Results

By type

          2022-11-07 05:05:25,084 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-11-07 05:05:25,980 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-11-07 05:05:26.701  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Nov 07, 2022 5:05:28 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Nov 07, 2022 5:05:28 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Nov 07, 2022 5:05:28 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Nov 07, 2022 5:05:28 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-11-07 05:05:29.241 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-11-07 05:05:29.535  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-11-07 05:05:29.712  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-11-07 05:05:30.453 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-11-07 05:05:30.456 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-11-07 05:05:30.457 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-11-07 05:05:30.463 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-11-07 05:05:30.504 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-11-07 05:05:30.508 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-11-07 05:05:30.643 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-11-07 05:05:31.216 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Nov 07, 2022 5:05:31 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-11-07 05:05:32.177  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.839 seconds (JVM running for 9.569)
Nov 07, 2022 5:06:00 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-11-07 05:06:17.303  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-07 05:06:17.312 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-07 05:06:17.361 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-07 05:06:17.364 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-07 05:06:17.379  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-07 05:06:17.381  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-07 05:06:17.382  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-07 05:06:17.383 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-07 05:06:17.384 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-07 05:06:17.387 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-07 05:06:17.395 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-07 05:06:17.398 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-07 05:06:17.450 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-07 05:06:17.456 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-07 05:06:17.457 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-07 05:06:17.460 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-07 05:06:18.291  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-07 05:06:18.295  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-07 05:06:18.296 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-07 05:06:18.297 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-07 05:06:18.307  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-07 05:06:18.308  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-07 05:06:18.309 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-07 05:06:18.309 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-07 05:06:18.310 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-07 05:06:18.326 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-07 05:06:18.326 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-07 05:06:18.327 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-07 05:06:18.333 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-07 05:06:18.334 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-07 05:06:18.334 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-07 05:06:18.335 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-07 05:06:18.368 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 529422261667631736617556737321301468915283624526
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 07 05:02:41 UTC 2022
           Final Date: Sat Nov 06 05:02:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [75:2f:98:9c:8e:65:b1:47:b4:1e:59:a6:e7:8c:43:a2:39:a5:27:54],[56:66:d1:a4]
        modulus: b7d44bede92b44c6e06f448e318c8e2c712e35d2417bc6d31e30f74df6ea2a4796bad028e42446fe8f03704e3fabdeb65df0b0e0b3099977c850798d1513d5ebbf3373bc94998e99cfcebbecfec47f7b034974a4bcc43f08f29ae3337e3120bf4c190cdfa38e9427ae87a40daa2ba9100246561d8d2f51ca22763e23bdd72ad4e096392494766338665dbf00d0cdb7fb21059a4664c9e782e31fd65d4e494e0437e2111ff3be4173afc9840ce966c00209413f9d717a657ea040586f426de1802fc02faa2b049307c9b741ca54d84f7212e91ce6f60bc5f1df453e11fd8d1b32c4b2b924f2a83e0b0c80c5eaae62382527a0196b8864402009f761c95a0966520d9f133ff98da1663601e08573344741b2d6247fd62c8a926742de4d8a5dd4caad616f5fda15724c5c06beb5a106704bd1a053e04e95d9e9d42fc946ad851fe862d54296ebbd2c3350450ce07d1687248413b623c81ca17ebe3103ff28e6638bbd8fd832bddf8c48444c100101a7980a0308f09bea44eb17deaa78289dc2fdbf
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b49986ce2c4901367867d3c6e43d88f5cf8b3efc
                       9ffd5b990f4e138d6e929311acdbd2165821d348
                       ed5ef6a9c3e3aa28c0a844c132fa0539010627eb
                       1bc4ad4ca8a909a338f3ad1b1d21af382f17c9a8
                       2fd60990748d9c449400c0da0522854ba3967229
