2182db6ea
                       083b8b984b8d17176435c65ffc1e3120cac8763b
                       9ee4ac3becc476776029ba4d6c2689d6f495ff5b
                       4f6c2f562e06cf264f4a6ecac43a89df808559b2
                       74795c218e67c6849dbb53b31ab25917ac24abda
                       0e21798451aad8bb07c5edc88f4a6e19bf1c3532
                       06bda55600623bb0bfcdf66961951748fd02d18b
                       a91c744208225f67fad45287a0be8641f0836286
                       a9c41c5d5fa270e41f17c49c5fe1c3ba70c9df1b
                       a3f58a4c29579a32b55aa79fc55d932fa78e3a71
                       f475fea1c5c850bbe62a1f8d58b8abe5134d1e9e
                       5dc247f2c9a08cd49be5c731f3cf3db537082fb9
                       ae7299230f2f3813247c8a856efabe69a13d44ce
                       09b3c62019f67d8cf61b78401c40538a595ba39d
                       7f8e889584d045aab68035f59cf3e694661294e2
                       b320879de0ce720dc908a67c73c4c62bea9bd517
                       a94df41b5a69795dc7d6c15f9e908146eabe64a7
                       1d55c474791a08162a3329865db38935505464f3
                       1616d5db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0b:b5:d7:87:c1:4c:ea:77:e7:40:ee:1c:8c:c6:06:84:b2:43:e2:c9]
            modulus: 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
    public exponent: 10001

] 
2022-05-26 06:22:32.187  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-26 06:22:32.189 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-26 06:22:32.191 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-26 06:22:32.192 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-26 06:22:32.193  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-26 06:22:32.194  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-26 06:22:32.195  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-26 06:22:32.196 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-26 06:22:32.199 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-26 06:22:32.199 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-26 06:22:32.205 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-26 06:22:32.206 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 06:22:32.207 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 06:22:32.207 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 06:22:32.392  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-26 06:22:32.393  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-26 06:22:32.393 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-26 06:22:32.394 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 06:22:32.396  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-26 06:22:32.396  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-26 06:22:32.397 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 06:22:32.397 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 06:22:32.397 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 06:22:32.398 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 06:22:32.398 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 06:22:32.399 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 06:22:32.399 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 06:22:32.400 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 06:22:32.400 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 06:22:32.401 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-26 06:22:32.404 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 80968420564083896030799722300751179441404654153
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 26 05:03:05 UTC 2022
           Final Date: Tue May 25 05:03:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e0:af:a2:9c:81:e7:32:57:b7:55:2b:17:1d:48:50:9b:95:51:4c:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 89c04f04c2d3b943f08cd9f2ea5e2992cf6f98a8
                       12f9444acd3c269242ce613ce3760aa2182db6ea
                       083b8b984b8d17176435c65ffc1e3120cac8763b
                       9ee4ac3becc476776029ba4d6c2689d6f495ff5b
                       4f6c2f562e06cf264f4a6ecac43a89df808559b2
                       74795c218e67c6849dbb53b31ab25917ac24abda
                       0e21798451aad8bb07c5edc88f4a6e19bf1c3532
                       06bda55600623bb0bfcdf66961951748fd02d18b
                       a91c744208225f67fad45287a0be8641f0836286
                       a9c41c5d5fa270e41f17c49c5fe1c3ba70c9df1b
                       a3f58a4c29579a32b55aa79fc55d932fa78e3a71
                       f475fea1c5c850bbe62a1f8d58b8abe5134d1e9e
                       5dc247f2c9a08cd49be5c731f3cf3db537082fb9
                       ae7299230f2f3813247c8a856efabe69a13d44ce
                       09b3c62019f67d8cf61b78401c40538a595ba39d
                       7f8e889584d045aab68035f59cf3e694661294e2
                       b320879de0ce720dc908a67c73c4c62bea9bd517
                       a94df41b5a69795dc7d6c15f9e908146eabe64a7
                       1d55c474791a08162a3329865db38935505464f3
                       1616d5db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6e:d2:01:88:a0:d1:54:44:77:d0:63:d9:c4:79:f4:03:98:cb:df:a4]
            modulus: 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
    public exponent: 10001

