Results

By type

          2022-10-28 05:06:54,131 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-10-28 05:06:55,609 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-10-28 05:06:56.318  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Oct 28, 2022 5:06:58 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Oct 28, 2022 5:06:58 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Oct 28, 2022 5:06:58 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Oct 28, 2022 5:06:58 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-10-28 05:06:58.815 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-10-28 05:06:59.130  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-10-28 05:06:59.311  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-10-28 05:07:00.069 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-10-28 05:07:00.072 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-10-28 05:07:00.073 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-10-28 05:07:00.076 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-10-28 05:07:00.112 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-10-28 05:07:00.115 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-10-28 05:07:00.231 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-10-28 05:07:00.933 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Oct 28, 2022 5:07:01 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-10-28 05:07:01.845  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.626 seconds (JVM running for 10.289)
Oct 28, 2022 5:07:24 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-10-28 05:07:52.051  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-28 05:07:52.057 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-28 05:07:52.090 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-10-28 05:07:52.093 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-28 05:07:52.109  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-10-28 05:07:52.111  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-28 05:07:52.112  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-28 05:07:52.113 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-28 05:07:52.114 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 05:07:52.117 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-28 05:07:52.125 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-28 05:07:52.128 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-28 05:07:52.176 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-28 05:07:52.182 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 05:07:52.182 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 05:07:52.185 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-28 05:07:52.698  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-28 05:07:52.700  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-28 05:07:52.701 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-28 05:07:52.702 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-28 05:07:52.712  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-28 05:07:52.713  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-28 05:07:52.714 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 05:07:52.714 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 05:07:52.715 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 05:07:52.730 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 05:07:52.731 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 05:07:52.732 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 05:07:52.737 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 05:07:52.737 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 05:07:52.738 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 05:07:52.739 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-28 05:07:52.769 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 637170502015665422244687970968970076370158687190
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 28 05:03:49 UTC 2022
           Final Date: Wed Oct 27 05:03:48 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c8:a3:5c:20:31:4c:65:01:1d:67:91:a7:2d:0f:f2:c5:d6:89:b4:85],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b42c3eff9e57b8d3c31940be3d6aaa43e9dfc5b
                       57efb143fe9f898f1af2a38e28afe1b2131da8da
                       cd898a48187d6c369d3f731e1d46de3939913b06
                       1a186bc98c288a99f90d858f6a404c9cab1a54bb
                       1634459239dfaa6a44eaec28a596d041c520dc14
                       5d47e63ed3c0a15ce99e1b974ecc2ed19ea07c04
                       f82b47b81848b86267d7d77f3504949ebe637a7a
                       bb3e02a3ee29f8bc26222f5f3eb4905e22e56165
                       e2d6a462ca814bedc22de5dfa71e9b801f945f8b
                       adeed6128df6c5920e2a770ccba7b46e9bf30f5b
                       530324d46dbb06d279cbab505639e3e8c8fe7a5d
                       f687f91cd92368fe7a89208cde48fd13a899904f
                       1394d3c8d031033a2f0c5e32b4d43c1d8efa5d78
                       f424565d35a854b9975d3972bf257e216a73de90
                       ee067d3142945b519056441f77c91ca77a8d6733
                       a9ebe59a173dca4e80cca040c084ebab6821f6c3
                       48d41197a47c5e41e8f75538915dfb992da8d6e1
                       8c8a12306c671bb26db0aa296869186d843020cc
                       dfb077f749032668640f62b9c1435f94eb56e42a