                       13539c2dc04fa8f2b96a5be852484465e830d2fc
                       ca3ded7e469a23309b713e76c774faf25af01a9d
                       7b043f3756e3c8e6b1245abc220a67be4bb2bc56
                       03e8572e89bba30e547f416ad3bf8565cf9d081c
                       03ce9ce8804e05b43a509bc8bcfdc21a1c27f952
                       988596b1d142e885848b7c09402f3d335b3c026d
                       bc310fe85d12f5e1e15f2822b3a3451a6c371a8f
                       929338459dc0275e8787d57b3d630281f451a264
                       ffbf6f02c6ff49b1a2e2fd25c202e1656436aba9
                       62bcaf40c0852a680524b933bca75448c98448cf
                       a0178386297d7f737efa6734d990d0bb8c21be08
                       f902cb967aeaff01d8114c157bc0a5bf41581f77
                       9fa87769c9ca87ff6c01bd4e8a61576a1142f7bb
                       8069eae84003f81e5a9f0704b10f517d31869f18
                       e20b79df
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ad:37:91:96:b7:e8:6d:ed:2c:d1:fb:d2:4d:fe:1d:ea:2e:5e:fc:d6],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-07 06:24:54.315  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-07 06:24:54.318 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-07 06:24:54.322 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-07 06:24:54.323 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-07 06:24:54.324  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-07 06:24:54.325  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-07 06:24:54.325  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-07 06:24:54.326 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-07 06:24:54.327 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-07 06:24:54.327 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-07 06:24:54.332 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-07 06:24:54.334 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-07 06:24:54.334 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-07 06:24:54.334 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-07 06:24:54.571  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-07 06:24:54.572  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-07 06:24:54.572 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-07 06:24:54.573 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-07 06:24:54.575  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-07 06:24:54.576  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-07 06:24:54.576 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-07 06:24:54.577 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-07 06:24:54.578 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-07 06:24:54.580 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-07 06:24:54.581 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-07 06:24:54.581 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-07 06:24:54.583 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-07 06:24:54.583 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-07 06:24:54.584 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-07 06:24:54.585 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-07 06:24:54.589 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 529422261667631736617556737321301468915283624526
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 07 05:02:41 UTC 2022
           Final Date: Sat Nov 06 05:02:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [75:2f:98:9c:8e:65:b1:47:b4:1e:59:a6:e7:8c:43:a2:39:a5:27:54],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b49986ce2c4901367867d3c6e43d88f5cf8b3efc
                       9ffd5b990f4e138d6e929311acdbd2165821d348
                       ed5ef6a9c3e3aa28c0a844c132fa0539010627eb
                       1bc4ad4ca8a909a338f3ad1b1d21af382f17c9a8
                       2fd60990748d9c449400c0da0522854ba3967229
                       13539c2dc04fa8f2b96a5be852484465e830d2fc
                       ca3ded7e469a23309b713e76c774faf25af01a9d
                       7b043f3756e3c8e6b1245abc220a67be4bb2bc56
                       03e8572e89bba30e547f416ad3bf8565cf9d081c
                       03ce9ce8804e05b43a509bc8bcfdc21a1c27f952
                       988596b1d142e885848b7c09402f3d335b3c026d
                       bc310fe85d12f5e1e15f2822b3a3451a6c371a8f
                       929338459dc0275e8787d57b3d630281f451a264
                       ffbf6f02c6ff49b1a2e2fd25c202e1656436aba9
                       62bcaf40c0852a680524b933bca75448c98448cf
                       a0178386297d7f737efa6734d990d0bb8c21be08
                       f902cb967aeaff01d8114c157bc0a5bf41581f77
                       9fa87769c9ca87ff6c01bd4e8a61576a1142f7bb
                       8069eae84003f81e5a9f0704b10f517d31869f18
                       e20b79df