] 
2022-05-26 06:31:30.851  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-26 06:31:30.856 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-26 06:31:30.867 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-26 06:31:30.868 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-26 06:31:30.869  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-26 06:31:30.870  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-26 06:31:30.870  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-26 06:31:30.871 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-26 06:31:30.871 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-26 06:31:30.872 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-26 06:31:30.879 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-26 06:31:30.881 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 06:31:30.881 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 06:31:30.882 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 06:31:31.058  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-26 06:31:31.059  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-26 06:31:31.060 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-26 06:31:31.060 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 06:31:31.061  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-26 06:31:31.062  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-26 06:31:31.062 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 06:31:31.063 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 06:31:31.063 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 06:31:31.064 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 06:31:31.064 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 06:31:31.065 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 06:31:31.066 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 06:31:31.066 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 06:31:31.066 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 06:31:31.067 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-26 06:31:31.071 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 80968420564083896030799722300751179441404654153
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 26 05:03:05 UTC 2022
           Final Date: Tue May 25 05:03:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e0:af:a2:9c:81:e7:32:57:b7:55:2b:17:1d:48:50:9b:95:51:4c:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 89c04f04c2d3b943f08cd9f2ea5e2992cf6f98a8
                       12f9444acd3c269242ce613ce3760aa2182db6ea
                       083b8b984b8d17176435c65ffc1e3120cac8763b
                       9ee4ac3becc476776029ba4d6c2689d6f495ff5b
                       4f6c2f562e06cf264f4a6ecac43a89df808559b2
                       74795c218e67c6849dbb53b31ab25917ac24abda
                       0e21798451aad8bb07c5edc88f4a6e19bf1c3532
                       06bda55600623bb0bfcdf66961951748fd02d18b
                       a91c744208225f67fad45287a0be8641f0836286
                       a9c41c5d5fa270e41f17c49c5fe1c3ba70c9df1b
                       a3f58a4c29579a32b55aa79fc55d932fa78e3a71
                       f475fea1c5c850bbe62a1f8d58b8abe5134d1e9e
                       5dc247f2c9a08cd49be5c731f3cf3db537082fb9
                       ae7299230f2f3813247c8a856efabe69a13d44ce
                       09b3c62019f67d8cf61b78401c40538a595ba39d
                       7f8e889584d045aab68035f59cf3e694661294e2
                       b320879de0ce720dc908a67c73c4c62bea9bd517
                       a94df41b5a69795dc7d6c15f9e908146eabe64a7
                       1d55c474791a08162a3329865db38935505464f3
                       1616d5db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [92:5f:a0:53:64:f1:11:df:b0:e4:fc:88:81:27:4b:aa:65:0d:c2:a2]
            modulus: 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
    public exponent: 10001

] 
2022-05-26 06:36:30.194  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-26 06:36:30.198 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-26 06:36:30.201 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-26 06:36:30.202 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-26 06:36:30.203  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-26 06:36:30.203  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-26 06:36:30.204  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-26 06:36:30.204 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-26 06:36:30.205 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-26 06:36:30.205 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-26 06:36:30.211 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-26 06:36:30.213 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 06:36:30.213 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 06:36:30.213 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 06:36:30.364  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-26 06:36:30.365  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-26 06:36:30.365 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-26 06:36:30.365 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 06:36:30.367  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-26 06:36:30.368  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-26 06:36:30.369 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 06:36:30.369 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 06:36:30.369 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 06:36:30.370 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 06:36:30.371 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 06:36:30.371 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 06:36:30.372 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 06:36:30.373 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 06:36:30.373 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 06:36:30.374 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-26 06:36:30.379 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 80968420564083896030799722300751179441404654153
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 26 05:03:05 UTC 2022
           Final Date: Tue May 25 05:03:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e0:af:a2:9c:81:e7:32:57:b7:55:2b:17:1d:48:50:9b:95:51:4c:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 89c04f04c2d3b943f08cd9f2ea5e2992cf6f98a8
                       12f9444acd3c269242ce613ce3760aa2182db6ea
                       083b8b984b8d17176435c65ffc1e3120cac8763b
                       9ee4ac3becc476776029ba4d6c2689d6f495ff5b
                       4f6c2f562e06cf264f4a6ecac43a89df808559b2
                       74795c218e67c6849dbb53b31ab25917ac24abda
                       0e21798451aad8bb07c5edc88f4a6e19bf1c3532
                       06bda55600623bb0bfcdf66961951748fd02d18b
                       a91c744208225f67fad45287a0be8641f0836286
                       a9c41c5d5fa270e41f17c49c5fe1c3ba70c9df1b
                       a3f58a4c29579a32b55aa79fc55d932fa78e3a71
                       f475fea1c5c850bbe62a1f8d58b8abe5134d1e9e
                       5dc247f2c9a08cd49be5c731f3cf3db537082fb9
                       ae7299230f2f3813247c8a856efabe69a13d44ce
                       09b3c62019f67d8cf61b78401c40538a595ba39d
                       7f8e889584d045aab68035f59cf3e694661294e2
                       b320879de0ce720dc908a67c73c4c62bea9bd517
                       a94df41b5a69795dc7d6c15f9e908146eabe64a7
                       1d55c474791a08162a3329865db38935505464f3
                       1616d5db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5f:f2:93:60:15:0f:82:a6:c8:69:23:8f:b4:20:50:e6:d6:99:24:41]
            modulus: 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
    public exponent: 10001

