Results

By type

          2022-11-06 05:00:36,250 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-11-06 05:00:37,205 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-11-06 05:00:37.938  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Nov 06, 2022 5:00:39 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Nov 06, 2022 5:00:39 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Nov 06, 2022 5:00:39 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Nov 06, 2022 5:00:39 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-11-06 05:00:40.427 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-11-06 05:00:40.740  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-11-06 05:00:40.912  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-11-06 05:00:41.673 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-11-06 05:00:41.676 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-11-06 05:00:41.678 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-11-06 05:00:41.682 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-11-06 05:00:41.721 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-11-06 05:00:41.725 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-11-06 05:00:41.843 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-11-06 05:00:42.584 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Nov 06, 2022 5:00:43 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-11-06 05:00:43.633  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.242 seconds (JVM running for 9.975)
Nov 06, 2022 5:01:11 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-11-06 05:01:36.644  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-06 05:01:36.650 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-06 05:01:36.692 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-06 05:01:36.695 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-06 05:01:36.709  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-06 05:01:36.711  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-06 05:01:36.711  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-06 05:01:36.713 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-06 05:01:36.713 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 05:01:36.716 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-06 05:01:36.724 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-06 05:01:36.728 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-06 05:01:36.778 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-06 05:01:36.783 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 05:01:36.784 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 05:01:36.787 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 05:01:37.452  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-06 05:01:37.455  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-06 05:01:37.456 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-06 05:01:37.458 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 05:01:37.469  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-06 05:01:37.470  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-06 05:01:37.470 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 05:01:37.471 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 05:01:37.471 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 05:01:37.488 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 05:01:37.489 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 05:01:37.489 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 05:01:37.496 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 05:01:37.497 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 05:01:37.497 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 05:01:37.499 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-06 05:01:37.535 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 684447545981728896190409730367065714107922352657
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 06 04:58:38 UTC 2022
           Final Date: Fri Nov 05 04:58:37 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [10:d8:8e:cf:52:8b:d1:2b:70:c5:01:c4:82:03:7b:86:6f:b6:37:eb],[56:66:d1:a4]
        modulus: afa1df14f95fb94cef9e561ff57db4d3cf22558d5a37eafa7fd083d112c3c0c097cf028ad374cb53af144cc9d5d2a3cf3c32722c10c69074857cb680728d02f974db3c7b0b7edebe457d68865e4e2dd26cccd0278f66c6045b0542e7af4513644a5511b5b4e63a5779d8a3ed80985fe1827717b4f22d7dddf2dc73fc447adf060558a438c5aa005a6f255e52b2998862be8a19637e803491de4044195048c1acc4b24cb5d76504ce7e389d8820ca093bc4e467a2a9a212b2a4e11b6792f3b67d2020ff9bacafac8ae5e3dd922def3ec9deb08ec2759ca9be0ae5b9cbe951aaf50326c01d97ccf6436fa40a763eb37ae2566b09c9e7fe8399a5e88db559db90ac9a3765527a229567d888b259fa8c9e1b31aefa3d200d49942cfeb84240443ddd25d771de80be7e70e5e1b21bd81d7e4ff16dc7c1cae727255a306a99cb139d8405aac3628fa27deb167b219fc9718b699a12a57fc6f2aadde7aa9b9fed46c6b4e64e351ee588cd1a5b4866453644a818db2b3ec60497a93d4668b49ddd889bd3
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5482d33caf29ca868674cb47a7291a99c54bf887
                       ce92424dec8e6d25f862df2599496a1136824974
                       2aa98c3ed6e730dbf588d9471baf9dc6438832f5
                       5ca0e46424d869eccdddb28f1dbe44f3d5b76a8d
                       2845ee1044f37613a63fa196952fd141ba156113