                       41d9d73b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6c:68:c4:c0:0f:a8:ba:68:08:c8:fb:32:c9:6b:0e:02:11:a8:fc:07],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-28 06:23:24.627  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-28 06:23:24.630 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-28 06:23:24.634 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-28 06:23:24.635 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-28 06:23:24.636  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-28 06:23:24.637  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-28 06:23:24.637  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-28 06:23:24.638 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-28 06:23:24.638 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-28 06:23:24.639 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-28 06:23:24.644 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-28 06:23:24.645 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 06:23:24.645 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 06:23:24.646 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-28 06:23:24.848  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-28 06:23:24.849  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-28 06:23:24.850 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-28 06:23:24.850 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-28 06:23:24.853  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-28 06:23:24.854  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-28 06:23:24.854 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 06:23:24.855 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 06:23:24.855 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 06:23:24.856 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 06:23:24.857 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 06:23:24.858 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 06:23:24.859 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 06:23:24.859 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 06:23:24.860 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 06:23:24.861 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-28 06:23:24.865 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 637170502015665422244687970968970076370158687190
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 28 05:03:49 UTC 2022
           Final Date: Wed Oct 27 05:03:48 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c8:a3:5c:20:31:4c:65:01:1d:67:91:a7:2d:0f:f2:c5:d6:89:b4:85],[56:66:d1:a4]
        modulus: 90c874014f729d8ada4aa89d84ef802ddb3d5ae81589ec4ac18158f0689c0c9330d6370329fbee259a72efd58d502af22624c7d16fc33f7ba535771ca2e5f1db862a7cc594067958ac61771be8b4be6f75ea9ed20c4b96abe8ce2af89a7535215aab4d30c8ccd9e6bb01a4bd81c2013777280ac1a60001080a17b4ddd6bdbad80cc1e0d88747d94db195915ef3b3eac4c9e69ab70261c83e2e762ce1b72834352bbe6910865eabf7ec70b3bc6be2ac8d06e0bc9213df6c898353e89724b05b52b77fa8b2606d3e31fe8c461bd923a6c2a856faf39b0a92dac715b1f2d96d6e102eb9c35579d02a5d5ff465c97779ffd1afbda141bdeb391a5a76f41c32fa1f72bc481cb44605000e463f021f96a4be6ed339518ad10010131438ad4b17df3ebb5a55ee9052f1e890d0304502f838a7ac2cebe750593a5f64a512bf75800cf9d71cf46e61c9eb73ee7e8557a4442f52366176676f2de6a9c632f5dfd74ff7ad5dfeb0a8bb5e8ad162f3c0e3a57ed8a08badde4dd82032fb40936eabd97b07012f
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b42c3eff9e57b8d3c31940be3d6aaa43e9dfc5b
                       57efb143fe9f898f1af2a38e28afe1b2131da8da
                       cd898a48187d6c369d3f731e1d46de3939913b06
                       1a186bc98c288a99f90d858f6a404c9cab1a54bb
                       1634459239dfaa6a44eaec28a596d041c520dc14
                       5d47e63ed3c0a15ce99e1b974ecc2ed19ea07c04
                       f82b47b81848b86267d7d77f3504949ebe637a7a
                       bb3e02a3ee29f8bc26222f5f3eb4905e22e56165
                       e2d6a462ca814bedc22de5dfa71e9b801f945f8b
                       adeed6128df6c5920e2a770ccba7b46e9bf30f5b
                       530324d46dbb06d279cbab505639e3e8c8fe7a5d
                       f687f91cd92368fe7a89208cde48fd13a899904f
                       1394d3c8d031033a2f0c5e32b4d43c1d8efa5d78
                       f424565d35a854b9975d3972bf257e216a73de90
                       ee067d3142945b519056441f77c91ca77a8d6733
                       a9ebe59a173dca4e80cca040c084ebab6821f6c3
                       48d41197a47c5e41e8f75538915dfb992da8d6e1
                       8c8a12306c671bb26db0aa296869186d843020cc
                       dfb077f749032668640f62b9c1435f94eb56e42a
                       41d9d73b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4e:d5:dd:d0:dd:2d:a1:14:86:1e:4b:06:bb:aa:9c:25:6b:3d:99:bc],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-28 06:25:12.145  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-28 06:25:12.149 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-28 06:25:12.153 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-10-28 06:25:12.155 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-28 06:25:12.156  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-10-28 06:25:12.157  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-28 06:25:12.157  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-28 06:25:12.158 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-28 06:25:12.159 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-28 06:25:12.160 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-28 06:25:12.166 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-28 06:25:12.167 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 06:25:12.168 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 06:25:12.168 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-28 06:25:12.396  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-28 06:25:12.397  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-28 06:25:12.398 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-28 06:25:12.398 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-28 06:25:12.412  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-28 06:25:12.413  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-28 06:25:12.414 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 06:25:12.414 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 06:25:12.415 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 06:25:12.416 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 06:25:12.417 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 06:25:12.417 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 06:25:12.418 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 06:25:12.419 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 06:25:12.419 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 06:25:12.421 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-28 06:25:12.425 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 637170502015665422244687970968970076370158687190
