Results

By type

          2022-07-04 05:35:11,309 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-07-04 05:35:12,206 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-07-04 05:35:12.958  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jul 04, 2022 5:35:14 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jul 04, 2022 5:35:14 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jul 04, 2022 5:35:14 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jul 04, 2022 5:35:15 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-07-04 05:35:15.541 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-07-04 05:35:15.825  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-07-04 05:35:15.983  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-07-04 05:35:16.685 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-07-04 05:35:16.688 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-07-04 05:35:16.689 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-07-04 05:35:16.693 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-07-04 05:35:16.735 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-07-04 05:35:16.739 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-07-04 05:35:16.859 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-07-04 05:35:17.468 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jul 04, 2022 5:35:18 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-07-04 05:35:18.353  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.835 seconds (JVM running for 9.546)
Jul 04, 2022 5:35:41 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-07-04 05:35:54.633  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-04 05:35:54.643 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-04 05:35:54.689 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-07-04 05:35:54.693 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-04 05:35:54.712  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-07-04 05:35:54.715  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-04 05:35:54.716  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-04 05:35:54.717 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-04 05:35:54.717 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 05:35:54.721 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-04 05:35:54.727 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-04 05:35:54.730 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-04 05:35:54.770 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-04 05:35:54.776 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 05:35:54.776 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 05:35:54.780 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 05:35:55.468  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-04 05:35:55.470  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-04 05:35:55.471 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-04 05:35:55.472 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 05:35:55.481  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-04 05:35:55.482  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-04 05:35:55.482 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 05:35:55.483 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 05:35:55.483 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 05:35:55.494 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 05:35:55.494 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 05:35:55.495 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 05:35:55.500 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 05:35:55.501 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 05:35:55.501 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 05:35:55.502 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-04 05:35:55.528 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 299365311521838739736167145188498986785521144295
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jul 04 05:32:57 UTC 2022
           Final Date: Sat Jul 03 05:32:56 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [13:da:13:43:3e:64:3e:21:40:64:4a:da:51:23:36:95:68:84:c0:6b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2f243380cda0117e86a1662d9c91321609d880a8
                       efe893ac23d31a907ca79c45c05852a18d75168b
                       0a334939bc8759487b5f8a284a2090f327e8c6b8
                       265f4f55fb0822f64b20810bfb3dd79babf9e8b2
                       1b1fa6da2f67565432aa808ba62219899aa4eae3
                       a513996747412c75ac002f279ac8cfbe810e7bf1
                       26a2f569bb6fdaad9e5f4aacaf6bd5526af6da7f
                       4274d5d45aa2a592d32813cde0ca51f6f5bafe6c
                       52a06c3b260a4bec2b843bc6b16842d89b22c3a0
                       5b2b32a70e34d007549f49e3026da6fd3934f8c3
                       7861b67718bbc9e5e8970483f4f29ee34b5aa85f
                       3a8fbbe06e1de79e446e304c481dedc8ebb30d16
                       a0072aef6657f07c612fff1468562e8280e0ebbc
                       b2aa594d5646523d7e6c33771caf74d82c128881
                       a5d522f14a6126771a48875b6c4893d400608b23
                       72b2cee2676402147295c70531bf2bb94308b5c0
                       37ddc11121ed515e9733a6f7eda2549aeaf91c02
                       1742827657df775f18d9485f75273b601185de5f
                       c1cdbaf7e4112da748bf4216012d0ff1d4d3661f
                       4d8b8590
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [26:fe:60:66:b9:34:67:5e:cf:a0:b8:60:e8:09:67:c4:a6:0e:3e:1d]
            modulus: c711a694c2808734dc87e4370bcca3598f1a27759ca0f0c09b3c83ec280fb44eacae8198afecf8f20bef29bf2ad7b9780e86131a4578d3bfd74c74389e9ee9ce6ef30955404fdde03054eb5f206fb6b7724cb19156f2bb23d07a38b1bcb04e46c3516d0051d667a42a13613f50d18576967b31919b8bbc9491e1d3325801cc961afc90d01be4e27924df8189cde1150f24293f8d9913b8fbda7bbe1c4790b37794ab7737636425a38e0492a1776e10450140b39771bbdaa0109d1d19be5b722c19e06e12d6b84e92569a03b269f2b7a5d3400aabbc0f6213d7e8b1386b150abc3f48390bdd45554bcd23e1a34090565c497cd86f575378a0b8052b61a6c969d9
    public exponent: 10001