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [49:e5:2e:41:cf:7f:d9:fc:31:00:19:83:a3:7a:bd:83:4d:b3:9b:e8],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-07 06:26:42.307  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-07 06:26:42.310 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-07 06:26:42.313 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-07 06:26:42.314 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-07 06:26:42.315  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-07 06:26:42.316  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-07 06:26:42.316  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-07 06:26:42.317 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-07 06:26:42.317 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-07 06:26:42.318 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-07 06:26:42.323 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-07 06:26:42.324 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-07 06:26:42.325 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-07 06:26:42.325 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-07 06:26:42.504  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-07 06:26:42.504  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-07 06:26:42.505 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-07 06:26:42.505 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-07 06:26:42.507  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-07 06:26:42.507  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-07 06:26:42.508 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-07 06:26:42.508 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-07 06:26:42.508 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-07 06:26:42.510 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-07 06:26:42.510 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-07 06:26:42.510 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-07 06:26:42.511 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-07 06:26:42.512 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-07 06:26:42.512 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-07 06:26:42.513 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-07 06:26:42.517 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 529422261667631736617556737321301468915283624526
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 07 05:02:41 UTC 2022
           Final Date: Sat Nov 06 05:02:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [75:2f:98:9c:8e:65:b1:47:b4:1e:59:a6:e7:8c:43:a2:39:a5:27:54],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b49986ce2c4901367867d3c6e43d88f5cf8b3efc
                       9ffd5b990f4e138d6e929311acdbd2165821d348
                       ed5ef6a9c3e3aa28c0a844c132fa0539010627eb
                       1bc4ad4ca8a909a338f3ad1b1d21af382f17c9a8
                       2fd60990748d9c449400c0da0522854ba3967229
                       13539c2dc04fa8f2b96a5be852484465e830d2fc
                       ca3ded7e469a23309b713e76c774faf25af01a9d
                       7b043f3756e3c8e6b1245abc220a67be4bb2bc56
                       03e8572e89bba30e547f416ad3bf8565cf9d081c
                       03ce9ce8804e05b43a509bc8bcfdc21a1c27f952
                       988596b1d142e885848b7c09402f3d335b3c026d
                       bc310fe85d12f5e1e15f2822b3a3451a6c371a8f
                       929338459dc0275e8787d57b3d630281f451a264
                       ffbf6f02c6ff49b1a2e2fd25c202e1656436aba9
                       62bcaf40c0852a680524b933bca75448c98448cf
                       a0178386297d7f737efa6734d990d0bb8c21be08
                       f902cb967aeaff01d8114c157bc0a5bf41581f77
                       9fa87769c9ca87ff6c01bd4e8a61576a1142f7bb
                       8069eae84003f81e5a9f0704b10f517d31869f18
                       e20b79df
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ac:0c:a6:92:74:91:c4:9a:5e:4e:76:57:61:11:54:ac:32:69:5e:e5],[56:66:d1:a4]
        modulus: f61d15dd95bf1383e25dcef7ff83fd893d243ec92247bd34649fb1bec74ffb06e1ff31f0529d3c1038f467a3dc3999c24067ce4a082d7b1b3f3673a29f83e603cf7962a22c60e3832b830d3881f7ef5b0516f0c37d384aa7e930dd5b7694c6a844284351440dc4645743fcedb948ab14e0ac64692e08f4e2051849396f80c79f2834aeeb1e561d40457612bba8489ad1a7c234d739c1ad80ec7fa9ed6e3369d5083250ae88152903363a059ee4d94431e58e5683dca11caf387d579bef01dc734f71752c0edd7ec1ac36f2886d24b0438603a4055659302b206a8f7806ca4afd9efbf5eedc2b1ebe7eb630d788c91d7fffb7bf0c8ffdc45952512ae5e3e6d1a9
public exponent: 10001

] 
2022-11-07 06:27:42.551  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-07 06:27:42.568 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-07 06:27:42.590 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-07 06:27:42.605 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-07 06:27:42.606  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-07 06:27:42.606  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-07 06:27:42.607  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-07 06:27:42.607 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-07 06:27:42.608 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-07 06:27:42.609 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-07 06:27:42.617 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-07 06:27:42.618 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-07 06:27:42.620 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-07 06:27:42.620 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-07 06:27:42.748  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-07 06:27:42.758  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-07 06:27:42.759 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-07 06:27:42.759 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-07 06:27:42.779  