                       2599ae30309b0891415986adf55d95615a5769c2
                       d733c2ec56bcba196baf46d2ba391b30c092b90f
                       1facc0273e4aca948e70307bb2e0c06bc2e08de1
                       67de8bd69b38191178743903ba69fdfc65726a25
                       1f7429fe7df967eef2a40325c167433b584d038e
                       e605bc7fe80296eb569a092a4c031bde567d7355
                       1a7acd711073564cc33512506d9cdb5dc483e96e
                       63ccb3d84285f02747cbed387743f7d56f89882d
                       a3ac8303ceed35e8b343daaad7f3dc6b1269dccc
                       d32859a5cb2d5c46393a0746ed89c3b89ca12dc8
                       2444ec20ae39e4dd16568d41e02128bd7899ca64
                       1af7aab629228e19adfcbb59137f5dc264a2b745
                       54e9109564edd3b3a036ceec0768738950c89c06
                       1225f9663f7cdd9da3827a6707b4737677c7e48e
                       2b9b6cff
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d4:39:d9:5a:3b:94:ab:11:af:e5:ae:e3:ca:b7:bd:85:22:95:01:8a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-06 06:21:38.929  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-06 06:21:38.933 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-06 06:21:38.937 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-06 06:21:38.938 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-06 06:21:38.939  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-06 06:21:38.940  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-06 06:21:38.941  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-06 06:21:38.941 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-06 06:21:38.942 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-06 06:21:38.943 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-06 06:21:38.949 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-06 06:21:38.951 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 06:21:38.951 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 06:21:38.952 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 06:21:39.187  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-06 06:21:39.188  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-06 06:21:39.189 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-06 06:21:39.190 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 06:21:39.192  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-06 06:21:39.193  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-06 06:21:39.194 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 06:21:39.194 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 06:21:39.194 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 06:21:39.196 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 06:21:39.196 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 06:21:39.196 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 06:21:39.197 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 06:21:39.198 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 06:21:39.198 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 06:21:39.199 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-06 06:21:39.204 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 684447545981728896190409730367065714107922352657
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 06 04:58:38 UTC 2022
           Final Date: Fri Nov 05 04:58:37 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [10:d8:8e:cf:52:8b:d1:2b:70:c5:01:c4:82:03:7b:86:6f:b6:37:eb],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5482d33caf29ca868674cb47a7291a99c54bf887
                       ce92424dec8e6d25f862df2599496a1136824974
                       2aa98c3ed6e730dbf588d9471baf9dc6438832f5
                       5ca0e46424d869eccdddb28f1dbe44f3d5b76a8d
                       2845ee1044f37613a63fa196952fd141ba156113
                       2599ae30309b0891415986adf55d95615a5769c2
                       d733c2ec56bcba196baf46d2ba391b30c092b90f
                       1facc0273e4aca948e70307bb2e0c06bc2e08de1
                       67de8bd69b38191178743903ba69fdfc65726a25
                       1f7429fe7df967eef2a40325c167433b584d038e
                       e605bc7fe80296eb569a092a4c031bde567d7355
                       1a7acd711073564cc33512506d9cdb5dc483e96e
                       63ccb3d84285f02747cbed387743f7d56f89882d
                       a3ac8303ceed35e8b343daaad7f3dc6b1269dccc
                       d32859a5cb2d5c46393a0746ed89c3b89ca12dc8
                       2444ec20ae39e4dd16568d41e02128bd7899ca64
                       1af7aab629228e19adfcbb59137f5dc264a2b745
                       54e9109564edd3b3a036ceec0768738950c89c06
                       1225f9663f7cdd9da3827a6707b4737677c7e48e
                       2b9b6cff