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 28 05:03:49 UTC 2022
           Final Date: Wed Oct 27 05:03:48 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c8:a3:5c:20:31:4c:65:01:1d:67:91:a7:2d:0f:f2:c5:d6:89:b4:85],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b42c3eff9e57b8d3c31940be3d6aaa43e9dfc5b
                       57efb143fe9f898f1af2a38e28afe1b2131da8da
                       cd898a48187d6c369d3f731e1d46de3939913b06
                       1a186bc98c288a99f90d858f6a404c9cab1a54bb
                       1634459239dfaa6a44eaec28a596d041c520dc14
                       5d47e63ed3c0a15ce99e1b974ecc2ed19ea07c04
                       f82b47b81848b86267d7d77f3504949ebe637a7a
                       bb3e02a3ee29f8bc26222f5f3eb4905e22e56165
                       e2d6a462ca814bedc22de5dfa71e9b801f945f8b
                       adeed6128df6c5920e2a770ccba7b46e9bf30f5b
                       530324d46dbb06d279cbab505639e3e8c8fe7a5d
                       f687f91cd92368fe7a89208cde48fd13a899904f
                       1394d3c8d031033a2f0c5e32b4d43c1d8efa5d78
                       f424565d35a854b9975d3972bf257e216a73de90
                       ee067d3142945b519056441f77c91ca77a8d6733
                       a9ebe59a173dca4e80cca040c084ebab6821f6c3
                       48d41197a47c5e41e8f75538915dfb992da8d6e1
                       8c8a12306c671bb26db0aa296869186d843020cc
                       dfb077f749032668640f62b9c1435f94eb56e42a
                       41d9d73b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [07:df:2b:67:89:c0:35:ec:59:90:fb:cd:9b:c8:57:49:93:0e:a8:77],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-28 06:26:23.942  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-28 06:26:23.944 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-28 06:26:23.945 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-10-28 06:26:23.946 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-28 06:26:23.946  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-10-28 06:26:23.948  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-28 06:26:23.948  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-28 06:26:23.949 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-28 06:26:23.949 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-28 06:26:23.949 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-28 06:26:23.955 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-28 06:26:23.956 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 06:26:23.957 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 06:26:23.957 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-28 06:26:24.087  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-28 06:26:24.088  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-28 06:26:24.088 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-28 06:26:24.089 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-28 06:26:24.090  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-28 06:26:24.091  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-28 06:26:24.092 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 06:26:24.092 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 06:26:24.092 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 06:26:24.093 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 06:26:24.093 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 06:26:24.094 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 06:26:24.095 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 06:26:24.095 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 06:26:24.095 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 06:26:24.096 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-28 06:26:24.101 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 637170502015665422244687970968970076370158687190
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 28 05:03:49 UTC 2022
           Final Date: Wed Oct 27 05:03:48 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c8:a3:5c:20:31:4c:65:01:1d:67:91:a7:2d:0f:f2:c5:d6:89:b4:85],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b42c3eff9e57b8d3c31940be3d6aaa43e9dfc5b
                       57efb143fe9f898f1af2a38e28afe1b2131da8da
                       cd898a48187d6c369d3f731e1d46de3939913b06
                       1a186bc98c288a99f90d858f6a404c9cab1a54bb
                       1634459239dfaa6a44eaec28a596d041c520dc14
                       5d47e63ed3c0a15ce99e1b974ecc2ed19ea07c04
                       f82b47b81848b86267d7d77f3504949ebe637a7a
                       bb3e02a3ee29f8bc26222f5f3eb4905e22e56165
                       e2d6a462ca814bedc22de5dfa71e9b801f945f8b
                       adeed6128df6c5920e2a770ccba7b46e9bf30f5b
                       530324d46dbb06d279cbab505639e3e8c8fe7a5d
                       f687f91cd92368fe7a89208cde48fd13a899904f
                       1394d3c8d031033a2f0c5e32b4d43c1d8efa5d78
                       f424565d35a854b9975d3972bf257e216a73de90
                       ee067d3142945b519056441f77c91ca77a8d6733
                       a9ebe59a173dca4e80cca040c084ebab6821f6c3
                       48d41197a47c5e41e8f75538915dfb992da8d6e1
                       8c8a12306c671bb26db0aa296869186d843020cc
                       dfb077f749032668640f62b9c1435f94eb56e42a
