Results

By type

          2022-10-29 05:04:48,062 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-10-29 05:04:49,034 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-10-29 05:04:49.681  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Oct 29, 2022 5:04:51 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Oct 29, 2022 5:04:51 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Oct 29, 2022 5:04:51 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Oct 29, 2022 5:04:51 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-10-29 05:04:52.316 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-10-29 05:04:52.558  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-10-29 05:04:52.701  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-10-29 05:04:53.724 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-10-29 05:04:53.728 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-10-29 05:04:53.729 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-10-29 05:04:53.734 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-10-29 05:04:53.777 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-10-29 05:04:53.782 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-10-29 05:04:53.918 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-10-29 05:04:54.593 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Oct 29, 2022 5:04:55 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-10-29 05:04:55.642  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.341 seconds (JVM running for 9.768)
Oct 29, 2022 5:05:21 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-10-29 05:05:48.487  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-29 05:05:48.498 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-29 05:05:48.592 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-10-29 05:05:48.598 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-29 05:05:48.615  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-10-29 05:05:48.618  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-29 05:05:48.619  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-29 05:05:48.621 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-29 05:05:48.621 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-29 05:05:48.625 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-29 05:05:48.634 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-29 05:05:48.639 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-29 05:05:48.683 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-29 05:05:48.689 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-29 05:05:48.690 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-29 05:05:48.693 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-29 05:05:49.323  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-29 05:05:49.325  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-29 05:05:49.326 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-29 05:05:49.327 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-29 05:05:49.335  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-29 05:05:49.336  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-29 05:05:49.337 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-29 05:05:49.337 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-29 05:05:49.337 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-29 05:05:49.355 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-29 05:05:49.356 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-29 05:05:49.356 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-29 05:05:49.363 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-29 05:05:49.364 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-29 05:05:49.364 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-29 05:05:49.365 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-29 05:05:49.394 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 352449775603517368563057992688983305261733683049
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 29 05:02:45 UTC 2022
           Final Date: Thu Oct 28 05:02:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e8:43:d4:e2:b6:f5:7f:04:a8:a7:79:04:04:47:47:84:e4:6d:df:61],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6eb1da4b98fd024f327826ebcee04c876f8b75f7
                       e7a71d4602bccae84d4e15558455848f71e6b44a
                       33537a3a35ccd6b3a683d1fc07bc4514d98591be
                       654804b8ac4eccba17765cd16b1c01850ad0a928
                       52b995e9af8344faf5b38b1344a2ee33e34d06c2
                       5057953cce12bed27f338765e868f3f68e3df56b
                       487905e76e7e03d0a8c30d718d9f37f70c91759f
                       b253127460318f3ad1077c3025665e3e2a114b21
                       a2083ee030608cb447696bdcf7e4529ff1685e2e
                       7af3f2a0f3349778ff8634ede16450a19afa284d
                       0d92eb6fcefc1bc3da7851107cbe65c78a00a82e
                       7dfbe0395f10e8b7ea37500bf062cb59b783fcdd
                       fd40dbd9aa00d32a44ea03ba0f9abb02838b4426
                       899e23b98c37b5183734e358c04ac3d54d3bde4a
                       231d22da0d89a1ef08eb79f744e0c5df89f75098
                       a6bb6412bc4dedc33368edb4cc9ec2f06b58515c
                       c9d07817e14f251c4fe7cf6f09836e56fec6ca90
                       3d5203592e20cdcfc63149e5578ed28b78109524