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-07 06:27:42.782  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-07 06:27:42.786 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-07 06:27:42.786 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-07 06:27:42.787 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-07 06:27:42.788 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-07 06:27:42.788 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-07 06:27:42.788 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-07 06:27:42.789 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-07 06:27:42.793 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-07 06:27:42.794 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-07 06:27:42.795 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-07 06:27:42.808 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 529422261667631736617556737321301468915283624526
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 07 05:02:41 UTC 2022
           Final Date: Sat Nov 06 05:02:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [75:2f:98:9c:8e:65:b1:47:b4:1e:59:a6:e7:8c:43:a2:39:a5:27:54],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b49986ce2c4901367867d3c6e43d88f5cf8b3efc
                       9ffd5b990f4e138d6e929311acdbd2165821d348
                       ed5ef6a9c3e3aa28c0a844c132fa0539010627eb
                       1bc4ad4ca8a909a338f3ad1b1d21af382f17c9a8
                       2fd60990748d9c449400c0da0522854ba3967229
                       13539c2dc04fa8f2b96a5be852484465e830d2fc
                       ca3ded7e469a23309b713e76c774faf25af01a9d
                       7b043f3756e3c8e6b1245abc220a67be4bb2bc56
                       03e8572e89bba30e547f416ad3bf8565cf9d081c
                       03ce9ce8804e05b43a509bc8bcfdc21a1c27f952
                       988596b1d142e885848b7c09402f3d335b3c026d
                       bc310fe85d12f5e1e15f2822b3a3451a6c371a8f
                       929338459dc0275e8787d57b3d630281f451a264
                       ffbf6f02c6ff49b1a2e2fd25c202e1656436aba9
                       62bcaf40c0852a680524b933bca75448c98448cf
                       a0178386297d7f737efa6734d990d0bb8c21be08
                       f902cb967aeaff01d8114c157bc0a5bf41581f77
                       9fa87769c9ca87ff6c01bd4e8a61576a1142f7bb
                       8069eae84003f81e5a9f0704b10f517d31869f18
                       e20b79df
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [81:cd:0e:84:b2:a3:1c:d4:ae:87:c7:28:c0:8d:3d:54:f4:1c:c9:44],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-07 06:29:37.431  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-07 06:29:37.433 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-07 06:29:37.434 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-07 06:29:37.435 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-07 06:29:37.435  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-07 06:29:37.436  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-07 06:29:37.436  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-07 06:29:37.437 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-07 06:29:37.437 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-07 06:29:37.438 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-07 06:29:37.442 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-07 06:29:37.443 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-07 06:29:37.443 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-07 06:29:37.443 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-07 06:29:37.595  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-07 06:29:37.596  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-07 06:29:37.596 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-07 06:29:37.597 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-07 06:29:37.599  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-07 06:29:37.600  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-07 06:29:37.602 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-07 06:29:37.602 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-07 06:29:37.603 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-07 06:29:37.606 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-07 06:29:37.606 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-07 06:29:37.610 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-07 06:29:37.617 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-07 06:29:37.617 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-07 06:29:37.619 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-07 06:29:37.622 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-07 06:29:37.627 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 529422261667631736617556737321301468915283624526
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 07 05:02:41 UTC 2022
           Final Date: Sat Nov 06 05:02:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [75:2f:98:9c:8e:65:b1:47:b4:1e:59:a6:e7:8c:43:a2:39:a5:27:54],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b49986ce2c4901367867d3c6e43d88f5cf8b3efc
                       9ffd5b990f4e138d6e929311acdbd2165821d348
                       ed5ef6a9c3e3aa28c0a844c132fa0539010627eb
                       1bc4ad4ca8a909a338f3ad1b1d21af382f17c9a8
