Results

By type

          2022-05-28 05:25:10,284 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-05-28 05:25:11,999 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-05-28 05:25:12.838  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
May 28, 2022 5:25:15 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
May 28, 2022 5:25:15 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
May 28, 2022 5:25:15 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
May 28, 2022 5:25:15 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-05-28 05:25:15.958 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-05-28 05:25:16.333  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-05-28 05:25:16.507  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-05-28 05:25:17.438 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-05-28 05:25:17.441 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-05-28 05:25:17.442 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-05-28 05:25:17.446 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-05-28 05:25:17.485 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-05-28 05:25:17.489 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-05-28 05:25:17.611 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-05-28 05:25:18.289 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
May 28, 2022 5:25:18 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-05-28 05:25:19.310  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 9.897 seconds (JVM running for 11.859)
May 28, 2022 5:25:41 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-05-28 06:19:49.175  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-28 06:19:49.198 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-28 06:19:49.275 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-28 06:19:49.282 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-28 06:19:49.306  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-28 06:19:49.308  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-28 06:19:49.310  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-28 06:19:49.311 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-28 06:19:49.312 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-28 06:19:49.316 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-28 06:19:49.326 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-28 06:19:49.329 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-28 06:19:49.368 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-28 06:19:49.374 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-28 06:19:49.375 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-28 06:19:49.379 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-28 06:19:50.131  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-28 06:19:50.135  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-28 06:19:50.136 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-28 06:19:50.138 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-28 06:19:50.154  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-28 06:19:50.156  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-28 06:19:50.157 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 06:19:50.157 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 06:19:50.158 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 06:19:50.175 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 06:19:50.176 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 06:19:50.177 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 06:19:50.186 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 06:19:50.188 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 06:19:50.189 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 06:19:50.194 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-28 06:19:50.237 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 441626023880505712639705518155080349123569219864
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 28 05:03:13 UTC 2022
           Final Date: Thu May 27 05:03:12 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f7:33:f6:b4:2d:b1:77:2c:f9:93:2d:57:17:a4:e2:25:6f:e1:7a:69]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0a56454434dffca966f3f22c9a84534e46740c40
                       5352d1f4437690501af603b83eaea7844cef114a
                       cb49f55df3f666af87ba2c396ef9e82dbe35f6c4
                       1dd4ae0f63ed9a5cfd8fb617b085837cc5dbfab1
                       f2c7822da48b2fb1a4d52760ea2df96008962186
                       637043396b49424d111bc7487aae4b4f194f20f9
                       2d78018f56e950c2a21305395ad740d7c6dbbf43
                       071ec17f9dadd54fe3a5b0c231dba6c4d2e181b5
                       173d576946944072295ffd2fb186c78808577754
                       9a2805d814c18e677bf04387b06309f93c777574
                       28febf8e3b52c14c765d0072a9f850898b68a7cd
                       3abe4a71e68fc3fdbe80d726b45dc573ba22eb57
                       c7ee85b1b0de7be20d6076fbf20f0f37d0bc69a9
                       1c360b7f2bab8611480ca2bcf142a00318ed7c27
                       8cff33117200fb7bbc2e422e826d6c0aff1d60b9
                       d51326b5a594516198b03f245adcd7867fec9384
                       8ce31879776ffc68fefbafa257181606ea3bdac7
                       2715c45beee07a7f07d94e350d57393c1bce5ee5