                       1d6c630e58b8b0b12a0353c2468b133c62f005d5
                       50a14059
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fa:33:7e:de:4d:50:9c:57:c0:f7:1d:09:7e:c0:71:0f:d8:00:29:37],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-29 06:22:20.176  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-29 06:22:20.179 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-29 06:22:20.181 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-29 06:22:20.183 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-29 06:22:20.183  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-29 06:22:20.184  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-29 06:22:20.185  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-29 06:22:20.185 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-29 06:22:20.185 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-29 06:22:20.186 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-29 06:22:20.190 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-29 06:22:20.191 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-29 06:22:20.191 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-29 06:22:20.191 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-29 06:22:20.401  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-29 06:22:20.402  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-29 06:22:20.402 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-29 06:22:20.403 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-29 06:22:20.405  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-29 06:22:20.406  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-29 06:22:20.406 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-29 06:22:20.406 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-29 06:22:20.407 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-29 06:22:20.407 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-29 06:22:20.408 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-29 06:22:20.408 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-29 06:22:20.409 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-29 06:22:20.409 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-29 06:22:20.409 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-29 06:22:20.410 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-29 06:22:20.413 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 352449775603517368563057992688983305261733683049
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 29 05:02:45 UTC 2022
           Final Date: Thu Oct 28 05:02:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e8:43:d4:e2:b6:f5:7f:04:a8:a7:79:04:04:47:47:84:e4:6d:df:61],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6eb1da4b98fd024f327826ebcee04c876f8b75f7
                       e7a71d4602bccae84d4e15558455848f71e6b44a
                       33537a3a35ccd6b3a683d1fc07bc4514d98591be
                       654804b8ac4eccba17765cd16b1c01850ad0a928
                       52b995e9af8344faf5b38b1344a2ee33e34d06c2
                       5057953cce12bed27f338765e868f3f68e3df56b
                       487905e76e7e03d0a8c30d718d9f37f70c91759f
                       b253127460318f3ad1077c3025665e3e2a114b21
                       a2083ee030608cb447696bdcf7e4529ff1685e2e
                       7af3f2a0f3349778ff8634ede16450a19afa284d
                       0d92eb6fcefc1bc3da7851107cbe65c78a00a82e
                       7dfbe0395f10e8b7ea37500bf062cb59b783fcdd
                       fd40dbd9aa00d32a44ea03ba0f9abb02838b4426
                       899e23b98c37b5183734e358c04ac3d54d3bde4a
                       231d22da0d89a1ef08eb79f744e0c5df89f75098
                       a6bb6412bc4dedc33368edb4cc9ec2f06b58515c
                       c9d07817e14f251c4fe7cf6f09836e56fec6ca90
                       3d5203592e20cdcfc63149e5578ed28b78109524
                       1d6c630e58b8b0b12a0353c2468b133c62f005d5
                       50a14059
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [03:3c:75:48:47:f8:60:1a:16:c1:04:53:40:39:f5:04:c1:a5:b3:b9],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-29 06:23:53.119  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-29 06:23:53.123 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-29 06:23:53.130 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-10-29 06:23:53.132 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-29 06:23:53.135  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-10-29 06:23:53.136  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-29 06:23:53.137  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-29 06:23:53.139 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-29 06:23:53.140 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-29 06:23:53.140 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-29 06:23:53.144 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-29 06:23:53.145 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-29 06:23:53.145 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-29 06:23:53.145 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-29 06:23:53.296  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-29 06:23:53.297  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-29 06:23:53.297 