] 
2022-07-04 07:01:04.867  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-04 07:01:04.871 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-04 07:01:04.879 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-04 07:01:04.880 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-04 07:01:04.881  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-04 07:01:04.882  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-04 07:01:04.882  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-04 07:01:04.883 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-04 07:01:04.883 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-04 07:01:04.884 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-04 07:01:04.891 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-04 07:01:04.892 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 07:01:04.893 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 07:01:04.893 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 07:01:05.102  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-04 07:01:05.103  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-04 07:01:05.103 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-04 07:01:05.104 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 07:01:05.108  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-04 07:01:05.108  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-04 07:01:05.109 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:01:05.109 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:01:05.110 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:01:05.111 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:01:05.114 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:01:05.114 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:01:05.116 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:01:05.116 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:01:05.117 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:01:05.119 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-04 07:01:05.126 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 299365311521838739736167145188498986785521144295
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jul 04 05:32:57 UTC 2022
           Final Date: Sat Jul 03 05:32:56 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [13:da:13:43:3e:64:3e:21:40:64:4a:da:51:23:36:95:68:84:c0:6b]
            modulus: d40e95fdb70ff97604e85a5b54e220ff9a9fed0a00a3e1d81fa6a7268f9c8ae094c2ad1081fcb65280164687b9bd201e8c73096f9dd14e7dea6451c291e0c87e7ed7ae55e109b66bc7eacabd8df858e441785f5d2d9db3883ddab00033f06e9175723944a2896ddced3569d7908ec7052550edf8c573cf2e8f00a14ec86d2b75b66eb78e6f7f16ba3cc384689a17d0df3642034df68074526e44c61359d4f16b42d131a03e96496ff64d83c6a21c317905f12b29247e5cab251bb2fc46847b31da57c60089074e3890b072db5b13a981a3b5ea9816e58cf8cb32b0c91beb038f89f002bb08c855dac9e771ed71fbdeba0708142b025ef263764679bf070e393f33959304c6c43b4cf0e88500d23189a79fc0f8ebd6c94bd7a86e09d0a37ad125c2f9454abcfd666ab896dfd4e6e6b9bd74564f98b8c8197886ff170c9b8afa8f7f2d0c401ea5cee402ef31731589b8119e8e247d5e0d985be4fa5b2eb3d380423469fe68c7bb47fa92106e7c1ee2dc897e5b2f97bcbdaeca8bc21bf027c96b95
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2f243380cda0117e86a1662d9c91321609d880a8
                       efe893ac23d31a907ca79c45c05852a18d75168b
                       0a334939bc8759487b5f8a284a2090f327e8c6b8
                       265f4f55fb0822f64b20810bfb3dd79babf9e8b2
                       1b1fa6da2f67565432aa808ba62219899aa4eae3
                       a513996747412c75ac002f279ac8cfbe810e7bf1
                       26a2f569bb6fdaad9e5f4aacaf6bd5526af6da7f
                       4274d5d45aa2a592d32813cde0ca51f6f5bafe6c
                       52a06c3b260a4bec2b843bc6b16842d89b22c3a0
                       5b2b32a70e34d007549f49e3026da6fd3934f8c3
                       7861b67718bbc9e5e8970483f4f29ee34b5aa85f
                       3a8fbbe06e1de79e446e304c481dedc8ebb30d16
                       a0072aef6657f07c612fff1468562e8280e0ebbc
                       b2aa594d5646523d7e6c33771caf74d82c128881
                       a5d522f14a6126771a48875b6c4893d400608b23
                       72b2cee2676402147295c70531bf2bb94308b5c0
                       37ddc11121ed515e9733a6f7eda2549aeaf91c02
                       1742827657df775f18d9485f75273b601185de5f
                       c1cdbaf7e4112da748bf4216012d0ff1d4d3661f
                       4d8b8590
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4f:7e:0f:28:77:ad:4a:e3:e0:c0:0a:b4:54:6a:fc:04:d5:f1:26:a3]
            modulus: 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
    public exponent: 10001

] 
2022-07-04 07:03:07.671  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-04 07:03:07.672 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-04 07:03:07.674 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-07-04 07:03:07.675 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-04 07:03:07.676  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-07-04 07:03:07.676  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-04 07:03:07.677  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-04 07:03:07.677 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-04 07:03:07.677 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-04 07:03:07.680 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-04 07:03:07.688 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-04 07:03:07.688 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 07:03:07.689 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 07:03:07.689 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 07:03:07.904  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-04 07:03:07.905  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-04 07:03:07.907 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-04 07:03:07.907 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 07:03:07.912  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-04 07:03:07.913  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-04 07:03:07.914 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:03:07.915 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:03:07.917 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:03:07.919 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:03:07.920 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:03:07.920 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:03:07.922 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:03:07.922 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:03:07.924 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:03:07.925 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-04 07:03:07.930 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 299365311521838739736167145188498986785521144295
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jul 04 05:32:57 UTC 2022
           Final Date: Sat Jul 03 05:32:56 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [13:da:13:43:3e:64:3e:21:40:64:4a:da:51:23:36:95:68:84:c0:6b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2f243380cda0117e86a1662d9c91321609d880a8
                       efe893ac23d31a907ca79c45c05852a18d75168b
                       0a334939bc8759487b5f8a284a2090f327e8c6b8
                       265f4f55fb0822f64b20810bfb3dd79babf9e8b2
                       1b1fa6da2f67565432aa808ba62219899aa4eae3
                       a513996747412c75ac002f279ac8cfbe810e7bf1
                       26a2f569bb6fdaad9e5f4aacaf6bd5526af6da7f
                       4274d5d45aa2a592d32813cde0ca51f6f5bafe6c
                       52a06c3b260a4bec2b843bc6b16842d89b22c3a0
                       5b2b32a70e34d007549f49e3026da6fd3934f8c3
                       7861b67718bbc9e5e8970483f4f29ee34b5aa85f
                       3a8fbbe06e1de79e446e304c481dedc8ebb30d16
                       a0072aef6657f07c612fff1468562e8280e0ebbc
                       b2aa594d5646523d7e6c33771caf74d82c128881
                       a5d522f14a6126771a48875b6c4893d400608b23
                       72b2cee2676402147295c70531bf2bb94308b5c0
                       37ddc11121ed515e9733a6f7eda2549aeaf91c02
                       1742827657df775f18d9485f75273b601185de5f
                       c1cdbaf7e4112da748bf4216012d0ff1d4d3661f
                       4d8b8590
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c9:46:4e:5d:77:e7:e2:4f:58:b4:e9:91:2c:13:a4:ef:87:81:7f:d4]
            modulus: d0d1d78765baeed205262106ddd4a7b6caca53c335eac0fe943054ecef181029d5a87b632093c92befd80e4fbf8908cc69aac983c726b4c336c03d1e7ce6f905f3af094b61ae4ac5b535d548e64fdc35f10779e84290736a3e348e55e78b8b4dd687c93af162ac65d1b5892e4efbf912de9027cb1efd80d669085962ef643af3cc7ac28a05baea2eb79df8d763367239e191310d6948f23496cc458769baa2725f3a64901c2404515ac0ae86655aa51b92f9350fe732b00f284dfa684073b3f6d1ac9d579a46cce7fc97b0a932cc5401ce8dc9151d82dd8dd3b1ee06d7e277c134be7465de1f39126304b6b585d50574cdb6a67ef2b2bca2501e0b4232f3900b
    public exponent: 10001