                       41d9d73b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fe:37:0f:c9:9a:d2:a1:98:64:d9:7b:2b:d8:b2:cd:32:7f:36:b4:23],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-28 06:28:28.229  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-28 06:28:28.230 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-28 06:28:28.232 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-28 06:28:28.233 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-28 06:28:28.234  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-28 06:28:28.235  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-28 06:28:28.236  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-28 06:28:28.237 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-28 06:28:28.238 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-28 06:28:28.239 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-28 06:28:28.246 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-28 06:28:28.247 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 06:28:28.248 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 06:28:28.249 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-28 06:28:28.413  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-28 06:28:28.414  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-28 06:28:28.415 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-28 06:28:28.415 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-28 06:28:28.417  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-28 06:28:28.417  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-28 06:28:28.418 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 06:28:28.418 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 06:28:28.419 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 06:28:28.419 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 06:28:28.420 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 06:28:28.420 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 06:28:28.421 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 06:28:28.421 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 06:28:28.422 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 06:28:28.423 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-28 06:28:28.426 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 637170502015665422244687970968970076370158687190
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 28 05:03:49 UTC 2022
           Final Date: Wed Oct 27 05:03:48 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c8:a3:5c:20:31:4c:65:01:1d:67:91:a7:2d:0f:f2:c5:d6:89:b4:85],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b42c3eff9e57b8d3c31940be3d6aaa43e9dfc5b
                       57efb143fe9f898f1af2a38e28afe1b2131da8da
                       cd898a48187d6c369d3f731e1d46de3939913b06
                       1a186bc98c288a99f90d858f6a404c9cab1a54bb
                       1634459239dfaa6a44eaec28a596d041c520dc14
                       5d47e63ed3c0a15ce99e1b974ecc2ed19ea07c04
                       f82b47b81848b86267d7d77f3504949ebe637a7a
                       bb3e02a3ee29f8bc26222f5f3eb4905e22e56165
                       e2d6a462ca814bedc22de5dfa71e9b801f945f8b
                       adeed6128df6c5920e2a770ccba7b46e9bf30f5b
                       530324d46dbb06d279cbab505639e3e8c8fe7a5d
                       f687f91cd92368fe7a89208cde48fd13a899904f
                       1394d3c8d031033a2f0c5e32b4d43c1d8efa5d78
                       f424565d35a854b9975d3972bf257e216a73de90
                       ee067d3142945b519056441f77c91ca77a8d6733
                       a9ebe59a173dca4e80cca040c084ebab6821f6c3
                       48d41197a47c5e41e8f75538915dfb992da8d6e1
                       8c8a12306c671bb26db0aa296869186d843020cc
                       dfb077f749032668640f62b9c1435f94eb56e42a
                       41d9d73b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f7:a6:b4:4d:5e:0e:cf:5d:49:68:f1:d4:cc:82:10:50:19:f7:11:e9],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-28 06:38:02.653  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-28 06:38:02.656 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-28 06:38:02.658 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-10-28 06:38:02.659 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-28 06:38:02.660  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-10-28 06:38:02.660  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-28 06:38:02.661  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-28 06:38:02.661 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-28 06:38:02.662 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-28 06:38:02.662 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-28 06:38:02.668 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-28 06:38:02.669 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 06:38:02.669 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 06:38:02.670 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-28 06:38:02.848  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-28 06:38:02.849  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-28 06:38:02.849 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-28 06:38:02.850 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-28 06:38:02.851  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-28 06:38:02.851  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-28 06:38:02.852 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 06:38:02.852 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 06:38:02.852 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 06:38:02.853 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 06:38:02.853 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 06:38:02.854 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 06:38:02.854 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 06:38:02.855 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 06:38:02.855 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 06:38:02.856 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-28 06:38:02.859 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 637170502015665422244687970968970076370158687190