                       2fd60990748d9c449400c0da0522854ba3967229
                       13539c2dc04fa8f2b96a5be852484465e830d2fc
                       ca3ded7e469a23309b713e76c774faf25af01a9d
                       7b043f3756e3c8e6b1245abc220a67be4bb2bc56
                       03e8572e89bba30e547f416ad3bf8565cf9d081c
                       03ce9ce8804e05b43a509bc8bcfdc21a1c27f952
                       988596b1d142e885848b7c09402f3d335b3c026d
                       bc310fe85d12f5e1e15f2822b3a3451a6c371a8f
                       929338459dc0275e8787d57b3d630281f451a264
                       ffbf6f02c6ff49b1a2e2fd25c202e1656436aba9
                       62bcaf40c0852a680524b933bca75448c98448cf
                       a0178386297d7f737efa6734d990d0bb8c21be08
                       f902cb967aeaff01d8114c157bc0a5bf41581f77
                       9fa87769c9ca87ff6c01bd4e8a61576a1142f7bb
                       8069eae84003f81e5a9f0704b10f517d31869f18
                       e20b79df
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [94:1b:70:45:30:33:d7:c7:3a:47:2d:8b:97:b6:c9:18:f4:8c:9c:f4],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-07 06:44:19.667  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-07 06:44:19.670 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-07 06:44:19.672 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-07 06:44:19.673 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-07 06:44:19.674  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-07 06:44:19.675  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-07 06:44:19.675  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-07 06:44:19.676 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-07 06:44:19.676 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-07 06:44:19.677 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-07 06:44:19.682 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-07 06:44:19.683 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-07 06:44:19.683 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-07 06:44:19.684 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-07 06:44:19.854  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-07 06:44:19.855  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-07 06:44:19.855 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-07 06:44:19.856 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-07 06:44:19.857  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-07 06:44:19.858  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-07 06:44:19.858 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-07 06:44:19.859 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-07 06:44:19.859 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-07 06:44:19.860 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-07 06:44:19.860 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-07 06:44:19.861 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-07 06:44:19.862 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-07 06:44:19.863 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-07 06:44:19.863 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-07 06:44:19.864 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-07 06:44:19.874 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 529422261667631736617556737321301468915283624526
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 07 05:02:41 UTC 2022
           Final Date: Sat Nov 06 05:02:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [75:2f:98:9c:8e:65:b1:47:b4:1e:59:a6:e7:8c:43:a2:39:a5:27:54],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b49986ce2c4901367867d3c6e43d88f5cf8b3efc
                       9ffd5b990f4e138d6e929311acdbd2165821d348
                       ed5ef6a9c3e3aa28c0a844c132fa0539010627eb
                       1bc4ad4ca8a909a338f3ad1b1d21af382f17c9a8
                       2fd60990748d9c449400c0da0522854ba3967229
                       13539c2dc04fa8f2b96a5be852484465e830d2fc
                       ca3ded7e469a23309b713e76c774faf25af01a9d
                       7b043f3756e3c8e6b1245abc220a67be4bb2bc56
                       03e8572e89bba30e547f416ad3bf8565cf9d081c
                       03ce9ce8804e05b43a509bc8bcfdc21a1c27f952
                       988596b1d142e885848b7c09402f3d335b3c026d
                       bc310fe85d12f5e1e15f2822b3a3451a6c371a8f
                       929338459dc0275e8787d57b3d630281f451a264
                       ffbf6f02c6ff49b1a2e2fd25c202e1656436aba9
                       62bcaf40c0852a680524b933bca75448c98448cf
                       a0178386297d7f737efa6734d990d0bb8c21be08
                       f902cb967aeaff01d8114c157bc0a5bf41581f77
                       9fa87769c9ca87ff6c01bd4e8a61576a1142f7bb
                       8069eae84003f81e5a9f0704b10f517d31869f18
                       e20b79df