] 
2022-07-04 07:04:17.555  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-04 07:04:17.557 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-04 07:04:17.558 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-07-04 07:04:17.559 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-04 07:04:17.560  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-07-04 07:04:17.561  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-04 07:04:17.561  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-04 07:04:17.561 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-04 07:04:17.562 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-04 07:04:17.562 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-04 07:04:17.572 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-04 07:04:17.573 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 07:04:17.573 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 07:04:17.573 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 07:04:17.697  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-04 07:04:17.698  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-04 07:04:17.698 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-04 07:04:17.699 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 07:04:17.701  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-04 07:04:17.701  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-04 07:04:17.702 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:04:17.703 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:04:17.703 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:04:17.704 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:04:17.704 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:04:17.704 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:04:17.705 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:04:17.705 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:04:17.706 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:04:17.707 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-04 07:04:17.715 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 299365311521838739736167145188498986785521144295
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jul 04 05:32:57 UTC 2022
           Final Date: Sat Jul 03 05:32:56 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [13:da:13:43:3e:64:3e:21:40:64:4a:da:51:23:36:95:68:84:c0:6b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2f243380cda0117e86a1662d9c91321609d880a8
                       efe893ac23d31a907ca79c45c05852a18d75168b
                       0a334939bc8759487b5f8a284a2090f327e8c6b8
                       265f4f55fb0822f64b20810bfb3dd79babf9e8b2
                       1b1fa6da2f67565432aa808ba62219899aa4eae3
                       a513996747412c75ac002f279ac8cfbe810e7bf1
                       26a2f569bb6fdaad9e5f4aacaf6bd5526af6da7f
                       4274d5d45aa2a592d32813cde0ca51f6f5bafe6c
                       52a06c3b260a4bec2b843bc6b16842d89b22c3a0
                       5b2b32a70e34d007549f49e3026da6fd3934f8c3
                       7861b67718bbc9e5e8970483f4f29ee34b5aa85f
                       3a8fbbe06e1de79e446e304c481dedc8ebb30d16
                       a0072aef6657f07c612fff1468562e8280e0ebbc
                       b2aa594d5646523d7e6c33771caf74d82c128881
                       a5d522f14a6126771a48875b6c4893d400608b23
                       72b2cee2676402147295c70531bf2bb94308b5c0
                       37ddc11121ed515e9733a6f7eda2549aeaf91c02
                       1742827657df775f18d9485f75273b601185de5f
                       c1cdbaf7e4112da748bf4216012d0ff1d4d3661f
                       4d8b8590
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f3:a9:f9:94:49:e6:86:61:41:3a:98:1b:4b:92:13:a0:a3:57:4b:7c]
            modulus: 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
    public exponent: 10001

] 
2022-07-04 07:06:09.773  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-04 07:06:09.774 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-04 07:06:09.775 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-04 07:06:09.776 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-04 07:06:09.777  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-04 07:06:09.778  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-04 07:06:09.778  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-04 07:06:09.779 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-04 07:06:09.779 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-04 07:06:09.780 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-04 07:06:09.785 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-04 07:06:09.785 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 07:06:09.786 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 07:06:09.786 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 07:06:10.118  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-04 07:06:10.119  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-04 07:06:10.119 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-04 07:06:10.120 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 07:06:10.122  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-04 07:06:10.123  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-04 07:06:10.124 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:06:10.124 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:06:10.125 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:06:10.126 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:06:10.127 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:06:10.127 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:06:10.129 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:06:10.129 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:06:10.130 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:06:10.131 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-04 07:06:10.137 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 299365311521838739736167145188498986785521144295
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jul 04 05:32:57 UTC 2022
           Final Date: Sat Jul 03 05:32:56 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [13:da:13:43:3e:64:3e:21:40:64:4a:da:51:23:36:95:68:84:c0:6b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2f243380cda0117e86a1662d9c91321609d880a8
                       efe893ac23d31a907ca79c45c05852a18d75168b
                       0a334939bc8759487b5f8a284a2090f327e8c6b8
                       265f4f55fb0822f64b20810bfb3dd79babf9e8b2
                       1b1fa6da2f67565432aa808ba62219899aa4eae3
                       a513996747412c75ac002f279ac8cfbe810e7bf1
                       26a2f569bb6fdaad9e5f4aacaf6bd5526af6da7f
                       4274d5d45aa2a592d32813cde0ca51f6f5bafe6c
                       52a06c3b260a4bec2b843bc6b16842d89b22c3a0
                       5b2b32a70e34d007549f49e3026da6fd3934f8c3
                       7861b67718bbc9e5e8970483f4f29ee34b5aa85f
                       3a8fbbe06e1de79e446e304c481dedc8ebb30d16
                       a0072aef6657f07c612fff1468562e8280e0ebbc
                       b2aa594d5646523d7e6c33771caf74d82c128881
                       a5d522f14a6126771a48875b6c4893d400608b23
                       72b2cee2676402147295c70531bf2bb94308b5c0
                       37ddc11121ed515e9733a6f7eda2549aeaf91c02
                       1742827657df775f18d9485f75273b601185de5f
                       c1cdbaf7e4112da748bf4216012d0ff1d4d3661f
                       4d8b8590
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [61:a0:f6:29:89:3e:9e:bd:bb:f1:5a:6f:f3:e2:24:d2:1e:bf:c9:63]
            modulus: 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
    public exponent: 10001