                       880ed204209b5e27e9cf0f8ac2a41ab52d67c179
                       dc339144
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f2:98:8f:62:ff:13:c8:2a:f0:b6:8c:6c:10:89:ce:12:19:f1:15:e2]
            modulus: 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
    public exponent: 10001

] 
2022-05-28 06:21:36.850  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-28 06:21:36.851 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-28 06:21:36.856 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-28 06:21:36.858 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-28 06:21:36.861  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-28 06:21:36.862  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-28 06:21:36.863  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-28 06:21:36.863 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-28 06:21:36.864 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-28 06:21:36.865 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-28 06:21:36.878 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-28 06:21:36.882 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-28 06:21:36.883 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-28 06:21:36.884 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-28 06:21:37.019  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-28 06:21:37.020  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-28 06:21:37.020 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-28 06:21:37.020 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-28 06:21:37.023  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-28 06:21:37.024  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-28 06:21:37.024 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 06:21:37.025 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 06:21:37.025 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 06:21:37.026 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 06:21:37.027 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 06:21:37.027 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 06:21:37.028 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 06:21:37.028 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 06:21:37.028 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 06:21:37.029 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-28 06:21:37.034 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 441626023880505712639705518155080349123569219864
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 28 05:03:13 UTC 2022
           Final Date: Thu May 27 05:03:12 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f7:33:f6:b4:2d:b1:77:2c:f9:93:2d:57:17:a4:e2:25:6f:e1:7a:69]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0a56454434dffca966f3f22c9a84534e46740c40
                       5352d1f4437690501af603b83eaea7844cef114a
                       cb49f55df3f666af87ba2c396ef9e82dbe35f6c4
                       1dd4ae0f63ed9a5cfd8fb617b085837cc5dbfab1
                       f2c7822da48b2fb1a4d52760ea2df96008962186
                       637043396b49424d111bc7487aae4b4f194f20f9
                       2d78018f56e950c2a21305395ad740d7c6dbbf43
                       071ec17f9dadd54fe3a5b0c231dba6c4d2e181b5
                       173d576946944072295ffd2fb186c78808577754
                       9a2805d814c18e677bf04387b06309f93c777574
                       28febf8e3b52c14c765d0072a9f850898b68a7cd
                       3abe4a71e68fc3fdbe80d726b45dc573ba22eb57
                       c7ee85b1b0de7be20d6076fbf20f0f37d0bc69a9
                       1c360b7f2bab8611480ca2bcf142a00318ed7c27
                       8cff33117200fb7bbc2e422e826d6c0aff1d60b9
                       d51326b5a594516198b03f245adcd7867fec9384
                       8ce31879776ffc68fefbafa257181606ea3bdac7
                       2715c45beee07a7f07d94e350d57393c1bce5ee5
                       880ed204209b5e27e9cf0f8ac2a41ab52d67c179
                       dc339144
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b0:86:93:3c:6a:e1:d3:de:b6:71:1c:ef:0e:b7:a0:7f:da:d7:d5:f3]
            modulus: c822b1693a5d3f4ff91ae7c8a747d0eca763088ef076b5f011480f07e094dd4f5c082a71c868a08e211446d0a70e3dd4cae3585f554b0abf51437997fb850388eb93bf091080334e2c5c02261d9bc8451d030b8fddc487313048e6d5469d1bf48fd44c9e91f8d4c314128c27dfffb9ccf392aefe7e6f80e430905b9b329aafcac5f5b13cc4eaa9dbdffedfd660edeec1914346f06bfc752ce86fd54b44191da7c9a13a7c98aa380c0000e3f61ca9e7057b65540962e4d40784260ca462ec4747d615452fc978422fd43764ad648f3b7c70f218b8de08cc3bb58db55d4f250734e1a6aefae5904a95b5bad586274728902c48a9b4f6776ce343580cfadf75c37f
    public exponent: 10001

] 