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [29:dc:f7:06:3a:dd:79:91:8d:36:ae:16:21:ef:5c:16:33:94:d0:9d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-07 06:49:17.513  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-07 06:49:17.518 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-07 06:49:17.524 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-07 06:49:17.526 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-07 06:49:17.526  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-07 06:49:17.527  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-07 06:49:17.528  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-07 06:49:17.528 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-07 06:49:17.528 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-07 06:49:17.530 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-07 06:49:17.535 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-07 06:49:17.536 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-07 06:49:17.537 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-07 06:49:17.537 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-07 06:49:17.690  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-07 06:49:17.690  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-07 06:49:17.691 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-07 06:49:17.691 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-07 06:49:17.693  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-07 06:49:17.693  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-07 06:49:17.693 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-07 06:49:17.694 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-07 06:49:17.694 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-07 06:49:17.695 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-07 06:49:17.695 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-07 06:49:17.696 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-07 06:49:17.696 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-07 06:49:17.697 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-07 06:49:17.697 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-07 06:49:17.698 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-07 06:49:17.701 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 529422261667631736617556737321301468915283624526
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 07 05:02:41 UTC 2022
           Final Date: Sat Nov 06 05:02:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [75:2f:98:9c:8e:65:b1:47:b4:1e:59:a6:e7:8c:43:a2:39:a5:27:54],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b49986ce2c4901367867d3c6e43d88f5cf8b3efc
                       9ffd5b990f4e138d6e929311acdbd2165821d348
                       ed5ef6a9c3e3aa28c0a844c132fa0539010627eb
                       1bc4ad4ca8a909a338f3ad1b1d21af382f17c9a8
                       2fd60990748d9c449400c0da0522854ba3967229
                       13539c2dc04fa8f2b96a5be852484465e830d2fc
                       ca3ded7e469a23309b713e76c774faf25af01a9d
                       7b043f3756e3c8e6b1245abc220a67be4bb2bc56
                       03e8572e89bba30e547f416ad3bf8565cf9d081c
                       03ce9ce8804e05b43a509bc8bcfdc21a1c27f952
                       988596b1d142e885848b7c09402f3d335b3c026d
                       bc310fe85d12f5e1e15f2822b3a3451a6c371a8f
                       929338459dc0275e8787d57b3d630281f451a264
                       ffbf6f02c6ff49b1a2e2fd25c202e1656436aba9
                       62bcaf40c0852a680524b933bca75448c98448cf
                       a0178386297d7f737efa6734d990d0bb8c21be08
                       f902cb967aeaff01d8114c157bc0a5bf41581f77
                       9fa87769c9ca87ff6c01bd4e8a61576a1142f7bb
                       8069eae84003f81e5a9f0704b10f517d31869f18
                       e20b79df
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d6:d0:ef:a3:aa:9e:10:aa:10:ac:b0:4f:e7:01:55:c7:cd:c7:a2:09],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-07 06:49:35.005  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-07 06:49:35.007 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-07 06:49:35.009 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-07 06:49:35.009 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-07 06:49:35.010  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-07 06:49:35.011  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-07 06:49:35.011  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-07 06:49:35.012 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-07 06:49:35.012 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-07 06:49:35.013 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-07 06:49:35.019 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-07 06:49:35.019 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-07 06:49:35.020 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-07 06:49:35.021 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-07 06:49:35.160  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-07 06:49:35.161  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-07 06:49:35.162 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-07 06:49:35.162 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-07 06:49:35.163  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-07 06:49:35.164  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-07 06:49:35.164 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-07 06:49:35.165 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-07 06:49:35.165 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-07 06:49:35.166 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-07 06:49:35.166 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-07 06:49:35.166 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-07 06:49:35.167 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-07 06:49:35.167 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-07 06:49:35.168 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-07 06:49:35.169 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-07 06:49:35.172 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 529422261667631736617556737321301468915283624526