] 
2022-07-04 07:09:48.962  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-04 07:09:48.964 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-04 07:09:48.965 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-04 07:09:48.971 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-04 07:09:48.971  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-04 07:09:48.972  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-04 07:09:48.972  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-04 07:09:48.972 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-04 07:09:48.973 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-04 07:09:48.973 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-04 07:09:48.979 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-04 07:09:48.980 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 07:09:48.981 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 07:09:48.981 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 07:09:49.106  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-04 07:09:49.108  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-04 07:09:49.109 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-04 07:09:49.110 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 07:09:49.112  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-04 07:09:49.115  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-04 07:09:49.115 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:09:49.116 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:09:49.116 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:09:49.117 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:09:49.118 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:09:49.118 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:09:49.120 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:09:49.120 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:09:49.121 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:09:49.122 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-04 07:09:49.127 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 299365311521838739736167145188498986785521144295
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jul 04 05:32:57 UTC 2022
           Final Date: Sat Jul 03 05:32:56 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [13:da:13:43:3e:64:3e:21:40:64:4a:da:51:23:36:95:68:84:c0:6b]
            modulus: d40e95fdb70ff97604e85a5b54e220ff9a9fed0a00a3e1d81fa6a7268f9c8ae094c2ad1081fcb65280164687b9bd201e8c73096f9dd14e7dea6451c291e0c87e7ed7ae55e109b66bc7eacabd8df858e441785f5d2d9db3883ddab00033f06e9175723944a2896ddced3569d7908ec7052550edf8c573cf2e8f00a14ec86d2b75b66eb78e6f7f16ba3cc384689a17d0df3642034df68074526e44c61359d4f16b42d131a03e96496ff64d83c6a21c317905f12b29247e5cab251bb2fc46847b31da57c60089074e3890b072db5b13a981a3b5ea9816e58cf8cb32b0c91beb038f89f002bb08c855dac9e771ed71fbdeba0708142b025ef263764679bf070e393f33959304c6c43b4cf0e88500d23189a79fc0f8ebd6c94bd7a86e09d0a37ad125c2f9454abcfd666ab896dfd4e6e6b9bd74564f98b8c8197886ff170c9b8afa8f7f2d0c401ea5cee402ef31731589b8119e8e247d5e0d985be4fa5b2eb3d380423469fe68c7bb47fa92106e7c1ee2dc897e5b2f97bcbdaeca8bc21bf027c96b95
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2f243380cda0117e86a1662d9c91321609d880a8
                       efe893ac23d31a907ca79c45c05852a18d75168b
                       0a334939bc8759487b5f8a284a2090f327e8c6b8
                       265f4f55fb0822f64b20810bfb3dd79babf9e8b2
                       1b1fa6da2f67565432aa808ba62219899aa4eae3
                       a513996747412c75ac002f279ac8cfbe810e7bf1
                       26a2f569bb6fdaad9e5f4aacaf6bd5526af6da7f
                       4274d5d45aa2a592d32813cde0ca51f6f5bafe6c
                       52a06c3b260a4bec2b843bc6b16842d89b22c3a0
                       5b2b32a70e34d007549f49e3026da6fd3934f8c3
                       7861b67718bbc9e5e8970483f4f29ee34b5aa85f
                       3a8fbbe06e1de79e446e304c481dedc8ebb30d16
                       a0072aef6657f07c612fff1468562e8280e0ebbc
                       b2aa594d5646523d7e6c33771caf74d82c128881
                       a5d522f14a6126771a48875b6c4893d400608b23
                       72b2cee2676402147295c70531bf2bb94308b5c0
                       37ddc11121ed515e9733a6f7eda2549aeaf91c02
                       1742827657df775f18d9485f75273b601185de5f
                       c1cdbaf7e4112da748bf4216012d0ff1d4d3661f
                       4d8b8590
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [10:10:94:66:a8:1f:94:70:46:bd:34:7f:02:5f:c4:11:04:46:0e:db]
            modulus: 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
    public exponent: 10001

] 
2022-07-04 07:13:20.689  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-04 07:13:20.698 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-04 07:13:20.700 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-04 07:13:20.701 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-04 07:13:20.701  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-04 07:13:20.702  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-04 07:13:20.712  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-04 07:13:20.713 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-04 07:13:20.713 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-04 07:13:20.714 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-04 07:13:20.721 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-04 07:13:20.723 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 07:13:20.723 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 07:13:20.723 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 07:13:20.882  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-04 07:13:20.883  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-04 07:13:20.884 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-04 07:13:20.884 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 07:13:20.886  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-04 07:13:20.887  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-04 07:13:20.887 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:13:20.888 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:13:20.888 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:13:20.889 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:13:20.890 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:13:20.891 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:13:20.892 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:13:20.892 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:13:20.893 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:13:20.894 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-04 07:13:20.901 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 299365311521838739736167145188498986785521144295
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jul 04 05:32:57 UTC 2022
           Final Date: Sat Jul 03 05:32:56 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [13:da:13:43:3e:64:3e:21:40:64:4a:da:51:23:36:95:68:84:c0:6b]
            modulus: d40e95fdb70ff97604e85a5b54e220ff9a9fed0a00a3e1d81fa6a7268f9c8ae094c2ad1081fcb65280164687b9bd201e8c73096f9dd14e7dea6451c291e0c87e7ed7ae55e109b66bc7eacabd8df858e441785f5d2d9db3883ddab00033f06e9175723944a2896ddced3569d7908ec7052550edf8c573cf2e8f00a14ec86d2b75b66eb78e6f7f16ba3cc384689a17d0df3642034df68074526e44c61359d4f16b42d131a03e96496ff64d83c6a21c317905f12b29247e5cab251bb2fc46847b31da57c60089074e3890b072db5b13a981a3b5ea9816e58cf8cb32b0c91beb038f89f002bb08c855dac9e771ed71fbdeba0708142b025ef263764679bf070e393f33959304c6c43b4cf0e88500d23189a79fc0f8ebd6c94bd7a86e09d0a37ad125c2f9454abcfd666ab896dfd4e6e6b9bd74564f98b8c8197886ff170c9b8afa8f7f2d0c401ea5cee402ef31731589b8119e8e247d5e0d985be4fa5b2eb3d380423469fe68c7bb47fa92106e7c1ee2dc897e5b2f97bcbdaeca8bc21bf027c96b95
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2f243380cda0117e86a1662d9c91321609d880a8
                       efe893ac23d31a907ca79c45c05852a18d75168b
                       0a334939bc8759487b5f8a284a2090f327e8c6b8
                       265f4f55fb0822f64b20810bfb3dd79babf9e8b2
                       1b1fa6da2f67565432aa808ba62219899aa4eae3
                       a513996747412c75ac002f279ac8cfbe810e7bf1
                       26a2f569bb6fdaad9e5f4aacaf6bd5526af6da7f
                       4274d5d45aa2a592d32813cde0ca51f6f5bafe6c
                       52a06c3b260a4bec2b843bc6b16842d89b22c3a0
                       5b2b32a70e34d007549f49e3026da6fd3934f8c3
                       7861b67718bbc9e5e8970483f4f29ee34b5aa85f
                       3a8fbbe06e1de79e446e304c481dedc8ebb30d16
                       a0072aef6657f07c612fff1468562e8280e0ebbc
                       b2aa594d5646523d7e6c33771caf74d82c128881
                       a5d522f14a6126771a48875b6c4893d400608b23
                       72b2cee2676402147295c70531bf2bb94308b5c0
                       37ddc11121ed515e9733a6f7eda2549aeaf91c02
                       1742827657df775f18d9485f75273b601185de5f
                       c1cdbaf7e4112da748bf4216012d0ff1d4d3661f
                       4d8b8590
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [57:31:ee:27:19:13:d0:eb:3b:93:99:d5:3b:7a:42:1a:70:f3:90:f4]
            modulus: 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
    public exponent: 10001