] 
2022-05-26 06:36:47.165  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-26 06:36:47.166 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-26 06:36:47.169 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-26 06:36:47.170 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-26 06:36:47.171  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-26 06:36:47.172  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-26 06:36:47.172  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-26 06:36:47.173 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-26 06:36:47.174 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-26 06:36:47.175 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-26 06:36:47.181 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-26 06:36:47.181 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 06:36:47.182 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 06:36:47.182 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 06:36:47.314  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-26 06:36:47.315  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-26 06:36:47.315 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-26 06:36:47.316 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 06:36:47.318  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-26 06:36:47.318  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-26 06:36:47.318 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 06:36:47.319 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 06:36:47.319 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 06:36:47.320 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 06:36:47.320 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 06:36:47.321 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 06:36:47.321 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 06:36:47.322 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 06:36:47.322 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 06:36:47.323 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-26 06:36:47.327 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 80968420564083896030799722300751179441404654153
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 26 05:03:05 UTC 2022
           Final Date: Tue May 25 05:03:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e0:af:a2:9c:81:e7:32:57:b7:55:2b:17:1d:48:50:9b:95:51:4c:e0]
            modulus: a705f07a358249a9ac5a5b12c8228205854fe4fb57e3da50987dfd29dbe7b44f914f51238cda2a01a2c596147a9286f1b813b1d535d6e0b9e0d2c7aa871389593e1abede372232a61b4196602aa37e43620b8fb268f7e089afb8027ee3b5ad61363913b7bb4029dbcec0e46aa8fe8403d2569ce02011dd3cae26e4efe249d7d1be08812232c0b9119fb84ddf225599d50b158e3761177331510f68b251f41a5688d859910521c40d5e464b21001ec65e596613020a77fed294ad242c0c97dee8068f17142d5d213b24625f89bb47564cb5853c383f77d018d7e563c19611b345b7f07db8b100196f4110ade34e5c754d583dbb278b236c170acba0579f600e46528ada652d0892d920ac7b8195e1a320fb3f823c3fe397037dad10da60aab0fb5e84bf67c45aeeb80367e9ffdeeff256f1eb7c0a4b8ca9dabf29fac3c17089e88d7e1c04e8394423d74f2ce2c9e095c1af1a384df281f4da7191d7c453c2c698eaa99fa7b28528f5a1ec027bc10e5a33967eac9339a06d9c7ba304f505bd3b0d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 89c04f04c2d3b943f08cd9f2ea5e2992cf6f98a8
                       12f9444acd3c269242ce613ce3760aa2182db6ea
                       083b8b984b8d17176435c65ffc1e3120cac8763b
                       9ee4ac3becc476776029ba4d6c2689d6f495ff5b
                       4f6c2f562e06cf264f4a6ecac43a89df808559b2
                       74795c218e67c6849dbb53b31ab25917ac24abda
                       0e21798451aad8bb07c5edc88f4a6e19bf1c3532
                       06bda55600623bb0bfcdf66961951748fd02d18b
                       a91c744208225f67fad45287a0be8641f0836286
                       a9c41c5d5fa270e41f17c49c5fe1c3ba70c9df1b
                       a3f58a4c29579a32b55aa79fc55d932fa78e3a71
                       f475fea1c5c850bbe62a1f8d58b8abe5134d1e9e
                       5dc247f2c9a08cd49be5c731f3cf3db537082fb9
                       ae7299230f2f3813247c8a856efabe69a13d44ce
                       09b3c62019f67d8cf61b78401c40538a595ba39d
                       7f8e889584d045aab68035f59cf3e694661294e2
                       b320879de0ce720dc908a67c73c4c62bea9bd517
                       a94df41b5a69795dc7d6c15f9e908146eabe64a7
                       1d55c474791a08162a3329865db38935505464f3
                       1616d5db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b5:35:29:01:14:a6:b5:ea:09:e2:73:13:2c:bd:ba:f2:f2:aa:28:cb]
            modulus: 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
    public exponent: 10001