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [69:2e:09:3a:36:0e:3c:91:ef:29:63:20:c4:95:b7:f6:67:34:37:b0],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-06 06:23:26.710  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-06 06:23:26.711 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-06 06:23:26.715 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-06 06:23:26.716 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-06 06:23:26.717  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-06 06:23:26.721  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-06 06:23:26.721  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-06 06:23:26.723 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-06 06:23:26.724 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-06 06:23:26.725 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-06 06:23:26.729 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-06 06:23:26.730 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 06:23:26.730 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 06:23:26.730 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 06:23:26.887  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-06 06:23:26.887  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-06 06:23:26.888 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-06 06:23:26.888 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 06:23:26.891  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-06 06:23:26.891  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-06 06:23:26.891 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 06:23:26.892 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 06:23:26.892 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 06:23:26.893 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 06:23:26.893 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 06:23:26.894 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 06:23:26.895 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 06:23:26.895 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 06:23:26.895 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 06:23:26.896 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-06 06:23:26.900 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 684447545981728896190409730367065714107922352657
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 06 04:58:38 UTC 2022
           Final Date: Fri Nov 05 04:58:37 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [10:d8:8e:cf:52:8b:d1:2b:70:c5:01:c4:82:03:7b:86:6f:b6:37:eb],[56:66:d1:a4]
        modulus: afa1df14f95fb94cef9e561ff57db4d3cf22558d5a37eafa7fd083d112c3c0c097cf028ad374cb53af144cc9d5d2a3cf3c32722c10c69074857cb680728d02f974db3c7b0b7edebe457d68865e4e2dd26cccd0278f66c6045b0542e7af4513644a5511b5b4e63a5779d8a3ed80985fe1827717b4f22d7dddf2dc73fc447adf060558a438c5aa005a6f255e52b2998862be8a19637e803491de4044195048c1acc4b24cb5d76504ce7e389d8820ca093bc4e467a2a9a212b2a4e11b6792f3b67d2020ff9bacafac8ae5e3dd922def3ec9deb08ec2759ca9be0ae5b9cbe951aaf50326c01d97ccf6436fa40a763eb37ae2566b09c9e7fe8399a5e88db559db90ac9a3765527a229567d888b259fa8c9e1b31aefa3d200d49942cfeb84240443ddd25d771de80be7e70e5e1b21bd81d7e4ff16dc7c1cae727255a306a99cb139d8405aac3628fa27deb167b219fc9718b699a12a57fc6f2aadde7aa9b9fed46c6b4e64e351ee588cd1a5b4866453644a818db2b3ec60497a93d4668b49ddd889bd3
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5482d33caf29ca868674cb47a7291a99c54bf887
                       ce92424dec8e6d25f862df2599496a1136824974
                       2aa98c3ed6e730dbf588d9471baf9dc6438832f5
                       5ca0e46424d869eccdddb28f1dbe44f3d5b76a8d
                       2845ee1044f37613a63fa196952fd141ba156113
                       2599ae30309b0891415986adf55d95615a5769c2
                       d733c2ec56bcba196baf46d2ba391b30c092b90f
                       1facc0273e4aca948e70307bb2e0c06bc2e08de1
                       67de8bd69b38191178743903ba69fdfc65726a25
                       1f7429fe7df967eef2a40325c167433b584d038e
                       e605bc7fe80296eb569a092a4c031bde567d7355
                       1a7acd711073564cc33512506d9cdb5dc483e96e
                       63ccb3d84285f02747cbed387743f7d56f89882d
                       a3ac8303ceed35e8b343daaad7f3dc6b1269dccc
                       d32859a5cb2d5c46393a0746ed89c3b89ca12dc8
                       2444ec20ae39e4dd16568d41e02128bd7899ca64
                       1af7aab629228e19adfcbb59137f5dc264a2b745
                       54e9109564edd3b3a036ceec0768738950c89c06
                       1225f9663f7cdd9da3827a6707b4737677c7e48e
                       2b9b6cff
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [57:e7:d3:4d:f3:e5:5a:62:02:b7:70:4a:80:c4:2f:e5:4b:b4:1b:bf],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-06 06:24:20.673  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-06 06:24:20.674 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-06 06:24:20.675 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-06 06:24:20.676 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-06 06:24:20.677  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-06 06:24:20.677  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-06 06:24:20.678  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-06 06:24:20.678 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-06 06:24:20.678 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-06 06:24:20.679 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-06 06:24:20.683 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-06 06:24:20.683 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 06:24:20.684 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 06:24:20.684 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 06:24:20.846  