] 
2022-07-04 07:15:17.842  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-04 07:15:17.844 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-04 07:15:17.845 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-04 07:15:17.846 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-04 07:15:17.847  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-04 07:15:17.847  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-04 07:15:17.848  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-04 07:15:17.848 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-04 07:15:17.848 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-04 07:15:17.849 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-04 07:15:17.853 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-04 07:15:17.854 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 07:15:17.854 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 07:15:17.855 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 07:15:17.959  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-04 07:15:17.960  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-04 07:15:17.960 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-04 07:15:17.960 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 07:15:17.961  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-04 07:15:17.962  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-04 07:15:17.962 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:15:17.962 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:15:17.963 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:15:17.963 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:15:17.964 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:15:17.964 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:15:17.965 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:15:17.965 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:15:17.965 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:15:17.967 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-04 07:15:17.972 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 299365311521838739736167145188498986785521144295
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jul 04 05:32:57 UTC 2022
           Final Date: Sat Jul 03 05:32:56 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [13:da:13:43:3e:64:3e:21:40:64:4a:da:51:23:36:95:68:84:c0:6b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2f243380cda0117e86a1662d9c91321609d880a8
                       efe893ac23d31a907ca79c45c05852a18d75168b
                       0a334939bc8759487b5f8a284a2090f327e8c6b8
                       265f4f55fb0822f64b20810bfb3dd79babf9e8b2
                       1b1fa6da2f67565432aa808ba62219899aa4eae3
                       a513996747412c75ac002f279ac8cfbe810e7bf1
                       26a2f569bb6fdaad9e5f4aacaf6bd5526af6da7f
                       4274d5d45aa2a592d32813cde0ca51f6f5bafe6c
                       52a06c3b260a4bec2b843bc6b16842d89b22c3a0
                       5b2b32a70e34d007549f49e3026da6fd3934f8c3
                       7861b67718bbc9e5e8970483f4f29ee34b5aa85f
                       3a8fbbe06e1de79e446e304c481dedc8ebb30d16
                       a0072aef6657f07c612fff1468562e8280e0ebbc
                       b2aa594d5646523d7e6c33771caf74d82c128881
                       a5d522f14a6126771a48875b6c4893d400608b23
                       72b2cee2676402147295c70531bf2bb94308b5c0
                       37ddc11121ed515e9733a6f7eda2549aeaf91c02
                       1742827657df775f18d9485f75273b601185de5f
                       c1cdbaf7e4112da748bf4216012d0ff1d4d3661f
                       4d8b8590
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [71:31:1e:ab:49:c2:9c:18:da:e3:06:dd:8b:88:7c:5a:3a:27:a8:3f]
            modulus: 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
    public exponent: 10001

] 
2022-07-04 07:17:45.484  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-04 07:17:45.486 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-04 07:17:45.488 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-04 07:17:45.489 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-04 07:17:45.489  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-04 07:17:45.490  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-04 07:17:45.490  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-04 07:17:45.490 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-04 07:17:45.491 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-04 07:17:45.491 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-04 07:17:45.496 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-04 07:17:45.496 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 07:17:45.497 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 07:17:45.497 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 07:17:45.642  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-04 07:17:45.643  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-04 07:17:45.643 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-04 07:17:45.644 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 07:17:45.645  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-04 07:17:45.645  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-04 07:17:45.646 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:17:45.646 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:17:45.646 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:17:45.647 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:17:45.647 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:17:45.647 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:17:45.648 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:17:45.648 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:17:45.648 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:17:45.649 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-04 07:17:45.652 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 299365311521838739736167145188498986785521144295
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jul 04 05:32:57 UTC 2022
           Final Date: Sat Jul 03 05:32:56 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [13:da:13:43:3e:64:3e:21:40:64:4a:da:51:23:36:95:68:84:c0:6b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2f243380cda0117e86a1662d9c91321609d880a8
                       efe893ac23d31a907ca79c45c05852a18d75168b
                       0a334939bc8759487b5f8a284a2090f327e8c6b8
                       265f4f55fb0822f64b20810bfb3dd79babf9e8b2
                       1b1fa6da2f67565432aa808ba62219899aa4eae3
                       a513996747412c75ac002f279ac8cfbe810e7bf1
                       26a2f569bb6fdaad9e5f4aacaf6bd5526af6da7f
                       4274d5d45aa2a592d32813cde0ca51f6f5bafe6c
                       52a06c3b260a4bec2b843bc6b16842d89b22c3a0
                       5b2b32a70e34d007549f49e3026da6fd3934f8c3
                       7861b67718bbc9e5e8970483f4f29ee34b5aa85f
                       3a8fbbe06e1de79e446e304c481dedc8ebb30d16
                       a0072aef6657f07c612fff1468562e8280e0ebbc
                       b2aa594d5646523d7e6c33771caf74d82c128881
                       a5d522f14a6126771a48875b6c4893d400608b23
                       72b2cee2676402147295c70531bf2bb94308b5c0
                       37ddc11121ed515e9733a6f7eda2549aeaf91c02
                       1742827657df775f18d9485f75273b601185de5f
                       c1cdbaf7e4112da748bf4216012d0ff1d4d3661f
                       4d8b8590
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [06:f4:af:17:fb:f9:a4:12:74:11:a3:a4:12:df:5e:6a:c9:02:e2:58]
            modulus: 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
    public exponent: 10001