] 
2022-05-26 06:52:00.469  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-26 06:52:00.472 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-26 06:52:00.474 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-26 06:52:00.475 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-26 06:52:00.476  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-26 06:52:00.476  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-26 06:52:00.477  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-26 06:52:00.477 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-26 06:52:00.477 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-26 06:52:00.478 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-26 06:52:00.483 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-26 06:52:00.484 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 06:52:00.484 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 06:52:00.484 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 06:52:00.627  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-26 06:52:00.627  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-26 06:52:00.628 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-26 06:52:00.628 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 06:52:00.629  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-26 06:52:00.630  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-26 06:52:00.631 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 06:52:00.633 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 06:52:00.633 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 06:52:00.634 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 06:52:00.634 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 06:52:00.635 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 06:52:00.636 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 06:52:00.636 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 06:52:00.636 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 06:52:00.637 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-26 06:52:00.641 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 80968420564083896030799722300751179441404654153
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 26 05:03:05 UTC 2022
           Final Date: Tue May 25 05:03:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e0:af:a2:9c:81:e7:32:57:b7:55:2b:17:1d:48:50:9b:95:51:4c:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 89c04f04c2d3b943f08cd9f2ea5e2992cf6f98a8
                       12f9444acd3c269242ce613ce3760aa2182db6ea
                       083b8b984b8d17176435c65ffc1e3120cac8763b
                       9ee4ac3becc476776029ba4d6c2689d6f495ff5b
                       4f6c2f562e06cf264f4a6ecac43a89df808559b2
                       74795c218e67c6849dbb53b31ab25917ac24abda
                       0e21798451aad8bb07c5edc88f4a6e19bf1c3532
                       06bda55600623bb0bfcdf66961951748fd02d18b
                       a91c744208225f67fad45287a0be8641f0836286
                       a9c41c5d5fa270e41f17c49c5fe1c3ba70c9df1b
                       a3f58a4c29579a32b55aa79fc55d932fa78e3a71
                       f475fea1c5c850bbe62a1f8d58b8abe5134d1e9e
                       5dc247f2c9a08cd49be5c731f3cf3db537082fb9
                       ae7299230f2f3813247c8a856efabe69a13d44ce
                       09b3c62019f67d8cf61b78401c40538a595ba39d
                       7f8e889584d045aab68035f59cf3e694661294e2
                       b320879de0ce720dc908a67c73c4c62bea9bd517
                       a94df41b5a69795dc7d6c15f9e908146eabe64a7
                       1d55c474791a08162a3329865db38935505464f3
                       1616d5db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4b:40:b3:de:c7:b0:bc:61:27:9a:cb:47:f3:f0:07:1b:2f:df:c0:e0]
            modulus: 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
    public exponent: 10001

] 
2022-05-26 06:52:05.126  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-26 06:52:05.127 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-26 06:52:05.128 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-26 06:52:05.129 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-26 06:52:05.129  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-26 06:52:05.131  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-26 06:52:05.132  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-26 06:52:05.132 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-26 06:52:05.132 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-26 06:52:05.133 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-26 06:52:05.139 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-26 06:52:05.140 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 06:52:05.140 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 06:52:05.140 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 06:52:05.229  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-26 06:52:05.229  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-26 06:52:05.229 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-26 06:52:05.230 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 06:52:05.231  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-26 06:52:05.231  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-26 06:52:05.232 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 06:52:05.232 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 06:52:05.232 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 06:52:05.233 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 06:52:05.233 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 06:52:05.233 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 06:52:05.233 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 06:52:05.234 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 06:52:05.234 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 06:52:05.235 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-26 06:52:05.237 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 80968420564083896030799722300751179441404654153
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 26 05:03:05 UTC 2022
           Final Date: Tue May 25 05:03:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e0:af:a2:9c:81:e7:32:57:b7:55:2b:17:1d:48:50:9b:95:51:4c:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 89c04f04c2d3b943f08cd9f2ea5e2992cf6f98a8
                       12f9444acd3c269242ce613ce3760aa2182db6ea
                       083b8b984b8d17176435c65ffc1e3120cac8763b
                       9ee4ac3becc476776029ba4d6c2689d6f495ff5b
                       4f6c2f562e06cf264f4a6ecac43a89df808559b2
                       74795c218e67c6849dbb53b31ab25917ac24abda
                       0e21798451aad8bb07c5edc88f4a6e19bf1c3532
                       06bda55600623bb0bfcdf66961951748fd02d18b
                       a91c744208225f67fad45287a0be8641f0836286
                       a9c41c5d5fa270e41f17c49c5fe1c3ba70c9df1b
                       a3f58a4c29579a32b55aa79fc55d932fa78e3a71
                       f475fea1c5c850bbe62a1f8d58b8abe5134d1e9e
                       5dc247f2c9a08cd49be5c731f3cf3db537082fb9
                       ae7299230f2f3813247c8a856efabe69a13d44ce
                       09b3c62019f67d8cf61b78401c40538a595ba39d
                       7f8e889584d045aab68035f59cf3e694661294e2
                       b320879de0ce720dc908a67c73c4c62bea9bd517
                       a94df41b5a69795dc7d6c15f9e908146eabe64a7
                       1d55c474791a08162a3329865db38935505464f3
                       1616d5db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a7:e1:99:1e:e1:00:62:52:c8:f9:1e:16:3e:e0:ea:6e:ed:9a:15:ef]
            modulus: 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
    public exponent: 10001

]