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-06 06:24:20.846  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-06 06:24:20.847 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-06 06:24:20.847 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 06:24:20.849  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-06 06:24:20.849  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-06 06:24:20.850 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 06:24:20.850 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 06:24:20.851 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 06:24:20.851 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 06:24:20.852 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 06:24:20.852 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 06:24:20.853 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 06:24:20.853 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 06:24:20.854 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 06:24:20.854 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-06 06:24:20.859 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 684447545981728896190409730367065714107922352657
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 06 04:58:38 UTC 2022
           Final Date: Fri Nov 05 04:58:37 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [10:d8:8e:cf:52:8b:d1:2b:70:c5:01:c4:82:03:7b:86:6f:b6:37:eb],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5482d33caf29ca868674cb47a7291a99c54bf887
                       ce92424dec8e6d25f862df2599496a1136824974
                       2aa98c3ed6e730dbf588d9471baf9dc6438832f5
                       5ca0e46424d869eccdddb28f1dbe44f3d5b76a8d
                       2845ee1044f37613a63fa196952fd141ba156113
                       2599ae30309b0891415986adf55d95615a5769c2
                       d733c2ec56bcba196baf46d2ba391b30c092b90f
                       1facc0273e4aca948e70307bb2e0c06bc2e08de1
                       67de8bd69b38191178743903ba69fdfc65726a25
                       1f7429fe7df967eef2a40325c167433b584d038e
                       e605bc7fe80296eb569a092a4c031bde567d7355
                       1a7acd711073564cc33512506d9cdb5dc483e96e
                       63ccb3d84285f02747cbed387743f7d56f89882d
                       a3ac8303ceed35e8b343daaad7f3dc6b1269dccc
                       d32859a5cb2d5c46393a0746ed89c3b89ca12dc8
                       2444ec20ae39e4dd16568d41e02128bd7899ca64
                       1af7aab629228e19adfcbb59137f5dc264a2b745
                       54e9109564edd3b3a036ceec0768738950c89c06
                       1225f9663f7cdd9da3827a6707b4737677c7e48e
                       2b9b6cff
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [39:1f:af:ba:30:51:53:a3:9a:a5:09:24:3f:44:53:84:0d:86:24:da],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-06 06:26:21.236  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-06 06:26:21.240 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-06 06:26:21.243 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-06 06:26:21.244 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-06 06:26:21.244  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-06 06:26:21.245  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-06 06:26:21.246  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-06 06:26:21.246 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-06 06:26:21.247 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-06 06:26:21.247 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-06 06:26:21.252 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-06 06:26:21.253 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 06:26:21.253 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 06:26:21.254 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 06:26:21.446  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-06 06:26:21.447  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-06 06:26:21.447 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-06 06:26:21.448 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 06:26:21.449  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-06 06:26:21.449  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-06 06:26:21.450 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 06:26:21.450 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 06:26:21.450 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 06:26:21.452 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 06:26:21.452 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 06:26:21.452 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 06:26:21.453 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 06:26:21.453 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 06:26:21.453 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 06:26:21.454 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-06 06:26:21.458 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 684447545981728896190409730367065714107922352657
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 06 04:58:38 UTC 2022
           Final Date: Fri Nov 05 04:58:37 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [10:d8:8e:cf:52:8b:d1:2b:70:c5:01:c4:82:03:7b:86:6f:b6:37:eb],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5482d33caf29ca868674cb47a7291a99c54bf887