] 
2022-07-04 07:21:11.869  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-04 07:21:11.871 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-04 07:21:11.872 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-07-04 07:21:11.873 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-04 07:21:11.873  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-07-04 07:21:11.874  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-04 07:21:11.874  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-04 07:21:11.875 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-04 07:21:11.875 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-04 07:21:11.875 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-04 07:21:11.880 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-04 07:21:11.881 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 07:21:11.881 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 07:21:11.881 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 07:21:12.048  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-04 07:21:12.049  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-04 07:21:12.049 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-04 07:21:12.049 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 07:21:12.051  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-04 07:21:12.051  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-04 07:21:12.051 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:21:12.052 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:21:12.052 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:21:12.052 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:21:12.053 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:21:12.053 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:21:12.053 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:21:12.054 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:21:12.054 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:21:12.054 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-04 07:21:12.058 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 299365311521838739736167145188498986785521144295
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jul 04 05:32:57 UTC 2022
           Final Date: Sat Jul 03 05:32:56 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [13:da:13:43:3e:64:3e:21:40:64:4a:da:51:23:36:95:68:84:c0:6b]
            modulus: d40e95fdb70ff97604e85a5b54e220ff9a9fed0a00a3e1d81fa6a7268f9c8ae094c2ad1081fcb65280164687b9bd201e8c73096f9dd14e7dea6451c291e0c87e7ed7ae55e109b66bc7eacabd8df858e441785f5d2d9db3883ddab00033f06e9175723944a2896ddced3569d7908ec7052550edf8c573cf2e8f00a14ec86d2b75b66eb78e6f7f16ba3cc384689a17d0df3642034df68074526e44c61359d4f16b42d131a03e96496ff64d83c6a21c317905f12b29247e5cab251bb2fc46847b31da57c60089074e3890b072db5b13a981a3b5ea9816e58cf8cb32b0c91beb038f89f002bb08c855dac9e771ed71fbdeba0708142b025ef263764679bf070e393f33959304c6c43b4cf0e88500d23189a79fc0f8ebd6c94bd7a86e09d0a37ad125c2f9454abcfd666ab896dfd4e6e6b9bd74564f98b8c8197886ff170c9b8afa8f7f2d0c401ea5cee402ef31731589b8119e8e247d5e0d985be4fa5b2eb3d380423469fe68c7bb47fa92106e7c1ee2dc897e5b2f97bcbdaeca8bc21bf027c96b95
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2f243380cda0117e86a1662d9c91321609d880a8
                       efe893ac23d31a907ca79c45c05852a18d75168b
                       0a334939bc8759487b5f8a284a2090f327e8c6b8
                       265f4f55fb0822f64b20810bfb3dd79babf9e8b2
                       1b1fa6da2f67565432aa808ba62219899aa4eae3
                       a513996747412c75ac002f279ac8cfbe810e7bf1
                       26a2f569bb6fdaad9e5f4aacaf6bd5526af6da7f
                       4274d5d45aa2a592d32813cde0ca51f6f5bafe6c
                       52a06c3b260a4bec2b843bc6b16842d89b22c3a0
                       5b2b32a70e34d007549f49e3026da6fd3934f8c3
                       7861b67718bbc9e5e8970483f4f29ee34b5aa85f
                       3a8fbbe06e1de79e446e304c481dedc8ebb30d16
                       a0072aef6657f07c612fff1468562e8280e0ebbc
                       b2aa594d5646523d7e6c33771caf74d82c128881
                       a5d522f14a6126771a48875b6c4893d400608b23
                       72b2cee2676402147295c70531bf2bb94308b5c0
                       37ddc11121ed515e9733a6f7eda2549aeaf91c02
                       1742827657df775f18d9485f75273b601185de5f
                       c1cdbaf7e4112da748bf4216012d0ff1d4d3661f
                       4d8b8590
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [54:a9:26:bf:93:81:b7:5e:f5:19:35:bf:82:50:ec:5b:ab:74:5a:65]
            modulus: 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
    public exponent: 10001

] 
2022-07-04 07:21:40.760  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-04 07:21:40.761 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-04 07:21:40.764 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-04 07:21:40.765 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-04 07:21:40.765  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-04 07:21:40.766  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-04 07:21:40.766  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-04 07:21:40.766 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-04 07:21:40.766 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-04 07:21:40.767 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-04 07:21:40.781 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-04 07:21:40.782 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 07:21:40.782 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 07:21:40.784 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 07:21:40.900  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-04 07:21:40.901  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-04 07:21:40.901 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-04 07:21:40.901 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 07:21:40.903  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-04 07:21:40.903  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-04 07:21:40.903 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:21:40.904 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:21:40.904 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:21:40.904 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:21:40.905 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:21:40.905 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:21:40.905 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:21:40.906 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:21:40.906 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:21:40.907 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-04 07:21:40.911 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 299365311521838739736167145188498986785521144295
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jul 04 05:32:57 UTC 2022
           Final Date: Sat Jul 03 05:32:56 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [13:da:13:43:3e:64:3e:21:40:64:4a:da:51:23:36:95:68:84:c0:6b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2f243380cda0117e86a1662d9c91321609d880a8
                       efe893ac23d31a907ca79c45c05852a18d75168b
                       0a334939bc8759487b5f8a284a2090f327e8c6b8
                       265f4f55fb0822f64b20810bfb3dd79babf9e8b2
                       1b1fa6da2f67565432aa808ba62219899aa4eae3
                       a513996747412c75ac002f279ac8cfbe810e7bf1
                       26a2f569bb6fdaad9e5f4aacaf6bd5526af6da7f
                       4274d5d45aa2a592d32813cde0ca51f6f5bafe6c
                       52a06c3b260a4bec2b843bc6b16842d89b22c3a0
                       5b2b32a70e34d007549f49e3026da6fd3934f8c3
                       7861b67718bbc9e5e8970483f4f29ee34b5aa85f
                       3a8fbbe06e1de79e446e304c481dedc8ebb30d16
                       a0072aef6657f07c612fff1468562e8280e0ebbc
                       b2aa594d5646523d7e6c33771caf74d82c128881
                       a5d522f14a6126771a48875b6c4893d400608b23
                       72b2cee2676402147295c70531bf2bb94308b5c0
                       37ddc11121ed515e9733a6f7eda2549aeaf91c02
                       1742827657df775f18d9485f75273b601185de5f
                       c1cdbaf7e4112da748bf4216012d0ff1d4d3661f
                       4d8b8590
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9c:c4:77:76:95:fd:87:ea:1d:ed:ba:4d:49:d2:dc:8c:c6:b7:b3:a4]
            modulus: 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
    public exponent: 10001