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-29 06:23:53.298 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-29 06:23:53.300  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-29 06:23:53.301  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-29 06:23:53.301 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-29 06:23:53.302 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-29 06:23:53.302 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-29 06:23:53.303 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-29 06:23:53.303 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-29 06:23:53.304 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-29 06:23:53.304 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-29 06:23:53.305 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-29 06:23:53.306 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-29 06:23:53.307 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-29 06:23:53.312 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 352449775603517368563057992688983305261733683049
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 29 05:02:45 UTC 2022
           Final Date: Thu Oct 28 05:02:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e8:43:d4:e2:b6:f5:7f:04:a8:a7:79:04:04:47:47:84:e4:6d:df:61],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6eb1da4b98fd024f327826ebcee04c876f8b75f7
                       e7a71d4602bccae84d4e15558455848f71e6b44a
                       33537a3a35ccd6b3a683d1fc07bc4514d98591be
                       654804b8ac4eccba17765cd16b1c01850ad0a928
                       52b995e9af8344faf5b38b1344a2ee33e34d06c2
                       5057953cce12bed27f338765e868f3f68e3df56b
                       487905e76e7e03d0a8c30d718d9f37f70c91759f
                       b253127460318f3ad1077c3025665e3e2a114b21
                       a2083ee030608cb447696bdcf7e4529ff1685e2e
                       7af3f2a0f3349778ff8634ede16450a19afa284d
                       0d92eb6fcefc1bc3da7851107cbe65c78a00a82e
                       7dfbe0395f10e8b7ea37500bf062cb59b783fcdd
                       fd40dbd9aa00d32a44ea03ba0f9abb02838b4426
                       899e23b98c37b5183734e358c04ac3d54d3bde4a
                       231d22da0d89a1ef08eb79f744e0c5df89f75098
                       a6bb6412bc4dedc33368edb4cc9ec2f06b58515c
                       c9d07817e14f251c4fe7cf6f09836e56fec6ca90
                       3d5203592e20cdcfc63149e5578ed28b78109524
                       1d6c630e58b8b0b12a0353c2468b133c62f005d5
                       50a14059
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bd:1b:ba:48:93:17:10:e5:f2:8a:90:39:6c:20:13:52:5b:ef:03:c3],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-29 06:24:45.175  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-29 06:24:45.177 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-29 06:24:45.184 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-10-29 06:24:45.185 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-29 06:24:45.189  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-10-29 06:24:45.191  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-29 06:24:45.193  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-29 06:24:45.194 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-29 06:24:45.195 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-29 06:24:45.196 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-29 06:24:45.201 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-29 06:24:45.202 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-29 06:24:45.202 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-29 06:24:45.203 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-29 06:24:45.346  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-29 06:24:45.347  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-29 06:24:45.348 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-29 06:24:45.348 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-29 06:24:45.361  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-29 06:24:45.366  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-29 06:24:45.378 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-29 06:24:45.379 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-29 06:24:45.379 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-29 06:24:45.391 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-29 06:24:45.393 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-29 06:24:45.395 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-29 06:24:45.396 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-29 06:24:45.396 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-29 06:24:45.396 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-29 06:24:45.396 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-29 06:24:45.407 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 352449775603517368563057992688983305261733683049
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 29 05:02:45 UTC 2022
           Final Date: Thu Oct 28 05:02:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e8:43:d4:e2:b6:f5:7f:04:a8:a7:79:04:04:47:47:84:e4:6d:df:61],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6eb1da4b98fd024f327826ebcee04c876f8b75f7
                       e7a71d4602bccae84d4e15558455848f71e6b44a