                       ce92424dec8e6d25f862df2599496a1136824974
                       2aa98c3ed6e730dbf588d9471baf9dc6438832f5
                       5ca0e46424d869eccdddb28f1dbe44f3d5b76a8d
                       2845ee1044f37613a63fa196952fd141ba156113
                       2599ae30309b0891415986adf55d95615a5769c2
                       d733c2ec56bcba196baf46d2ba391b30c092b90f
                       1facc0273e4aca948e70307bb2e0c06bc2e08de1
                       67de8bd69b38191178743903ba69fdfc65726a25
                       1f7429fe7df967eef2a40325c167433b584d038e
                       e605bc7fe80296eb569a092a4c031bde567d7355
                       1a7acd711073564cc33512506d9cdb5dc483e96e
                       63ccb3d84285f02747cbed387743f7d56f89882d
                       a3ac8303ceed35e8b343daaad7f3dc6b1269dccc
                       d32859a5cb2d5c46393a0746ed89c3b89ca12dc8
                       2444ec20ae39e4dd16568d41e02128bd7899ca64
                       1af7aab629228e19adfcbb59137f5dc264a2b745
                       54e9109564edd3b3a036ceec0768738950c89c06
                       1225f9663f7cdd9da3827a6707b4737677c7e48e
                       2b9b6cff
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [de:29:ff:0d:e6:ee:3c:57:0e:9f:14:8e:48:19:69:4f:38:a5:6a:0e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-06 06:35:20.120  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-06 06:35:20.123 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-06 06:35:20.126 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-06 06:35:20.127 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-06 06:35:20.128  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-06 06:35:20.129  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-06 06:35:20.129  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-06 06:35:20.130 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-06 06:35:20.130 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-06 06:35:20.131 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-06 06:35:20.136 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-06 06:35:20.137 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 06:35:20.138 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 06:35:20.138 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 06:35:20.318  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-06 06:35:20.319  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-06 06:35:20.319 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-06 06:35:20.319 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 06:35:20.325  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-06 06:35:20.326  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-06 06:35:20.326 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 06:35:20.327 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 06:35:20.327 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 06:35:20.328 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 06:35:20.329 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 06:35:20.329 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 06:35:20.330 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 06:35:20.330 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 06:35:20.330 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 06:35:20.331 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-06 06:35:20.334 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 684447545981728896190409730367065714107922352657
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 06 04:58:38 UTC 2022
           Final Date: Fri Nov 05 04:58:37 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [10:d8:8e:cf:52:8b:d1:2b:70:c5:01:c4:82:03:7b:86:6f:b6:37:eb],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5482d33caf29ca868674cb47a7291a99c54bf887
                       ce92424dec8e6d25f862df2599496a1136824974
                       2aa98c3ed6e730dbf588d9471baf9dc6438832f5
                       5ca0e46424d869eccdddb28f1dbe44f3d5b76a8d
                       2845ee1044f37613a63fa196952fd141ba156113
                       2599ae30309b0891415986adf55d95615a5769c2
                       d733c2ec56bcba196baf46d2ba391b30c092b90f
                       1facc0273e4aca948e70307bb2e0c06bc2e08de1
                       67de8bd69b38191178743903ba69fdfc65726a25
                       1f7429fe7df967eef2a40325c167433b584d038e
                       e605bc7fe80296eb569a092a4c031bde567d7355
                       1a7acd711073564cc33512506d9cdb5dc483e96e
                       63ccb3d84285f02747cbed387743f7d56f89882d
                       a3ac8303ceed35e8b343daaad7f3dc6b1269dccc
                       d32859a5cb2d5c46393a0746ed89c3b89ca12dc8
                       2444ec20ae39e4dd16568d41e02128bd7899ca64
                       1af7aab629228e19adfcbb59137f5dc264a2b745
                       54e9109564edd3b3a036ceec0768738950c89c06
                       1225f9663f7cdd9da3827a6707b4737677c7e48e
                       2b9b6cff