2022-05-28 06:22:50.234  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-28 06:22:50.238 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-28 06:22:50.240 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-28 06:22:50.241 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-28 06:22:50.242  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-28 06:22:50.242  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-28 06:22:50.243  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-28 06:22:50.243 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-28 06:22:50.244 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-28 06:22:50.245 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-28 06:22:50.257 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-28 06:22:50.257 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-28 06:22:50.258 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-28 06:22:50.258 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-28 06:22:50.407  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-28 06:22:50.408  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-28 06:22:50.408 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-28 06:22:50.408 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-28 06:22:50.410  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-28 06:22:50.411  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-28 06:22:50.411 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 06:22:50.412 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 06:22:50.412 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 06:22:50.413 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 06:22:50.414 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 06:22:50.414 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 06:22:50.425 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 06:22:50.425 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 06:22:50.426 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 06:22:50.427 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-28 06:22:50.431 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 441626023880505712639705518155080349123569219864
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 28 05:03:13 UTC 2022
           Final Date: Thu May 27 05:03:12 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f7:33:f6:b4:2d:b1:77:2c:f9:93:2d:57:17:a4:e2:25:6f:e1:7a:69]
            modulus: bf846e8dadff600572fdb647eda0dd0f387d5afb63dfe028e5305f36bd525e2a33f84e147e56363deffd279fa4b841314c70a4afa5f91faf8198a76397528614b8b5b6d548ceb6a0d9ef376c43eb36e2db821496ae2ee6b3f754334739d8231cfc20f3c2c9f9dbd9e08bc68d493665c071cdf660097dbbf68be313edeea57e16c0d9d85d441b34899e60f8c847ed7ec096234389b02cd19858f6381f94519d07519a90e1a82c7a8078254ad87bfb2c919a21273757a771a9926ee487396018b6eb29d2a01b3a0f90330c80bf1d4092a53ee1f3e77c29b613d8019aae08b82f682715fb44b604fa828ca71bbeb9d83c5ed06b14883bb3a08d68563b8471fc40d48f6ef52041c2accb0818916187dbbefbe3f70450b4808e031052b8271b328d2bb8f84e98d44d8773ccedeb8219d5ef0e3f996c83eb5cfefd06c5a93887afc1a0598fe402c34967a12604693a895db1f94ca64927ae9f1dae72f3464e57fabbceb369c601e24217530c64c45741bda5e87d966b82e94df1bce8de89b9a7abf24b
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0a56454434dffca966f3f22c9a84534e46740c40
                       5352d1f4437690501af603b83eaea7844cef114a
                       cb49f55df3f666af87ba2c396ef9e82dbe35f6c4
                       1dd4ae0f63ed9a5cfd8fb617b085837cc5dbfab1
                       f2c7822da48b2fb1a4d52760ea2df96008962186
                       637043396b49424d111bc7487aae4b4f194f20f9
                       2d78018f56e950c2a21305395ad740d7c6dbbf43
                       071ec17f9dadd54fe3a5b0c231dba6c4d2e181b5
                       173d576946944072295ffd2fb186c78808577754
                       9a2805d814c18e677bf04387b06309f93c777574
                       28febf8e3b52c14c765d0072a9f850898b68a7cd
                       3abe4a71e68fc3fdbe80d726b45dc573ba22eb57
                       c7ee85b1b0de7be20d6076fbf20f0f37d0bc69a9
                       1c360b7f2bab8611480ca2bcf142a00318ed7c27
                       8cff33117200fb7bbc2e422e826d6c0aff1d60b9
                       d51326b5a594516198b03f245adcd7867fec9384
                       8ce31879776ffc68fefbafa257181606ea3bdac7
                       2715c45beee07a7f07d94e350d57393c1bce5ee5
                       880ed204209b5e27e9cf0f8ac2a41ab52d67c179
                       dc339144
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2d:9c:d5:a5:13:e8:3a:94:57:28:49:48:09:f2:68:8c:4b:98:0d:5f]
            modulus: 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
    public exponent: 10001

] 
2022-05-28 06:24:38.655  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-28 06:24:38.659 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-28 06:24:38.661 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-28 06:24:38.662 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-28 06:24:38.663  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-28 06:24:38.663  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-28 06:24:38.664  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-28 06:24:38.665 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-28 06:24:38.665 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-28 06:24:38.666 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-28 06:24:38.672 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-28 06:24:38.673 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-28 06:24:38.673 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-28 06:24:38.674 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-28 06:24:38.806  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-28 06:24:38.807  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-28 06:24:38.808 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-28 06:24:38.809 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-28 06:24:38.811  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-28 