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 28 05:03:49 UTC 2022
           Final Date: Wed Oct 27 05:03:48 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c8:a3:5c:20:31:4c:65:01:1d:67:91:a7:2d:0f:f2:c5:d6:89:b4:85],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b42c3eff9e57b8d3c31940be3d6aaa43e9dfc5b
                       57efb143fe9f898f1af2a38e28afe1b2131da8da
                       cd898a48187d6c369d3f731e1d46de3939913b06
                       1a186bc98c288a99f90d858f6a404c9cab1a54bb
                       1634459239dfaa6a44eaec28a596d041c520dc14
                       5d47e63ed3c0a15ce99e1b974ecc2ed19ea07c04
                       f82b47b81848b86267d7d77f3504949ebe637a7a
                       bb3e02a3ee29f8bc26222f5f3eb4905e22e56165
                       e2d6a462ca814bedc22de5dfa71e9b801f945f8b
                       adeed6128df6c5920e2a770ccba7b46e9bf30f5b
                       530324d46dbb06d279cbab505639e3e8c8fe7a5d
                       f687f91cd92368fe7a89208cde48fd13a899904f
                       1394d3c8d031033a2f0c5e32b4d43c1d8efa5d78
                       f424565d35a854b9975d3972bf257e216a73de90
                       ee067d3142945b519056441f77c91ca77a8d6733
                       a9ebe59a173dca4e80cca040c084ebab6821f6c3
                       48d41197a47c5e41e8f75538915dfb992da8d6e1
                       8c8a12306c671bb26db0aa296869186d843020cc
                       dfb077f749032668640f62b9c1435f94eb56e42a
                       41d9d73b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9d:6d:55:55:3a:19:74:7e:22:fe:40:39:0c:70:07:36:c8:e6:4f:11],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-28 06:42:17.447  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-28 06:42:17.450 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-28 06:42:17.452 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-10-28 06:42:17.454 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-28 06:42:17.454  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-10-28 06:42:17.455  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-28 06:42:17.455  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-28 06:42:17.456 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-28 06:42:17.456 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-28 06:42:17.457 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-28 06:42:17.461 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-28 06:42:17.462 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 06:42:17.463 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 06:42:17.463 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-28 06:42:17.635  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-28 06:42:17.636  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-28 06:42:17.637 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-28 06:42:17.637 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-28 06:42:17.638  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-28 06:42:17.639  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-28 06:42:17.639 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 06:42:17.640 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 06:42:17.640 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 06:42:17.641 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 06:42:17.642 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 06:42:17.643 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 06:42:17.644 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 06:42:17.645 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 06:42:17.645 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 06:42:17.646 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-28 06:42:17.651 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 637170502015665422244687970968970076370158687190
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 28 05:03:49 UTC 2022
           Final Date: Wed Oct 27 05:03:48 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c8:a3:5c:20:31:4c:65:01:1d:67:91:a7:2d:0f:f2:c5:d6:89:b4:85],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b42c3eff9e57b8d3c31940be3d6aaa43e9dfc5b
                       57efb143fe9f898f1af2a38e28afe1b2131da8da
                       cd898a48187d6c369d3f731e1d46de3939913b06
                       1a186bc98c288a99f90d858f6a404c9cab1a54bb
                       1634459239dfaa6a44eaec28a596d041c520dc14
                       5d47e63ed3c0a15ce99e1b974ecc2ed19ea07c04
                       f82b47b81848b86267d7d77f3504949ebe637a7a
                       bb3e02a3ee29f8bc26222f5f3eb4905e22e56165
                       e2d6a462ca814bedc22de5dfa71e9b801f945f8b
                       adeed6128df6c5920e2a770ccba7b46e9bf30f5b
                       530324d46dbb06d279cbab505639e3e8c8fe7a5d
                       f687f91cd92368fe7a89208cde48fd13a899904f
                       1394d3c8d031033a2f0c5e32b4d43c1d8efa5d78
                       f424565d35a854b9975d3972bf257e216a73de90
                       ee067d3142945b519056441f77c91ca77a8d6733
                       a9ebe59a173dca4e80cca040c084ebab6821f6c3
                       48d41197a47c5e41e8f75538915dfb992da8d6e1
                       8c8a12306c671bb26db0aa296869186d843020cc
                       dfb077f749032668640f62b9c1435f94eb56e42a