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [77:79:fb:f4:4b:1b:8a:fc:58:6e:d1:11:9f:43:e9:95:7f:dd:7e:12],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-06 06:40:32.836  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-06 06:40:32.841 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-06 06:40:32.844 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-06 06:40:32.845 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-06 06:40:32.845  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-06 06:40:32.846  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-06 06:40:32.846  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-06 06:40:32.847 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-06 06:40:32.847 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-06 06:40:32.848 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-06 06:40:32.852 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-06 06:40:32.853 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 06:40:32.853 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 06:40:32.854 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 06:40:33.023  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-06 06:40:33.024  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-06 06:40:33.025 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-06 06:40:33.025 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 06:40:33.026  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-06 06:40:33.027  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-06 06:40:33.027 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 06:40:33.028 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 06:40:33.028 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 06:40:33.029 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 06:40:33.029 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 06:40:33.029 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 06:40:33.030 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 06:40:33.031 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 06:40:33.031 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 06:40:33.032 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-06 06:40:33.036 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 684447545981728896190409730367065714107922352657
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 06 04:58:38 UTC 2022
           Final Date: Fri Nov 05 04:58:37 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [10:d8:8e:cf:52:8b:d1:2b:70:c5:01:c4:82:03:7b:86:6f:b6:37:eb],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5482d33caf29ca868674cb47a7291a99c54bf887
                       ce92424dec8e6d25f862df2599496a1136824974
                       2aa98c3ed6e730dbf588d9471baf9dc6438832f5
                       5ca0e46424d869eccdddb28f1dbe44f3d5b76a8d
                       2845ee1044f37613a63fa196952fd141ba156113
                       2599ae30309b0891415986adf55d95615a5769c2
                       d733c2ec56bcba196baf46d2ba391b30c092b90f
                       1facc0273e4aca948e70307bb2e0c06bc2e08de1
                       67de8bd69b38191178743903ba69fdfc65726a25
                       1f7429fe7df967eef2a40325c167433b584d038e
                       e605bc7fe80296eb569a092a4c031bde567d7355
                       1a7acd711073564cc33512506d9cdb5dc483e96e
                       63ccb3d84285f02747cbed387743f7d56f89882d
                       a3ac8303ceed35e8b343daaad7f3dc6b1269dccc
                       d32859a5cb2d5c46393a0746ed89c3b89ca12dc8
                       2444ec20ae39e4dd16568d41e02128bd7899ca64
                       1af7aab629228e19adfcbb59137f5dc264a2b745
                       54e9109564edd3b3a036ceec0768738950c89c06
                       1225f9663f7cdd9da3827a6707b4737677c7e48e
                       2b9b6cff
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b3:62:bd:81:18:59:bc:43:eb:7d:69:bf:63:0b:15:0e:67:4f:4c:91],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-06 06:40:49.760  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-06 06:40:49.762 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-06 06:40:49.763 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-06 06:40:49.764 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-06 06:40:49.764  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-06 06:40:49.765  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-06 06:40:49.765  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-06 06:40:49.765 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-06 06:40:49.766 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-06 06:40:49.766 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-06 06:40:49.771 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-06 06:40:49.771 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 06:40:49.771 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 06:40:49.772 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 06:40:49.937  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-06 06:40:49.938  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-06 06:40:49.938 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-06 06:40:49.938 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 06:40:49.940  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-06 06:40:49.940  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-06 06:40:49.941 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 06:40:49.941 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 06:40:49.941 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 06:40:49.942 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 06:40:49.943 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 06:40:49.943 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 06:40:49.944 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 06:40:49.944 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 06:40:49.944 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 06:40:49.945 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-06 06:40:49.948 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 684447545981728896190409730367065714107922352657
