Results

By type

          2022-11-24 04:51:49,481 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-11-24 04:51:50,514 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-11-24 04:51:51.237  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Nov 24, 2022 4:51:53 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Nov 24, 2022 4:51:53 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Nov 24, 2022 4:51:53 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Nov 24, 2022 4:51:53 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-11-24 04:51:54.116 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-11-24 04:51:54.496  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-11-24 04:51:54.689  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-11-24 04:51:55.409 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-11-24 04:51:55.412 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-11-24 04:51:55.414 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-11-24 04:51:55.418 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-11-24 04:51:55.456 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-11-24 04:51:55.458 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-11-24 04:51:55.588 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-11-24 04:51:56.290 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Nov 24, 2022 4:51:56 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-11-24 04:51:57.189  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.547 seconds (JVM running for 10.281)
Nov 24, 2022 4:52:24 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-11-24 04:53:33.236  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-24 04:53:33.243 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-24 04:53:33.284 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-24 04:53:33.288 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-24 04:53:33.314  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-24 04:53:33.318  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-24 04:53:33.319  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-24 04:53:33.321 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-24 04:53:33.322 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-24 04:53:33.328 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-24 04:53:33.339 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-24 04:53:33.343 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-24 04:53:33.391 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-24 04:53:33.398 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-24 04:53:33.399 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-24 04:53:33.403 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-24 04:53:34.081  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-24 04:53:34.084  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-24 04:53:34.085 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-24 04:53:34.086 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-24 04:53:34.098  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-24 04:53:34.099  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-24 04:53:34.100 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-24 04:53:34.100 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-24 04:53:34.101 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-24 04:53:34.116 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-24 04:53:34.117 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-24 04:53:34.117 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-24 04:53:34.123 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-24 04:53:34.124 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-24 04:53:34.124 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-24 04:53:34.125 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-24 04:53:34.160 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 231386589127374206264312096021368326948740015247
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 24 04:49:21 UTC 2022
           Final Date: Tue Nov 23 04:49:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f9:73:bb:f6:2b:8c:ae:e7:0b:b7:c6:09:31:9c:23:ca:f0:29:01:3d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 48788f10dcee02a64c52c05dc257eeac18789ca3
                       b78c4be2fb5ec3e4efde2e46f276b0bd5127e193
                       0cdf2a483f9bab7ff7bcea077a200d0d6d5d7f1d
                       8ae461817b5e2158f218b86359216955114d1f5d
                       04c29163d9609caeb023e7ab9565f92eaf6aeca0
                       92b4c297767c02275b223e6d47d9f563c7309b01
                       440e83018fe5f19b071c9c40d8a5a17706954e4e
                       d4b355e5bd563aed7c40507637e44a3c8d39949b
                       574680d248cd548e3360214d3c3ef11028e5e9ad
                       2b50625e9fec3127992085c43536bfe4e8141a3d
                       bcfd418a4bf18be51e32d8cf2d13db39e4b4528b
                       d3f11eea732f8ea9187fe3301b5bd8d4ae0362b1
                       786fb200974f123b5ec8ab248b044bcf09f0c738
                       f9c39de0a83ddc107390d82a00a3040d4a9d9573
                       3d909cd00a1dbad10582aebe29c14b497e39db71
                       23eca7e4bd94777ddaaeb7adb7eac19a4b212569
                       086c252e96cc7817b1ab22b54f5df213766d81e6
                       e1b5eb99760a0fb9cca8f2a6250541131afce6f8
                       74c31bfa15324f7a822c69c5b377681a9348af00
                       ffd858a8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [04:8f:2f:b6:b6:f3:ea:9f:57:4b:88:67:0a:ba:90:1e:28:f6:cb:d5],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-24 06:09:01.790  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-24 06:09:01.794 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-24 06:09:01.797 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-24 06:09:01.798 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-24 06:09:01.798  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-24 06:09:01.799  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-24 06:09:01.800  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-24 06:09:01.800 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-24 06:09:01.801 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-24 06:09:01.801 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-24 06:09:01.810 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-24 06:09:01.811 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-24 06:09:01.811 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-24 06:09:01.812 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-24 06:09:02.030  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-24 06:09:02.030  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-24 06:09:02.031 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-24 06:09:02.031 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-24 06:09:02.034  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-24 06:09:02.034  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-24 06:09:02.034 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-24 06:09:02.035 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-24 06:09:02.035 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-24 06:09:02.036 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-24 06:09:02.036 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-24 06:09:02.037 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-24 06:09:02.038 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-24 06:09:02.038 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-24 06:09:02.039 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-24 06:09:02.040 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-24 06:09:02.044 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 231386589127374206264312096021368326948740015247
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 24 04:49:21 UTC 2022
           Final Date: Tue Nov 23 04:49:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f9:73:bb:f6:2b:8c:ae:e7:0b:b7:c6:09:31:9c:23:ca:f0:29:01:3d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 48788f10dcee02a64c52c05dc257eeac18789ca3
                       b78c4be2fb5ec3e4efde2e46f276b0bd5127e193
                       0cdf2a483f9bab7ff7bcea077a200d0d6d5d7f1d
                       8ae461817b5e2158f218b86359216955114d1f5d