06:24:38.811  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-28 06:24:38.812 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 06:24:38.813 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 06:24:38.813 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 06:24:38.814 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 06:24:38.815 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 06:24:38.815 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 06:24:38.816 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 06:24:38.817 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 06:24:38.817 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 06:24:38.818 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-28 06:24:38.824 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 441626023880505712639705518155080349123569219864
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 28 05:03:13 UTC 2022
           Final Date: Thu May 27 05:03:12 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f7:33:f6:b4:2d:b1:77:2c:f9:93:2d:57:17:a4:e2:25:6f:e1:7a:69]
            modulus: bf846e8dadff600572fdb647eda0dd0f387d5afb63dfe028e5305f36bd525e2a33f84e147e56363deffd279fa4b841314c70a4afa5f91faf8198a76397528614b8b5b6d548ceb6a0d9ef376c43eb36e2db821496ae2ee6b3f754334739d8231cfc20f3c2c9f9dbd9e08bc68d493665c071cdf660097dbbf68be313edeea57e16c0d9d85d441b34899e60f8c847ed7ec096234389b02cd19858f6381f94519d07519a90e1a82c7a8078254ad87bfb2c919a21273757a771a9926ee487396018b6eb29d2a01b3a0f90330c80bf1d4092a53ee1f3e77c29b613d8019aae08b82f682715fb44b604fa828ca71bbeb9d83c5ed06b14883bb3a08d68563b8471fc40d48f6ef52041c2accb0818916187dbbefbe3f70450b4808e031052b8271b328d2bb8f84e98d44d8773ccedeb8219d5ef0e3f996c83eb5cfefd06c5a93887afc1a0598fe402c34967a12604693a895db1f94ca64927ae9f1dae72f3464e57fabbceb369c601e24217530c64c45741bda5e87d966b82e94df1bce8de89b9a7abf24b
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0a56454434dffca966f3f22c9a84534e46740c40
                       5352d1f4437690501af603b83eaea7844cef114a
                       cb49f55df3f666af87ba2c396ef9e82dbe35f6c4
                       1dd4ae0f63ed9a5cfd8fb617b085837cc5dbfab1
                       f2c7822da48b2fb1a4d52760ea2df96008962186
                       637043396b49424d111bc7487aae4b4f194f20f9
                       2d78018f56e950c2a21305395ad740d7c6dbbf43
                       071ec17f9dadd54fe3a5b0c231dba6c4d2e181b5
                       173d576946944072295ffd2fb186c78808577754
                       9a2805d814c18e677bf04387b06309f93c777574
                       28febf8e3b52c14c765d0072a9f850898b68a7cd
                       3abe4a71e68fc3fdbe80d726b45dc573ba22eb57
                       c7ee85b1b0de7be20d6076fbf20f0f37d0bc69a9
                       1c360b7f2bab8611480ca2bcf142a00318ed7c27
                       8cff33117200fb7bbc2e422e826d6c0aff1d60b9
                       d51326b5a594516198b03f245adcd7867fec9384
                       8ce31879776ffc68fefbafa257181606ea3bdac7
                       2715c45beee07a7f07d94e350d57393c1bce5ee5
                       880ed204209b5e27e9cf0f8ac2a41ab52d67c179
                       dc339144
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1f:5c:32:b9:06:94:23:a6:bb:3c:11:23:0c:6a:63:3e:ca:2c:ce:a5]
            modulus: e641aef37730048d0e4ca9acd7f7429f61de80bde7c7d546aedd595dc6c038139dfccddba10612f79e155b7537d353c888250bf37d1564be0c25dc23817dd4d48c5f7a3eb0a92cd5bf17139988c2b7b4a674f9f2ea3e6e006fbc82a89ded5871a29840f35577f78afc55d4b6e003471616436ebab77d47ac1533b847b70ccaf0d9f824f6f77ec0bb442b18bce717020c656b1224c11babc1f987c3242870d9fbcf1163958714666324aeaeae0f7da43137e30c9e8ced27c63b5871527eabd5b399f468512afacaf23476773ec96e6957afdc661254efefbfb836f45e3409c3207f3cda6dd9edb2212bff5b46239ee17c7dca74ec2b1c2636d33420740826a1d9
    public exponent: 10001

] 
2022-05-28 06:36:14.542  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-28 06:36:14.547 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-28 06:36:14.549 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-28 06:36:14.550 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-28 06:36:14.551  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-28 06:36:14.553  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-28 06:36:14.553  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-28 06:36:14.554 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-28 06:36:14.554 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-28 06:36:14.555 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-28 06:36:14.560 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-28 06:36:14.561 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-28 06:36:14.562 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-28 06:36:14.562 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-28 06:36:14.717  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-28 06:36:14.718  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-28 06:36:14.719 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-28 06:36:14.719 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-28 06:36:14.721  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-28 06:36:14.721  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-28 06:36:14.722 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 06:36:14.722 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 06:36:14.722 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 06:36:14.723 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 06:36:14.724 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 06:36:14.724 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 06:36:14.725 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 06:36:14.725 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 06:36:14.726 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 06:36:14.726 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-28 06:36:14.731 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 441626023880505712639705518155080349123569219864