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 06 04:58:38 UTC 2022
           Final Date: Fri Nov 05 04:58:37 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [10:d8:8e:cf:52:8b:d1:2b:70:c5:01:c4:82:03:7b:86:6f:b6:37:eb],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5482d33caf29ca868674cb47a7291a99c54bf887
                       ce92424dec8e6d25f862df2599496a1136824974
                       2aa98c3ed6e730dbf588d9471baf9dc6438832f5
                       5ca0e46424d869eccdddb28f1dbe44f3d5b76a8d
                       2845ee1044f37613a63fa196952fd141ba156113
                       2599ae30309b0891415986adf55d95615a5769c2
                       d733c2ec56bcba196baf46d2ba391b30c092b90f
                       1facc0273e4aca948e70307bb2e0c06bc2e08de1
                       67de8bd69b38191178743903ba69fdfc65726a25
                       1f7429fe7df967eef2a40325c167433b584d038e
                       e605bc7fe80296eb569a092a4c031bde567d7355
                       1a7acd711073564cc33512506d9cdb5dc483e96e
                       63ccb3d84285f02747cbed387743f7d56f89882d
                       a3ac8303ceed35e8b343daaad7f3dc6b1269dccc
                       d32859a5cb2d5c46393a0746ed89c3b89ca12dc8
                       2444ec20ae39e4dd16568d41e02128bd7899ca64
                       1af7aab629228e19adfcbb59137f5dc264a2b745
                       54e9109564edd3b3a036ceec0768738950c89c06
                       1225f9663f7cdd9da3827a6707b4737677c7e48e
                       2b9b6cff
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0f:de:a5:ac:ff:ca:f6:ae:1d:24:4e:01:ea:3e:35:1b:c9:d2:02:d6],[56:66:d1:a4]
        modulus: c79a6f60646c86e1952dcd12a3b05b70243ece9710c5122311fb0d88a383a1553dc1bf4e6d6ba00493a1e5acdebe2e1ba0a0ef0eafa3c9245a70be389ee7ccb967721ae4afdb578792316eb3e4ec099ba21c7c980733c6e91063492993667b4b3a1fb6b5dae497513bcf1922ec287d58bfb0197526174a595eca0058ac177b6ceb39fe4be0e7863c6c5cbadcdd8f63106ca28e756c2090da34bba5a93e8b2a79a8140a9a55b28a5f8ed58bcd8d12a0a5c46c2861b8772f4ddb1aa4e319edb6cf09ec35b5daf649a1725412fa1d83ac7cdc85a4fd8ebb2ed54c88cc4a5b41bdc098f57f928970dc21be8c50fb774241bb5ee825209adcc82c8ab9fe75dd70c9c3
public exponent: 10001

] 
2022-11-06 06:59:33.751  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-06 06:59:33.754 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-06 06:59:33.756 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-06 06:59:33.757 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-06 06:59:33.758  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-06 06:59:33.758  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-06 06:59:33.759  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-06 06:59:33.759 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-06 06:59:33.760 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-06 06:59:33.760 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-06 06:59:33.764 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-06 06:59:33.765 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 06:59:33.765 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 06:59:33.766 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 06:59:33.918  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-06 06:59:33.919  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-06 06:59:33.919 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-06 06:59:33.919 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 06:59:33.921  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-06 06:59:33.921  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-06 06:59:33.922 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 06:59:33.922 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 06:59:33.922 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 06:59:33.923 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 06:59:33.923 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 06:59:33.924 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 06:59:33.924 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 06:59:33.925 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 06:59:33.925 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 06:59:33.925 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-06 06:59:33.929 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 684447545981728896190409730367065714107922352657
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 06 04:58:38 UTC 2022
           Final Date: Fri Nov 05 04:58:37 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [10:d8:8e:cf:52:8b:d1:2b:70:c5:01:c4:82:03:7b:86:6f:b6:37:eb],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5482d33caf29ca868674cb47a7291a99c54bf887