] 
2022-07-04 07:25:59.913  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-04 07:25:59.915 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-04 07:25:59.916 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-04 07:25:59.917 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-04 07:25:59.917  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-04 07:25:59.918  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-04 07:25:59.918  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-04 07:25:59.919 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-04 07:25:59.919 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-04 07:25:59.919 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-04 07:25:59.925 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-04 07:25:59.925 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 07:25:59.926 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 07:25:59.926 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 07:26:00.079  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-04 07:26:00.080  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-04 07:26:00.080 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-04 07:26:00.080 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 07:26:00.082  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-04 07:26:00.082  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-04 07:26:00.082 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:26:00.083 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:26:00.083 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:26:00.084 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:26:00.084 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:26:00.084 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:26:00.085 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:26:00.085 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:26:00.085 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:26:00.086 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-04 07:26:00.091 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 299365311521838739736167145188498986785521144295
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jul 04 05:32:57 UTC 2022
           Final Date: Sat Jul 03 05:32:56 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [13:da:13:43:3e:64:3e:21:40:64:4a:da:51:23:36:95:68:84:c0:6b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2f243380cda0117e86a1662d9c91321609d880a8
                       efe893ac23d31a907ca79c45c05852a18d75168b
                       0a334939bc8759487b5f8a284a2090f327e8c6b8
                       265f4f55fb0822f64b20810bfb3dd79babf9e8b2
                       1b1fa6da2f67565432aa808ba62219899aa4eae3
                       a513996747412c75ac002f279ac8cfbe810e7bf1
                       26a2f569bb6fdaad9e5f4aacaf6bd5526af6da7f
                       4274d5d45aa2a592d32813cde0ca51f6f5bafe6c
                       52a06c3b260a4bec2b843bc6b16842d89b22c3a0
                       5b2b32a70e34d007549f49e3026da6fd3934f8c3
                       7861b67718bbc9e5e8970483f4f29ee34b5aa85f
                       3a8fbbe06e1de79e446e304c481dedc8ebb30d16
                       a0072aef6657f07c612fff1468562e8280e0ebbc
                       b2aa594d5646523d7e6c33771caf74d82c128881
                       a5d522f14a6126771a48875b6c4893d400608b23
                       72b2cee2676402147295c70531bf2bb94308b5c0
                       37ddc11121ed515e9733a6f7eda2549aeaf91c02
                       1742827657df775f18d9485f75273b601185de5f
                       c1cdbaf7e4112da748bf4216012d0ff1d4d3661f
                       4d8b8590
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6f:72:6c:7d:be:9a:f5:6b:1b:04:44:49:a0:f8:9b:70:7b:a9:d6:0a]
            modulus: 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
    public exponent: 10001

] 
2022-07-04 07:26:57.990  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-04 07:26:57.991 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-04 07:26:57.992 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-07-04 07:26:57.993 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-04 07:26:57.994  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-07-04 07:26:57.994  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-04 07:26:57.995  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-04 07:26:57.995 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-04 07:26:57.995 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-04 07:26:57.996 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-04 07:26:58.000 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-04 07:26:58.000 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 07:26:58.001 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 07:26:58.001 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 07:26:58.117  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-04 07:26:58.118  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-04 07:26:58.118 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-04 07:26:58.118 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 07:26:58.120  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-04 07:26:58.120  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-04 07:26:58.121 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:26:58.121 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:26:58.121 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:26:58.122 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:26:58.122 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:26:58.122 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:26:58.123 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:26:58.123 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:26:58.123 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:26:58.124 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-04 07:26:58.127 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 299365311521838739736167145188498986785521144295
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jul 04 05:32:57 UTC 2022
           Final Date: Sat Jul 03 05:32:56 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [13:da:13:43:3e:64:3e:21:40:64:4a:da:51:23:36:95:68:84:c0:6b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2f243380cda0117e86a1662d9c91321609d880a8
                       efe893ac23d31a907ca79c45c05852a18d75168b
                       0a334939bc8759487b5f8a284a2090f327e8c6b8
                       265f4f55fb0822f64b20810bfb3dd79babf9e8b2
                       1b1fa6da2f67565432aa808ba62219899aa4eae3
                       a513996747412c75ac002f279ac8cfbe810e7bf1
                       26a2f569bb6fdaad9e5f4aacaf6bd5526af6da7f
                       4274d5d45aa2a592d32813cde0ca51f6f5bafe6c
                       52a06c3b260a4bec2b843bc6b16842d89b22c3a0
                       5b2b32a70e34d007549f49e3026da6fd3934f8c3
                       7861b67718bbc9e5e8970483f4f29ee34b5aa85f
                       3a8fbbe06e1de79e446e304c481dedc8ebb30d16
                       a0072aef6657f07c612fff1468562e8280e0ebbc
                       b2aa594d5646523d7e6c33771caf74d82c128881
                       a5d522f14a6126771a48875b6c4893d400608b23
                       72b2cee2676402147295c70531bf2bb94308b5c0
                       37ddc11121ed515e9733a6f7eda2549aeaf91c02
                       1742827657df775f18d9485f75273b601185de5f
                       c1cdbaf7e4112da748bf4216012d0ff1d4d3661f
                       4d8b8590
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [11:49:4d:80:84:ad:1a:34:5f:bb:06:75:89:f5:e4:78:90:0b:fb:25]
            modulus: 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
    public exponent: 10001