                       41d9d73b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7d:65:04:94:80:0c:c1:47:4e:c3:92:79:e5:ac:c3:5a:da:1e:f3:02],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-28 06:42:34.424  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-28 06:42:34.425 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-28 06:42:34.426 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-10-28 06:42:34.427 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-28 06:42:34.427  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-10-28 06:42:34.428  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-28 06:42:34.428  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-28 06:42:34.429 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-28 06:42:34.429 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-28 06:42:34.429 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-28 06:42:34.432 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-28 06:42:34.433 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 06:42:34.433 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 06:42:34.434 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-28 06:42:34.581  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-28 06:42:34.582  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-28 06:42:34.582 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-28 06:42:34.582 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-28 06:42:34.584  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-28 06:42:34.585  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-28 06:42:34.585 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 06:42:34.586 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 06:42:34.586 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 06:42:34.587 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 06:42:34.587 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 06:42:34.587 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 06:42:34.588 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 06:42:34.588 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 06:42:34.588 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 06:42:34.589 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-28 06:42:34.592 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 637170502015665422244687970968970076370158687190
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 28 05:03:49 UTC 2022
           Final Date: Wed Oct 27 05:03:48 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c8:a3:5c:20:31:4c:65:01:1d:67:91:a7:2d:0f:f2:c5:d6:89:b4:85],[56:66:d1:a4]
        modulus: 90c874014f729d8ada4aa89d84ef802ddb3d5ae81589ec4ac18158f0689c0c9330d6370329fbee259a72efd58d502af22624c7d16fc33f7ba535771ca2e5f1db862a7cc594067958ac61771be8b4be6f75ea9ed20c4b96abe8ce2af89a7535215aab4d30c8ccd9e6bb01a4bd81c2013777280ac1a60001080a17b4ddd6bdbad80cc1e0d88747d94db195915ef3b3eac4c9e69ab70261c83e2e762ce1b72834352bbe6910865eabf7ec70b3bc6be2ac8d06e0bc9213df6c898353e89724b05b52b77fa8b2606d3e31fe8c461bd923a6c2a856faf39b0a92dac715b1f2d96d6e102eb9c35579d02a5d5ff465c97779ffd1afbda141bdeb391a5a76f41c32fa1f72bc481cb44605000e463f021f96a4be6ed339518ad10010131438ad4b17df3ebb5a55ee9052f1e890d0304502f838a7ac2cebe750593a5f64a512bf75800cf9d71cf46e61c9eb73ee7e8557a4442f52366176676f2de6a9c632f5dfd74ff7ad5dfeb0a8bb5e8ad162f3c0e3a57ed8a08badde4dd82032fb40936eabd97b07012f
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b42c3eff9e57b8d3c31940be3d6aaa43e9dfc5b
                       57efb143fe9f898f1af2a38e28afe1b2131da8da
                       cd898a48187d6c369d3f731e1d46de3939913b06
                       1a186bc98c288a99f90d858f6a404c9cab1a54bb
                       1634459239dfaa6a44eaec28a596d041c520dc14
                       5d47e63ed3c0a15ce99e1b974ecc2ed19ea07c04
                       f82b47b81848b86267d7d77f3504949ebe637a7a
                       bb3e02a3ee29f8bc26222f5f3eb4905e22e56165
                       e2d6a462ca814bedc22de5dfa71e9b801f945f8b
                       adeed6128df6c5920e2a770ccba7b46e9bf30f5b
                       530324d46dbb06d279cbab505639e3e8c8fe7a5d
                       f687f91cd92368fe7a89208cde48fd13a899904f
                       1394d3c8d031033a2f0c5e32b4d43c1d8efa5d78
                       f424565d35a854b9975d3972bf257e216a73de90
                       ee067d3142945b519056441f77c91ca77a8d6733
                       a9ebe59a173dca4e80cca040c084ebab6821f6c3
                       48d41197a47c5e41e8f75538915dfb992da8d6e1
                       8c8a12306c671bb26db0aa296869186d843020cc
                       dfb077f749032668640f62b9c1435f94eb56e42a
                       41d9d73b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f4:61:3b:2a:e8:5b:a6:8f:60:39:12:ce:2f:93:72:cb:5e:8e:82:cc],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-28 07:00:49.251  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-28 07:00:49.254 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-28 07:00:49.259 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-10-28 07:00:49.260 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-28 07:00:49.261  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-10-28 07:00:49.261  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-28 07:00:49.262  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-28 07:00:49.262 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-28 07:00:49.263 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-28 07:00:49.264 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-28 07:00:49.268 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-28 07:00:49.269 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 07:00:49.269 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 07:00:49.270 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-28 07:00:49.440  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-28 07:00:49.441  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-28 07:00:49.441 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-28 07:00:49.442 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-28 07:00:49.444  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-28 07:00:49.444  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-28 07:00:49.445 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 07:00:49.445 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 07:00:49.446 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 07:00:49.447 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 07:00:49.447 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 07:00:49.448 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 07:00:49.449 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 07:00:49.449 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 07:00:49.450 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 07:00:49.450 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-28 07:00:49.454 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 637170502015665422244687970968970076370158687190