                       ce92424dec8e6d25f862df2599496a1136824974
                       2aa98c3ed6e730dbf588d9471baf9dc6438832f5
                       5ca0e46424d869eccdddb28f1dbe44f3d5b76a8d
                       2845ee1044f37613a63fa196952fd141ba156113
                       2599ae30309b0891415986adf55d95615a5769c2
                       d733c2ec56bcba196baf46d2ba391b30c092b90f
                       1facc0273e4aca948e70307bb2e0c06bc2e08de1
                       67de8bd69b38191178743903ba69fdfc65726a25
                       1f7429fe7df967eef2a40325c167433b584d038e
                       e605bc7fe80296eb569a092a4c031bde567d7355
                       1a7acd711073564cc33512506d9cdb5dc483e96e
                       63ccb3d84285f02747cbed387743f7d56f89882d
                       a3ac8303ceed35e8b343daaad7f3dc6b1269dccc
                       d32859a5cb2d5c46393a0746ed89c3b89ca12dc8
                       2444ec20ae39e4dd16568d41e02128bd7899ca64
                       1af7aab629228e19adfcbb59137f5dc264a2b745
                       54e9109564edd3b3a036ceec0768738950c89c06
                       1225f9663f7cdd9da3827a6707b4737677c7e48e
                       2b9b6cff
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [81:03:db:84:37:a3:ea:5c:1d:e8:b2:62:be:ee:34:ff:0f:85:c5:f9],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-06 06:59:38.486  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-06 06:59:38.487 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-06 06:59:38.488 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-06 06:59:38.489 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-06 06:59:38.490  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-06 06:59:38.490  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-06 06:59:38.491  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-06 06:59:38.491 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-06 06:59:38.492 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-06 06:59:38.492 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-06 06:59:38.498 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-06 06:59:38.498 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 06:59:38.499 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-06 06:59:38.499 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 06:59:38.611  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-06 06:59:38.611  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-06 06:59:38.612 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-06 06:59:38.612 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-06 06:59:38.613  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-06 06:59:38.613  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-06 06:59:38.614 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 06:59:38.614 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 06:59:38.614 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 06:59:38.615 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 06:59:38.615 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 06:59:38.615 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 06:59:38.616 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-06 06:59:38.616 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-06 06:59:38.616 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-06 06:59:38.617 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-06 06:59:38.619 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 684447545981728896190409730367065714107922352657
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 06 04:58:38 UTC 2022
           Final Date: Fri Nov 05 04:58:37 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [10:d8:8e:cf:52:8b:d1:2b:70:c5:01:c4:82:03:7b:86:6f:b6:37:eb],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5482d33caf29ca868674cb47a7291a99c54bf887
                       ce92424dec8e6d25f862df2599496a1136824974
                       2aa98c3ed6e730dbf588d9471baf9dc6438832f5
                       5ca0e46424d869eccdddb28f1dbe44f3d5b76a8d
                       2845ee1044f37613a63fa196952fd141ba156113
                       2599ae30309b0891415986adf55d95615a5769c2
                       d733c2ec56bcba196baf46d2ba391b30c092b90f
                       1facc0273e4aca948e70307bb2e0c06bc2e08de1
                       67de8bd69b38191178743903ba69fdfc65726a25
                       1f7429fe7df967eef2a40325c167433b584d038e
                       e605bc7fe80296eb569a092a4c031bde567d7355
                       1a7acd711073564cc33512506d9cdb5dc483e96e
                       63ccb3d84285f02747cbed387743f7d56f89882d
                       a3ac8303ceed35e8b343daaad7f3dc6b1269dccc
                       d32859a5cb2d5c46393a0746ed89c3b89ca12dc8
                       2444ec20ae39e4dd16568d41e02128bd7899ca64
                       1af7aab629228e19adfcbb59137f5dc264a2b745
                       54e9109564edd3b3a036ceec0768738950c89c06
                       1225f9663f7cdd9da3827a6707b4737677c7e48e
                       2b9b6cff
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2e:4d:ee:5a:0e:64:d8:f9:0a:81:ae:29:87:a5:f3:4c:f8:ac:4c:3c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]