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 28 05:03:13 UTC 2022
           Final Date: Thu May 27 05:03:12 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f7:33:f6:b4:2d:b1:77:2c:f9:93:2d:57:17:a4:e2:25:6f:e1:7a:69]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0a56454434dffca966f3f22c9a84534e46740c40
                       5352d1f4437690501af603b83eaea7844cef114a
                       cb49f55df3f666af87ba2c396ef9e82dbe35f6c4
                       1dd4ae0f63ed9a5cfd8fb617b085837cc5dbfab1
                       f2c7822da48b2fb1a4d52760ea2df96008962186
                       637043396b49424d111bc7487aae4b4f194f20f9
                       2d78018f56e950c2a21305395ad740d7c6dbbf43
                       071ec17f9dadd54fe3a5b0c231dba6c4d2e181b5
                       173d576946944072295ffd2fb186c78808577754
                       9a2805d814c18e677bf04387b06309f93c777574
                       28febf8e3b52c14c765d0072a9f850898b68a7cd
                       3abe4a71e68fc3fdbe80d726b45dc573ba22eb57
                       c7ee85b1b0de7be20d6076fbf20f0f37d0bc69a9
                       1c360b7f2bab8611480ca2bcf142a00318ed7c27
                       8cff33117200fb7bbc2e422e826d6c0aff1d60b9
                       d51326b5a594516198b03f245adcd7867fec9384
                       8ce31879776ffc68fefbafa257181606ea3bdac7
                       2715c45beee07a7f07d94e350d57393c1bce5ee5
                       880ed204209b5e27e9cf0f8ac2a41ab52d67c179
                       dc339144
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [57:36:4b:81:77:46:73:17:2c:a3:6c:6d:79:c6:1e:c9:0e:8b:f6:23]
            modulus: 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
    public exponent: 10001

] 
2022-05-28 06:41:42.222  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-28 06:41:42.224 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-28 06:41:42.227 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-28 06:41:42.227 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-28 06:41:42.228  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-28 06:41:42.229  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-28 06:41:42.229  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-28 06:41:42.229 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-28 06:41:42.230 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-28 06:41:42.230 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-28 06:41:42.245 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-28 06:41:42.246 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-28 06:41:42.247 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-28 06:41:42.247 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-28 06:41:42.385  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-28 06:41:42.386  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-28 06:41:42.386 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-28 06:41:42.386 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-28 06:41:42.388  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-28 06:41:42.388  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-28 06:41:42.389 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 06:41:42.389 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 06:41:42.389 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 06:41:42.390 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 06:41:42.390 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 06:41:42.390 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 06:41:42.391 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 06:41:42.391 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 06:41:42.391 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 06:41:42.392 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-28 06:41:42.396 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 441626023880505712639705518155080349123569219864
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 28 05:03:13 UTC 2022
           Final Date: Thu May 27 05:03:12 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f7:33:f6:b4:2d:b1:77:2c:f9:93:2d:57:17:a4:e2:25:6f:e1:7a:69]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0a56454434dffca966f3f22c9a84534e46740c40
                       5352d1f4437690501af603b83eaea7844cef114a
                       cb49f55df3f666af87ba2c396ef9e82dbe35f6c4
                       1dd4ae0f63ed9a5cfd8fb617b085837cc5dbfab1
                       f2c7822da48b2fb1a4d52760ea2df96008962186
                       637043396b49424d111bc7487aae4b4f194f20f9
                       2d78018f56e950c2a21305395ad740d7c6dbbf43
                       071ec17f9dadd54fe3a5b0c231dba6c4d2e181b5