                       33537a3a35ccd6b3a683d1fc07bc4514d98591be
                       654804b8ac4eccba17765cd16b1c01850ad0a928
                       52b995e9af8344faf5b38b1344a2ee33e34d06c2
                       5057953cce12bed27f338765e868f3f68e3df56b
                       487905e76e7e03d0a8c30d718d9f37f70c91759f
                       b253127460318f3ad1077c3025665e3e2a114b21
                       a2083ee030608cb447696bdcf7e4529ff1685e2e
                       7af3f2a0f3349778ff8634ede16450a19afa284d
                       0d92eb6fcefc1bc3da7851107cbe65c78a00a82e
                       7dfbe0395f10e8b7ea37500bf062cb59b783fcdd
                       fd40dbd9aa00d32a44ea03ba0f9abb02838b4426
                       899e23b98c37b5183734e358c04ac3d54d3bde4a
                       231d22da0d89a1ef08eb79f744e0c5df89f75098
                       a6bb6412bc4dedc33368edb4cc9ec2f06b58515c
                       c9d07817e14f251c4fe7cf6f09836e56fec6ca90
                       3d5203592e20cdcfc63149e5578ed28b78109524
                       1d6c630e58b8b0b12a0353c2468b133c62f005d5
                       50a14059
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [96:a5:64:9d:f1:5e:a7:3b:8b:47:4c:d6:ba:c6:25:50:bd:36:c7:40],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-29 06:26:56.649  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-29 06:26:56.650 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-29 06:26:56.652 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-29 06:26:56.652 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-29 06:26:56.652  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-29 06:26:56.653  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-29 06:26:56.653  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-29 06:26:56.654 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-29 06:26:56.654 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-29 06:26:56.654 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-29 06:26:56.657 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-29 06:26:56.658 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-29 06:26:56.658 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-29 06:26:56.658 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-29 06:26:56.809  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-29 06:26:56.810  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-29 06:26:56.819 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-29 06:26:56.819 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-29 06:26:56.820  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-29 06:26:56.828  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-29 06:26:56.828 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-29 06:26:56.828 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-29 06:26:56.828 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-29 06:26:56.829 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-29 06:26:56.829 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-29 06:26:56.829 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-29 06:26:56.830 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-29 06:26:56.830 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-29 06:26:56.830 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-29 06:26:56.831 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-29 06:26:56.833 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 352449775603517368563057992688983305261733683049
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 29 05:02:45 UTC 2022
           Final Date: Thu Oct 28 05:02:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e8:43:d4:e2:b6:f5:7f:04:a8:a7:79:04:04:47:47:84:e4:6d:df:61],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6eb1da4b98fd024f327826ebcee04c876f8b75f7
                       e7a71d4602bccae84d4e15558455848f71e6b44a
                       33537a3a35ccd6b3a683d1fc07bc4514d98591be
                       654804b8ac4eccba17765cd16b1c01850ad0a928
                       52b995e9af8344faf5b38b1344a2ee33e34d06c2
                       5057953cce12bed27f338765e868f3f68e3df56b
                       487905e76e7e03d0a8c30d718d9f37f70c91759f
                       b253127460318f3ad1077c3025665e3e2a114b21
                       a2083ee030608cb447696bdcf7e4529ff1685e2e
                       7af3f2a0f3349778ff8634ede16450a19afa284d
                       0d92eb6fcefc1bc3da7851107cbe65c78a00a82e
                       7dfbe0395f10e8b7ea37500bf062cb59b783fcdd
                       fd40dbd9aa00d32a44ea03ba0f9abb02838b4426
                       899e23b98c37b5183734e358c04ac3d54d3bde4a
                       231d22da0d89a1ef08eb79f744e0c5df89f75098
                       a6bb6412bc4dedc33368edb4cc9ec2f06b58515c
                       c9d07817e14f251c4fe7cf6f09836e56fec6ca90
                       3d5203592e20cdcfc63149e5578ed28b78109524
                       1d6c630e58b8b0b12a0353c2468b133c62f005d5
                       50a14059