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 07 05:02:41 UTC 2022
           Final Date: Sat Nov 06 05:02:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [75:2f:98:9c:8e:65:b1:47:b4:1e:59:a6:e7:8c:43:a2:39:a5:27:54],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b49986ce2c4901367867d3c6e43d88f5cf8b3efc
                       9ffd5b990f4e138d6e929311acdbd2165821d348
                       ed5ef6a9c3e3aa28c0a844c132fa0539010627eb
                       1bc4ad4ca8a909a338f3ad1b1d21af382f17c9a8
                       2fd60990748d9c449400c0da0522854ba3967229
                       13539c2dc04fa8f2b96a5be852484465e830d2fc
                       ca3ded7e469a23309b713e76c774faf25af01a9d
                       7b043f3756e3c8e6b1245abc220a67be4bb2bc56
                       03e8572e89bba30e547f416ad3bf8565cf9d081c
                       03ce9ce8804e05b43a509bc8bcfdc21a1c27f952
                       988596b1d142e885848b7c09402f3d335b3c026d
                       bc310fe85d12f5e1e15f2822b3a3451a6c371a8f
                       929338459dc0275e8787d57b3d630281f451a264
                       ffbf6f02c6ff49b1a2e2fd25c202e1656436aba9
                       62bcaf40c0852a680524b933bca75448c98448cf
                       a0178386297d7f737efa6734d990d0bb8c21be08
                       f902cb967aeaff01d8114c157bc0a5bf41581f77
                       9fa87769c9ca87ff6c01bd4e8a61576a1142f7bb
                       8069eae84003f81e5a9f0704b10f517d31869f18
                       e20b79df
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [21:58:5d:91:39:32:2a:66:2d:9f:24:f0:2e:cb:26:e1:d9:cb:58:b2],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-07 07:09:41.187  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-07 07:09:41.190 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-07 07:09:41.193 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-07 07:09:41.194 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-07 07:09:41.195  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-07 07:09:41.195  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-07 07:09:41.196  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-07 07:09:41.196 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-07 07:09:41.196 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-07 07:09:41.197 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-07 07:09:41.204 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-07 07:09:41.206 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-07 07:09:41.207 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-07 07:09:41.208 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-07 07:09:41.365  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-07 07:09:41.366  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-07 07:09:41.366 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-07 07:09:41.367 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-07 07:09:41.369  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-07 07:09:41.369  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-07 07:09:41.370 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-07 07:09:41.370 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-07 07:09:41.371 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-07 07:09:41.372 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-07 07:09:41.372 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-07 07:09:41.373 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-07 07:09:41.374 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-07 07:09:41.374 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-07 07:09:41.375 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-07 07:09:41.376 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-07 07:09:41.381 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 529422261667631736617556737321301468915283624526
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 07 05:02:41 UTC 2022
           Final Date: Sat Nov 06 05:02:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [75:2f:98:9c:8e:65:b1:47:b4:1e:59:a6:e7:8c:43:a2:39:a5:27:54],[56:66:d1:a4]
        modulus: b7d44bede92b44c6e06f448e318c8e2c712e35d2417bc6d31e30f74df6ea2a4796bad028e42446fe8f03704e3fabdeb65df0b0e0b3099977c850798d1513d5ebbf3373bc94998e99cfcebbecfec47f7b034974a4bcc43f08f29ae3337e3120bf4c190cdfa38e9427ae87a40daa2ba9100246561d8d2f51ca22763e23bdd72ad4e096392494766338665dbf00d0cdb7fb21059a4664c9e782e31fd65d4e494e0437e2111ff3be4173afc9840ce966c00209413f9d717a657ea040586f426de1802fc02faa2b049307c9b741ca54d84f7212e91ce6f60bc5f1df453e11fd8d1b32c4b2b924f2a83e0b0c80c5eaae62382527a0196b8864402009f761c95a0966520d9f133ff98da1663601e08573344741b2d6247fd62c8a926742de4d8a5dd4caad616f5fda15724c5c06beb5a106704bd1a053e04e95d9e9d42fc946ad851fe862d54296ebbd2c3350450ce07d1687248413b623c81ca17ebe3103ff28e6638bbd8fd832bddf8c48444c100101a7980a0308f09bea44eb17deaa78289dc2fdbf