] 
2022-07-04 07:27:14.932  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-04 07:27:14.933 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-04 07:27:14.934 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-07-04 07:27:14.935 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-04 07:27:14.936  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-07-04 07:27:14.936  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-04 07:27:14.936  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-04 07:27:14.937 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-04 07:27:14.937 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-04 07:27:14.937 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-04 07:27:14.942 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-04 07:27:14.942 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 07:27:14.942 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 07:27:14.943 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 07:27:15.071  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-04 07:27:15.072  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-04 07:27:15.072 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-04 07:27:15.072 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 07:27:15.073  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-04 07:27:15.074  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-04 07:27:15.074 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:27:15.074 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:27:15.075 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:27:15.075 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:27:15.075 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:27:15.075 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:27:15.076 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:27:15.076 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:27:15.076 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:27:15.077 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-04 07:27:15.080 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 299365311521838739736167145188498986785521144295
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jul 04 05:32:57 UTC 2022
           Final Date: Sat Jul 03 05:32:56 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [13:da:13:43:3e:64:3e:21:40:64:4a:da:51:23:36:95:68:84:c0:6b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2f243380cda0117e86a1662d9c91321609d880a8
                       efe893ac23d31a907ca79c45c05852a18d75168b
                       0a334939bc8759487b5f8a284a2090f327e8c6b8
                       265f4f55fb0822f64b20810bfb3dd79babf9e8b2
                       1b1fa6da2f67565432aa808ba62219899aa4eae3
                       a513996747412c75ac002f279ac8cfbe810e7bf1
                       26a2f569bb6fdaad9e5f4aacaf6bd5526af6da7f
                       4274d5d45aa2a592d32813cde0ca51f6f5bafe6c
                       52a06c3b260a4bec2b843bc6b16842d89b22c3a0
                       5b2b32a70e34d007549f49e3026da6fd3934f8c3
                       7861b67718bbc9e5e8970483f4f29ee34b5aa85f
                       3a8fbbe06e1de79e446e304c481dedc8ebb30d16
                       a0072aef6657f07c612fff1468562e8280e0ebbc
                       b2aa594d5646523d7e6c33771caf74d82c128881
                       a5d522f14a6126771a48875b6c4893d400608b23
                       72b2cee2676402147295c70531bf2bb94308b5c0
                       37ddc11121ed515e9733a6f7eda2549aeaf91c02
                       1742827657df775f18d9485f75273b601185de5f
                       c1cdbaf7e4112da748bf4216012d0ff1d4d3661f
                       4d8b8590
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [55:04:4c:8e:fa:c1:25:e3:8b:0a:4f:f9:37:30:85:ca:5f:16:dc:28]
            modulus: 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
    public exponent: 10001

] 
2022-07-04 07:30:35.870  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-04 07:30:35.871 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-04 07:30:35.873 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-04 07:30:35.874 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-04 07:30:35.874  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-04 07:30:35.875  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-04 07:30:35.875  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-04 07:30:35.876 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-04 07:30:35.876 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-04 07:30:35.876 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-04 07:30:35.881 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-04 07:30:35.882 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 07:30:35.882 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-04 07:30:35.882 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 07:30:36.047  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-04 07:30:36.047  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-04 07:30:36.047 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-04 07:30:36.048 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-04 07:30:36.049  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-04 07:30:36.049  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-04 07:30:36.050 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:30:36.055 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:30:36.056 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:30:36.056 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:30:36.057 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:30:36.057 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:30:36.058 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-04 07:30:36.058 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-04 07:30:36.058 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-04 07:30:36.059 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-04 07:30:36.063 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 299365311521838739736167145188498986785521144295
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jul 04 05:32:57 UTC 2022
           Final Date: Sat Jul 03 05:32:56 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [13:da:13:43:3e:64:3e:21:40:64:4a:da:51:23:36:95:68:84:c0:6b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2f243380cda0117e86a1662d9c91321609d880a8
                       efe893ac23d31a907ca79c45c05852a18d75168b
                       0a334939bc8759487b5f8a284a2090f327e8c6b8
                       265f4f55fb0822f64b20810bfb3dd79babf9e8b2
                       1b1fa6da2f67565432aa808ba62219899aa4eae3
                       a513996747412c75ac002f279ac8cfbe810e7bf1
                       26a2f569bb6fdaad9e5f4aacaf6bd5526af6da7f
                       4274d5d45aa2a592d32813cde0ca51f6f5bafe6c
                       52a06c3b260a4bec2b843bc6b16842d89b22c3a0
                       5b2b32a70e34d007549f49e3026da6fd3934f8c3
                       7861b67718bbc9e5e8970483f4f29ee34b5aa85f
                       3a8fbbe06e1de79e446e304c481dedc8ebb30d16
                       a0072aef6657f07c612fff1468562e8280e0ebbc
                       b2aa594d5646523d7e6c33771caf74d82c128881
                       a5d522f14a6126771a48875b6c4893d400608b23
                       72b2cee2676402147295c70531bf2bb94308b5c0
                       37ddc11121ed515e9733a6f7eda2549aeaf91c02
                       1742827657df775f18d9485f75273b601185de5f
                       c1cdbaf7e4112da748bf4216012d0ff1d4d3661f
                       4d8b8590
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [62:a2:49:be:eb:66:42:8b:75:ae:81:79:28:79:59:cb:5e:92:06:cc]
            modulus: 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
    public exponent: 10001

]