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9c:3e:c0:4e:2e:89:86:62:8e:77:16:b7:eb:35:d4:d0:d4:30:28:5f],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-29 06:43:08.392  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-29 06:43:08.395 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-29 06:43:08.408 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-10-29 06:43:08.409 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-29 06:43:08.409  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-10-29 06:43:08.410  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-29 06:43:08.414  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-29 06:43:08.415 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-29 06:43:08.415 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-29 06:43:08.416 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-29 06:43:08.424 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-29 06:43:08.425 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-29 06:43:08.426 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-29 06:43:08.426 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-29 06:43:08.579  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-29 06:43:08.580  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-29 06:43:08.581 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-29 06:43:08.581 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-29 06:43:08.583  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-29 06:43:08.583  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-29 06:43:08.583 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-29 06:43:08.584 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-29 06:43:08.584 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-29 06:43:08.585 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-29 06:43:08.585 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-29 06:43:08.585 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-29 06:43:08.586 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-29 06:43:08.586 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-29 06:43:08.586 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-29 06:43:08.587 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-29 06:43:08.590 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 352449775603517368563057992688983305261733683049
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 29 05:02:45 UTC 2022
           Final Date: Thu Oct 28 05:02:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e8:43:d4:e2:b6:f5:7f:04:a8:a7:79:04:04:47:47:84:e4:6d:df:61],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6eb1da4b98fd024f327826ebcee04c876f8b75f7
                       e7a71d4602bccae84d4e15558455848f71e6b44a
                       33537a3a35ccd6b3a683d1fc07bc4514d98591be
                       654804b8ac4eccba17765cd16b1c01850ad0a928
                       52b995e9af8344faf5b38b1344a2ee33e34d06c2
                       5057953cce12bed27f338765e868f3f68e3df56b
                       487905e76e7e03d0a8c30d718d9f37f70c91759f
                       b253127460318f3ad1077c3025665e3e2a114b21
                       a2083ee030608cb447696bdcf7e4529ff1685e2e
                       7af3f2a0f3349778ff8634ede16450a19afa284d
                       0d92eb6fcefc1bc3da7851107cbe65c78a00a82e
                       7dfbe0395f10e8b7ea37500bf062cb59b783fcdd
                       fd40dbd9aa00d32a44ea03ba0f9abb02838b4426
                       899e23b98c37b5183734e358c04ac3d54d3bde4a
                       231d22da0d89a1ef08eb79f744e0c5df89f75098
                       a6bb6412bc4dedc33368edb4cc9ec2f06b58515c
                       c9d07817e14f251c4fe7cf6f09836e56fec6ca90
                       3d5203592e20cdcfc63149e5578ed28b78109524
                       1d6c630e58b8b0b12a0353c2468b133c62f005d5
                       50a14059
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9c:72:32:a4:96:3d:b9:07:a8:83:e5:1f:c3:7a:26:a9:b3:c4:02:cc],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-29 06:47:43.802  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-29 06:47:43.805 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-29 06:47:43.808 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-10-29 06:47:43.813 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-29 06:47:43.816  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-10-29 06:47:43.819  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-29 06:47:43.820  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-29 06:47:43.821 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-29 06:47:43.821 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-29 06:47:43.822 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-29 06:47:43.825 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-29 06:47:43.828 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-29 06:47:43.829 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-29 06:47:43.829 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-29 06:47:43.992  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-29 06:47:43.993  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-29 06:47:43.993 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-29 06:47:43.994 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-29 06:47:43.997  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-29 06:47:43.997  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-29 06:47:43.998 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-29 06:47:43.998 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-29 06:47:43.999 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-29 06:47:44.001 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-29 06:47:44.001 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-29 06:47:44.001 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-29 06:47:44.002 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-29 06:47:44.002 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-29 06:47:44.002 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-29 06:47:44.003 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-29 06:47:44.008 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 352449775603517368563057992688983305261733683049