                       173d576946944072295ffd2fb186c78808577754
                       9a2805d814c18e677bf04387b06309f93c777574
                       28febf8e3b52c14c765d0072a9f850898b68a7cd
                       3abe4a71e68fc3fdbe80d726b45dc573ba22eb57
                       c7ee85b1b0de7be20d6076fbf20f0f37d0bc69a9
                       1c360b7f2bab8611480ca2bcf142a00318ed7c27
                       8cff33117200fb7bbc2e422e826d6c0aff1d60b9
                       d51326b5a594516198b03f245adcd7867fec9384
                       8ce31879776ffc68fefbafa257181606ea3bdac7
                       2715c45beee07a7f07d94e350d57393c1bce5ee5
                       880ed204209b5e27e9cf0f8ac2a41ab52d67c179
                       dc339144
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [97:78:df:40:a2:b3:90:2c:0b:4e:d2:f7:eb:0e:85:19:59:7b:bc:4e]
            modulus: af4e88c6ce205674734121395b7b0f80b6b0ee39083bbef6d9b7c306329d4022e7e7a47e5493f256c2dea516d3055178497e4d89a8a77e7a4cfcb2651ef08722e4e23274c3f710ad8ed72387346a51ef987c73b5d029ebb47ed5933338be07554f1286d921aac6094fdb5bc6774b29142da4156a5f2bdd953eb743826c59cc0c6853d0cc19796b6599b243dfdd53336246b7fa52ead455dc47c1df77d39b0793b4808394c56df63328d8583266baa1c88f4e8dbe095d86f30cde683b667afcc824672eed5b44ffa9af1ed404fa5defef54ee983469c5e02a3370f15c6b159939ca60032023b54c5ae63b5cefbc115dc1bd81790d6fdd694843fa9c9800d566b5
    public exponent: 10001

] 
2022-05-28 06:41:55.180  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-28 06:41:55.181 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-28 06:41:55.183 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-28 06:41:55.184 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-28 06:41:55.186  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-28 06:41:55.187  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-28 06:41:55.187  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-28 06:41:55.188 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-28 06:41:55.190 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-28 06:41:55.190 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-28 06:41:55.200 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-28 06:41:55.201 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-28 06:41:55.202 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-28 06:41:55.203 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-28 06:41:55.307  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-28 06:41:55.307  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-28 06:41:55.308 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-28 06:41:55.308 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-28 06:41:55.310  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-28 06:41:55.311  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-28 06:41:55.311 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 06:41:55.312 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 06:41:55.312 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 06:41:55.313 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 06:41:55.313 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 06:41:55.314 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 06:41:55.315 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 06:41:55.316 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 06:41:55.316 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 06:41:55.317 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-28 06:41:55.322 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 441626023880505712639705518155080349123569219864
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 28 05:03:13 UTC 2022
           Final Date: Thu May 27 05:03:12 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f7:33:f6:b4:2d:b1:77:2c:f9:93:2d:57:17:a4:e2:25:6f:e1:7a:69]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0a56454434dffca966f3f22c9a84534e46740c40
                       5352d1f4437690501af603b83eaea7844cef114a
                       cb49f55df3f666af87ba2c396ef9e82dbe35f6c4
                       1dd4ae0f63ed9a5cfd8fb617b085837cc5dbfab1
                       f2c7822da48b2fb1a4d52760ea2df96008962186
                       637043396b49424d111bc7487aae4b4f194f20f9
                       2d78018f56e950c2a21305395ad740d7c6dbbf43
                       071ec17f9dadd54fe3a5b0c231dba6c4d2e181b5
                       173d576946944072295ffd2fb186c78808577754
                       9a2805d814c18e677bf04387b06309f93c777574
                       28febf8e3b52c14c765d0072a9f850898b68a7cd
                       3abe4a71e68fc3fdbe80d726b45dc573ba22eb57
                       c7ee85b1b0de7be20d6076fbf20f0f37d0bc69a9
                       1c360b7f2bab8611480ca2bcf142a00318ed7c27
                       8cff33117200fb7bbc2e422e826d6c0aff1d60b9
                       d51326b5a594516198b03f245adcd7867fec9384
                       8ce31879776ffc68fefbafa257181606ea3bdac7
                       2715c45beee07a7f07d94e350d57393c1bce5ee5
                       880ed204209b5e27e9cf0f8ac2a41ab52d67c179
                       dc339144
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [43:bb:09:05:f8:6c:db:4d:f5:5c:d3:0e:7a:12:0c:b4:72:4f:c4:52]
            modulus: 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
    public exponent: 10001

]