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b49986ce2c4901367867d3c6e43d88f5cf8b3efc
                       9ffd5b990f4e138d6e929311acdbd2165821d348
                       ed5ef6a9c3e3aa28c0a844c132fa0539010627eb
                       1bc4ad4ca8a909a338f3ad1b1d21af382f17c9a8
                       2fd60990748d9c449400c0da0522854ba3967229
                       13539c2dc04fa8f2b96a5be852484465e830d2fc
                       ca3ded7e469a23309b713e76c774faf25af01a9d
                       7b043f3756e3c8e6b1245abc220a67be4bb2bc56
                       03e8572e89bba30e547f416ad3bf8565cf9d081c
                       03ce9ce8804e05b43a509bc8bcfdc21a1c27f952
                       988596b1d142e885848b7c09402f3d335b3c026d
                       bc310fe85d12f5e1e15f2822b3a3451a6c371a8f
                       929338459dc0275e8787d57b3d630281f451a264
                       ffbf6f02c6ff49b1a2e2fd25c202e1656436aba9
                       62bcaf40c0852a680524b933bca75448c98448cf
                       a0178386297d7f737efa6734d990d0bb8c21be08
                       f902cb967aeaff01d8114c157bc0a5bf41581f77
                       9fa87769c9ca87ff6c01bd4e8a61576a1142f7bb
                       8069eae84003f81e5a9f0704b10f517d31869f18
                       e20b79df
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ad:81:5d:75:b9:87:25:ac:0a:a1:8a:e5:ae:7f:f1:57:ae:5f:a6:c3],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-07 07:09:47.950  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-07 07:09:47.951 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-07 07:09:47.952 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-07 07:09:47.952 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-07 07:09:47.952  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-07 07:09:47.953  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-07 07:09:47.953  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-07 07:09:47.953 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-07 07:09:47.954 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-07 07:09:47.954 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-07 07:09:47.957 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-07 07:09:47.958 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-07 07:09:47.958 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-07 07:09:47.958 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-07 07:09:48.077  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-07 07:09:48.078  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-07 07:09:48.078 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-07 07:09:48.078 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-07 07:09:48.080  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-07 07:09:48.080  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-07 07:09:48.080 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-07 07:09:48.081 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-07 07:09:48.081 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-07 07:09:48.082 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-07 07:09:48.082 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-07 07:09:48.082 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-07 07:09:48.083 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-07 07:09:48.083 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-07 07:09:48.083 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-07 07:09:48.084 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-07 07:09:48.087 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 529422261667631736617556737321301468915283624526
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 07 05:02:41 UTC 2022
           Final Date: Sat Nov 06 05:02:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [75:2f:98:9c:8e:65:b1:47:b4:1e:59:a6:e7:8c:43:a2:39:a5:27:54],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b49986ce2c4901367867d3c6e43d88f5cf8b3efc
                       9ffd5b990f4e138d6e929311acdbd2165821d348
                       ed5ef6a9c3e3aa28c0a844c132fa0539010627eb
                       1bc4ad4ca8a909a338f3ad1b1d21af382f17c9a8
                       2fd60990748d9c449400c0da0522854ba3967229
                       13539c2dc04fa8f2b96a5be852484465e830d2fc
                       ca3ded7e469a23309b713e76c774faf25af01a9d
                       7b043f3756e3c8e6b1245abc220a67be4bb2bc56
                       03e8572e89bba30e547f416ad3bf8565cf9d081c
                       03ce9ce8804e05b43a509bc8bcfdc21a1c27f952
                       988596b1d142e885848b7c09402f3d335b3c026d
                       bc310fe85d12f5e1e15f2822b3a3451a6c371a8f
                       929338459dc0275e8787d57b3d630281f451a264
                       ffbf6f02c6ff49b1a2e2fd25c202e1656436aba9
                       62bcaf40c0852a680524b933bca75448c98448cf
                       a0178386297d7f737efa6734d990d0bb8c21be08
                       f902cb967aeaff01d8114c157bc0a5bf41581f77
                       9fa87769c9ca87ff6c01bd4e8a61576a1142f7bb
                       8069eae84003f81e5a9f0704b10f517d31869f18
                       e20b79df
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cd:a1:c6:54:cc:21:ef:b4:23:60:9b:d4:96:93:4f:46:e1:78:77:78],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]