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 29 05:02:45 UTC 2022
           Final Date: Thu Oct 28 05:02:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e8:43:d4:e2:b6:f5:7f:04:a8:a7:79:04:04:47:47:84:e4:6d:df:61],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6eb1da4b98fd024f327826ebcee04c876f8b75f7
                       e7a71d4602bccae84d4e15558455848f71e6b44a
                       33537a3a35ccd6b3a683d1fc07bc4514d98591be
                       654804b8ac4eccba17765cd16b1c01850ad0a928
                       52b995e9af8344faf5b38b1344a2ee33e34d06c2
                       5057953cce12bed27f338765e868f3f68e3df56b
                       487905e76e7e03d0a8c30d718d9f37f70c91759f
                       b253127460318f3ad1077c3025665e3e2a114b21
                       a2083ee030608cb447696bdcf7e4529ff1685e2e
                       7af3f2a0f3349778ff8634ede16450a19afa284d
                       0d92eb6fcefc1bc3da7851107cbe65c78a00a82e
                       7dfbe0395f10e8b7ea37500bf062cb59b783fcdd
                       fd40dbd9aa00d32a44ea03ba0f9abb02838b4426
                       899e23b98c37b5183734e358c04ac3d54d3bde4a
                       231d22da0d89a1ef08eb79f744e0c5df89f75098
                       a6bb6412bc4dedc33368edb4cc9ec2f06b58515c
                       c9d07817e14f251c4fe7cf6f09836e56fec6ca90
                       3d5203592e20cdcfc63149e5578ed28b78109524
                       1d6c630e58b8b0b12a0353c2468b133c62f005d5
                       50a14059
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [11:08:33:85:ca:32:91:88:2b:df:90:f5:a4:18:c7:c5:7c:b0:9f:41],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-29 06:47:59.007  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-29 06:47:59.008 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-29 06:47:59.009 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-10-29 06:47:59.010 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-29 06:47:59.010  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-10-29 06:47:59.017  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-29 06:47:59.022  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-29 06:47:59.022 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-29 06:47:59.023 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-29 06:47:59.023 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-29 06:47:59.025 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-29 06:47:59.026 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-29 06:47:59.026 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-29 06:47:59.026 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-29 06:47:59.176  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-29 06:47:59.176  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-29 06:47:59.177 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-29 06:47:59.177 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-29 06:47:59.178  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-29 06:47:59.178  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-29 06:47:59.179 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-29 06:47:59.179 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-29 06:47:59.179 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-29 06:47:59.180 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-29 06:47:59.180 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-29 06:47:59.180 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-29 06:47:59.181 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-29 06:47:59.181 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-29 06:47:59.181 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-29 06:47:59.182 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-29 06:47:59.185 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 352449775603517368563057992688983305261733683049
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 29 05:02:45 UTC 2022
           Final Date: Thu Oct 28 05:02:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e8:43:d4:e2:b6:f5:7f:04:a8:a7:79:04:04:47:47:84:e4:6d:df:61],[56:66:d1:a4]
        modulus: d80a546b171e490ed3b32a97c40078e70ed20d31c589fa9a697b5be19f0f59bddffbcdd7041f53a1e7ffece2f736837e0d322e957b58fe6cdbc58c11f83553b50f8dc7178e7262a6684b6f19ab8e5f191d70a0492202cbdb481c30979feaecef726924a2bf42abe3cbc99d53d2c19d085ed4ee199c99905cdb691305acf6c84664b70b39e1c2435432cbeb7c135469ac73a229c456d39d772410704199f70696904697c11b64ef8e1bb13828072d052321b0450c7a96853b83f99d7fd276a4fbf54f928d62db1c07239de4aa048443aaecab09a5c0e3524588ab072f1fc48cb839f53ffd4dd14365f89a475c82c4b1b2288abe0fa9ff178336d3dcb19a17eeb46d7e75ea64a1d70687e555aa3d443c337e25aa939704684b71a8c651f0ea1bd44793c06128b3490ca0248a4a09ae2b82dbba955fc6f2b5b388ddbb72a673e79ca4ffafe6adb98045986335cd0d2339342fcb3ba083e45222ed6ff53e33fd86a114af5fb1af5445806f1ba0aec399dd6cb1eff76f49d308914529ced6c00b924f