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 28 05:03:49 UTC 2022
           Final Date: Wed Oct 27 05:03:48 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c8:a3:5c:20:31:4c:65:01:1d:67:91:a7:2d:0f:f2:c5:d6:89:b4:85],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b42c3eff9e57b8d3c31940be3d6aaa43e9dfc5b
                       57efb143fe9f898f1af2a38e28afe1b2131da8da
                       cd898a48187d6c369d3f731e1d46de3939913b06
                       1a186bc98c288a99f90d858f6a404c9cab1a54bb
                       1634459239dfaa6a44eaec28a596d041c520dc14
                       5d47e63ed3c0a15ce99e1b974ecc2ed19ea07c04
                       f82b47b81848b86267d7d77f3504949ebe637a7a
                       bb3e02a3ee29f8bc26222f5f3eb4905e22e56165
                       e2d6a462ca814bedc22de5dfa71e9b801f945f8b
                       adeed6128df6c5920e2a770ccba7b46e9bf30f5b
                       530324d46dbb06d279cbab505639e3e8c8fe7a5d
                       f687f91cd92368fe7a89208cde48fd13a899904f
                       1394d3c8d031033a2f0c5e32b4d43c1d8efa5d78
                       f424565d35a854b9975d3972bf257e216a73de90
                       ee067d3142945b519056441f77c91ca77a8d6733
                       a9ebe59a173dca4e80cca040c084ebab6821f6c3
                       48d41197a47c5e41e8f75538915dfb992da8d6e1
                       8c8a12306c671bb26db0aa296869186d843020cc
                       dfb077f749032668640f62b9c1435f94eb56e42a
                       41d9d73b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [37:ae:79:13:68:c6:67:9f:c1:b8:9d:b5:07:1f:73:46:92:33:9d:85],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-28 07:00:54.516  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-28 07:00:54.517 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-28 07:00:54.518 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-10-28 07:00:54.518 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-28 07:00:54.519  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-10-28 07:00:54.519  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-28 07:00:54.520  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-28 07:00:54.520 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-28 07:00:54.520 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-28 07:00:54.521 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-28 07:00:54.524 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-28 07:00:54.525 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 07:00:54.525 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 07:00:54.525 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-28 07:00:54.655  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-28 07:00:54.656  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-28 07:00:54.656 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-28 07:00:54.656 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-28 07:00:54.658  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-28 07:00:54.658  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-28 07:00:54.658 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 07:00:54.659 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 07:00:54.659 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 07:00:54.660 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 07:00:54.660 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 07:00:54.660 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 07:00:54.661 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 07:00:54.661 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 07:00:54.661 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 07:00:54.662 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-28 07:00:54.665 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 637170502015665422244687970968970076370158687190
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 28 05:03:49 UTC 2022
           Final Date: Wed Oct 27 05:03:48 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c8:a3:5c:20:31:4c:65:01:1d:67:91:a7:2d:0f:f2:c5:d6:89:b4:85],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b42c3eff9e57b8d3c31940be3d6aaa43e9dfc5b
                       57efb143fe9f898f1af2a38e28afe1b2131da8da
                       cd898a48187d6c369d3f731e1d46de3939913b06
                       1a186bc98c288a99f90d858f6a404c9cab1a54bb
                       1634459239dfaa6a44eaec28a596d041c520dc14
                       5d47e63ed3c0a15ce99e1b974ecc2ed19ea07c04
                       f82b47b81848b86267d7d77f3504949ebe637a7a
                       bb3e02a3ee29f8bc26222f5f3eb4905e22e56165
                       e2d6a462ca814bedc22de5dfa71e9b801f945f8b
                       adeed6128df6c5920e2a770ccba7b46e9bf30f5b
                       530324d46dbb06d279cbab505639e3e8c8fe7a5d
                       f687f91cd92368fe7a89208cde48fd13a899904f
                       1394d3c8d031033a2f0c5e32b4d43c1d8efa5d78
                       f424565d35a854b9975d3972bf257e216a73de90
                       ee067d3142945b519056441f77c91ca77a8d6733
                       a9ebe59a173dca4e80cca040c084ebab6821f6c3
                       48d41197a47c5e41e8f75538915dfb992da8d6e1
                       8c8a12306c671bb26db0aa296869186d843020cc
                       dfb077f749032668640f62b9c1435f94eb56e42a
                       41d9d73b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cf:37:2a:63:02:9c:cd:0a:d2:5f:87:c8:2b:86:77:48:14:28:49:f4],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]