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6eb1da4b98fd024f327826ebcee04c876f8b75f7
                       e7a71d4602bccae84d4e15558455848f71e6b44a
                       33537a3a35ccd6b3a683d1fc07bc4514d98591be
                       654804b8ac4eccba17765cd16b1c01850ad0a928
                       52b995e9af8344faf5b38b1344a2ee33e34d06c2
                       5057953cce12bed27f338765e868f3f68e3df56b
                       487905e76e7e03d0a8c30d718d9f37f70c91759f
                       b253127460318f3ad1077c3025665e3e2a114b21
                       a2083ee030608cb447696bdcf7e4529ff1685e2e
                       7af3f2a0f3349778ff8634ede16450a19afa284d
                       0d92eb6fcefc1bc3da7851107cbe65c78a00a82e
                       7dfbe0395f10e8b7ea37500bf062cb59b783fcdd
                       fd40dbd9aa00d32a44ea03ba0f9abb02838b4426
                       899e23b98c37b5183734e358c04ac3d54d3bde4a
                       231d22da0d89a1ef08eb79f744e0c5df89f75098
                       a6bb6412bc4dedc33368edb4cc9ec2f06b58515c
                       c9d07817e14f251c4fe7cf6f09836e56fec6ca90
                       3d5203592e20cdcfc63149e5578ed28b78109524
                       1d6c630e58b8b0b12a0353c2468b133c62f005d5
                       50a14059
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [dc:8e:0f:10:6d:dc:65:dc:02:7f:65:f7:ae:db:30:32:8c:d9:ac:23],[56:66:d1:a4]
        modulus: c2c779552ebf1bd81c1b572b032f921a6ac6ae507970fa0e6b82895708677ccf867d3f078d529f07a7d199a08a484a8ff7b6a92efbb9dcf0a7c846f725860c8ef0237b641a4c11f5e4c0a270503947d8d33ca3946406696fb28dd9666029b74ed471562588391f665dd943af49f04e7045b7fad6126df80419cde57ac73ba8cd3c411d48422607f2073ba6a8905f5fd4f48fe4f8678887f0072dc0f2782e5d75199dd808a013e10c818dae6832c347cc31dc1ab7712f70c2d57973494338ba328d0daed9850d9ffd18803e1ac2023a61193d6b2925063e0f8eef84a0b92baf0dfa13e7c61da87aa4aa1d25dfdb43ec646a95d39af97ab4d739aad33b939d3325
public exponent: 10001

] 
2022-10-29 07:06:08.886  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-29 07:06:08.890 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-29 07:06:08.905 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-10-29 07:06:08.910 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-29 07:06:08.911  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-10-29 07:06:08.911  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-29 07:06:08.912  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-29 07:06:08.912 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-29 07:06:08.926 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-29 07:06:08.927 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-29 07:06:08.930 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-29 07:06:08.932 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-29 07:06:08.932 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-29 07:06:08.932 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-29 07:06:09.105  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-29 07:06:09.106  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-29 07:06:09.106 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-29 07:06:09.106 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-29 07:06:09.107  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-29 07:06:09.108  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-29 07:06:09.108 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-29 07:06:09.108 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-29 07:06:09.108 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-29 07:06:09.110 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-29 07:06:09.110 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-29 07:06:09.110 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-29 07:06:09.111 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-29 07:06:09.111 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-29 07:06:09.111 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-29 07:06:09.112 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-29 07:06:09.116 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 352449775603517368563057992688983305261733683049
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 29 05:02:45 UTC 2022
           Final Date: Thu Oct 28 05:02:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e8:43:d4:e2:b6:f5:7f:04:a8:a7:79:04:04:47:47:84:e4:6d:df:61],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6eb1da4b98fd024f327826ebcee04c876f8b75f7
                       e7a71d4602bccae84d4e15558455848f71e6b44a
                       33537a3a35ccd6b3a683d1fc07bc4514d98591be
                       654804b8ac4eccba17765cd16b1c01850ad0a928
                       52b995e9af8344faf5b38b1344a2ee33e34d06c2
                       5057953cce12bed27f338765e868f3f68e3df56b
                       487905e76e7e03d0a8c30d718d9f37f70c91759f
                       b253127460318f3ad1077c3025665e3e2a114b21
                       a2083ee030608cb447696bdcf7e4529ff1685e2e
                       7af3f2a0f3349778ff8634ede16450a19afa284d
                       0d92eb6fcefc1bc3da7851107cbe65c78a00a82e
                       7dfbe0395f10e8b7ea37500bf062cb59b783fcdd
                       fd40dbd9aa00d32a44ea03ba0f9abb02838b4426
                       899e23b98c37b5183734e358c04ac3d54d3bde4a
                       231d22da0d89a1ef08eb79f744e0c5df89f75098
                       a6bb6412bc4dedc33368edb4cc9ec2f06b58515c
                       c9d07817e14f251c4fe7cf6f09836e56fec6ca90
                       3d5203592e20cdcfc63149e5578ed28b78109524
                       1d6c630e58b8b0b12a0353c2468b133c62f005d5
                       50a14059
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [05:df:e6:51:2e:71:d6:27:51:54:b5:4c:95:57:b7:09:93:90:c0:15],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-29 07:06:14.768  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-29 07:06:14.768 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-29 07:06:14.769 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-10-29 07:06:14.770 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-29 07:06:14.770  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-10-29 07:06:14.770  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-29 07:06:14.770  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-29 07:06:14.771 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-29 07:06:14.771 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-29 07:06:14.771 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-29 07:06:14.774 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-29 07:06:14.775 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-29 07:06:14.775 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-29 07:06:14.775 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-29 07:06:14.909  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-29 07:06:14.909  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-29 07:06:14.909 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-29 07:06:14.910 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-29 07:06:14.911  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-29 07:06:14.911  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-29 07:06:14.911 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-29 07:06:14.912 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-29 07:06:14.912 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-29 07:06:14.912 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-29 07:06:14.913 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-29 07:06:14.913 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-29 07:06:14.913 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-29 07:06:14.913 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-29 07:06:14.913 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-29 07:06:14.914 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-29 07:06:14.916 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 352449775603517368563057992688983305261733683049
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 29 05:02:45 UTC 2022
           Final Date: Thu Oct 28 05:02:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e8:43:d4:e2:b6:f5:7f:04:a8:a7:79:04:04:47:47:84:e4:6d:df:61],[56:66:d1:a4]
        modulus: d80a546b171e490ed3b32a97c40078e70ed20d31c589fa9a697b5be19f0f59bddffbcdd7041f53a1e7ffece2f736837e0d322e957b58fe6cdbc58c11f83553b50f8dc7178e7262a6684b6f19ab8e5f191d70a0492202cbdb481c30979feaecef726924a2bf42abe3cbc99d53d2c19d085ed4ee199c99905cdb691305acf6c84664b70b39e1c2435432cbeb7c135469ac73a229c456d39d772410704199f70696904697c11b64ef8e1bb13828072d052321b0450c7a96853b83f99d7fd276a4fbf54f928d62db1c07239de4aa048443aaecab09a5c0e3524588ab072f1fc48cb839f53ffd4dd14365f89a475c82c4b1b2288abe0fa9ff178336d3dcb19a17eeb46d7e75ea64a1d70687e555aa3d443c337e25aa939704684b71a8c651f0ea1bd44793c06128b3490ca0248a4a09ae2b82dbba955fc6f2b5b388ddbb72a673e79ca4ffafe6adb98045986335cd0d2339342fcb3ba083e45222ed6ff53e33fd86a114af5fb1af5445806f1ba0aec399dd6cb1eff76f49d308914529ced6c00b924f
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6eb1da4b98fd024f327826ebcee04c876f8b75f7
                       e7a71d4602bccae84d4e15558455848f71e6b44a
                       33537a3a35ccd6b3a683d1fc07bc4514d98591be
                       654804b8ac4eccba17765cd16b1c01850ad0a928
                       52b995e9af8344faf5b38b1344a2ee33e34d06c2
                       5057953cce12bed27f338765e868f3f68e3df56b
                       487905e76e7e03d0a8c30d718d9f37f70c91759f
                       b253127460318f3ad1077c3025665e3e2a114b21
                       a2083ee030608cb447696bdcf7e4529ff1685e2e
                       7af3f2a0f3349778ff8634ede16450a19afa284d
                       0d92eb6fcefc1bc3da7851107cbe65c78a00a82e
                       7dfbe0395f10e8b7ea37500bf062cb59b783fcdd
                       fd40dbd9aa00d32a44ea03ba0f9abb02838b4426
                       899e23b98c37b5183734e358c04ac3d54d3bde4a
                       231d22da0d89a1ef08eb79f744e0c5df89f75098
                       a6bb6412bc4dedc33368edb4cc9ec2f06b58515c
                       c9d07817e14f251c4fe7cf6f09836e56fec6ca90
                       3d5203592e20cdcfc63149e5578ed28b78109524
                       1d6c630e58b8b0b12a0353c2468b133c62f005d5
                       50a14059
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2e:77:b7:ba:3d:0e:7f:3b:a2:f7:2b:40:ac:76:3d:4b:01:e1:4f:bd],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]