                       04c29163d9609caeb023e7ab9565f92eaf6aeca0
                       92b4c297767c02275b223e6d47d9f563c7309b01
                       440e83018fe5f19b071c9c40d8a5a17706954e4e
                       d4b355e5bd563aed7c40507637e44a3c8d39949b
                       574680d248cd548e3360214d3c3ef11028e5e9ad
                       2b50625e9fec3127992085c43536bfe4e8141a3d
                       bcfd418a4bf18be51e32d8cf2d13db39e4b4528b
                       d3f11eea732f8ea9187fe3301b5bd8d4ae0362b1
                       786fb200974f123b5ec8ab248b044bcf09f0c738
                       f9c39de0a83ddc107390d82a00a3040d4a9d9573
                       3d909cd00a1dbad10582aebe29c14b497e39db71
                       23eca7e4bd94777ddaaeb7adb7eac19a4b212569
                       086c252e96cc7817b1ab22b54f5df213766d81e6
                       e1b5eb99760a0fb9cca8f2a6250541131afce6f8
                       74c31bfa15324f7a822c69c5b377681a9348af00
                       ffd858a8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [65:2c:e6:f3:37:45:35:5f:1d:c5:1a:1e:0b:ed:41:52:24:7c:43:e9],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-24 06:11:04.254  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-24 06:11:04.257 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-24 06:11:04.258 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-24 06:11:04.259 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-24 06:11:04.260  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-24 06:11:04.260  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-24 06:11:04.261  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-24 06:11:04.261 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-24 06:11:04.262 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-24 06:11:04.262 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-24 06:11:04.267 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-24 06:11:04.268 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-24 06:11:04.268 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-24 06:11:04.269 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-24 06:11:04.416  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-24 06:11:04.417  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-24 06:11:04.418 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-24 06:11:04.419 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-24 06:11:04.423  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-24 06:11:04.424  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-24 06:11:04.425 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-24 06:11:04.425 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-24 06:11:04.426 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-24 06:11:04.427 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-24 06:11:04.427 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-24 06:11:04.428 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-24 06:11:04.429 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-24 06:11:04.429 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-24 06:11:04.430 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-24 06:11:04.431 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-24 06:11:04.437 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 231386589127374206264312096021368326948740015247
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 24 04:49:21 UTC 2022
           Final Date: Tue Nov 23 04:49:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f9:73:bb:f6:2b:8c:ae:e7:0b:b7:c6:09:31:9c:23:ca:f0:29:01:3d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 48788f10dcee02a64c52c05dc257eeac18789ca3
                       b78c4be2fb5ec3e4efde2e46f276b0bd5127e193
                       0cdf2a483f9bab7ff7bcea077a200d0d6d5d7f1d
                       8ae461817b5e2158f218b86359216955114d1f5d
                       04c29163d9609caeb023e7ab9565f92eaf6aeca0
                       92b4c297767c02275b223e6d47d9f563c7309b01
                       440e83018fe5f19b071c9c40d8a5a17706954e4e
                       d4b355e5bd563aed7c40507637e44a3c8d39949b
                       574680d248cd548e3360214d3c3ef11028e5e9ad
                       2b50625e9fec3127992085c43536bfe4e8141a3d
                       bcfd418a4bf18be51e32d8cf2d13db39e4b4528b
                       d3f11eea732f8ea9187fe3301b5bd8d4ae0362b1
                       786fb200974f123b5ec8ab248b044bcf09f0c738
                       f9c39de0a83ddc107390d82a00a3040d4a9d9573
                       3d909cd00a1dbad10582aebe29c14b497e39db71
                       23eca7e4bd94777ddaaeb7adb7eac19a4b212569
                       086c252e96cc7817b1ab22b54f5df213766d81e6
                       e1b5eb99760a0fb9cca8f2a6250541131afce6f8
                       74c31bfa15324f7a822c69c5b377681a9348af00
                       ffd858a8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [98:39:bd:79:f4:e7:c8:c4:c5:f3:42:01:dc:42:35:92:3a:e0:cc:f9],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-24 06:12:46.290  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-24 06:12:46.291 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-24 06:12:46.293 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-24 06:12:46.293 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-24 06:12:46.294  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-24 06:12:46.294  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-24 06:12:46.295  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-24 06:12:46.295 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-24 06:12:46.296 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-24 06:12:46.296 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-24 06:12:46.300 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-24 06:12:46.300 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-24 06:12:46.300 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-24 06:12:46.301 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-24 06:12:46.515  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-24 06:12:46.516  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-24 06:12:46.517 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-24 06:12:46.517 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-24 06:12:46.519  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-24 06:12:46.519  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-24 06:12:46.520 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-24 06:12:46.520 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-24 06:12:46.521 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-24 06:12:46.521 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-24 06:12:46.522 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-24 06:12:46.522 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-24 06:12:46.524 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-24 06:12:46.524 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-24 06:12:46.524 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-24 06:12:46.525 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-24 06:12:46.529 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 231386589127374206264312096021368326948740015247
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 24 04:49:21 UTC 2022
           Final Date: Tue Nov 23 04:49:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f9:73:bb:f6:2b:8c:ae:e7:0b:b7:c6:09:31:9c:23:ca:f0:29:01:3d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 48788f10dcee02a64c52c05dc257eeac18789ca3
                       b78c4be2fb5ec3e4efde2e46f276b0bd5127e193
                       0cdf2a483f9bab7ff7bcea077a200d0d6d5d7f1d
                       8ae461817b5e2158f218b86359216955114d1f5d
                       04c29163d9609caeb023e7ab9565f92eaf6aeca0
                       92b4c297767c02275b223e6d47d9f563c7309b01
                       440e83018fe5f19b071c9c40d8a5a17706954e4e
                       d4b355e5bd563aed7c40507637e44a3c8d39949b
                       574680d248cd548e3360214d3c3ef11028e5e9ad
                       2b50625e9fec3127992085c43536bfe4e8141a3d
                       bcfd418a4bf18be51e32d8cf2d13db39e4b4528b
                       d3f11eea732f8ea9187fe3301b5bd8d4ae0362b1
                       786fb200974f123b5ec8ab248b044bcf09f0c738
                       f9c39de0a83ddc107390d82a00a3040d4a9d9573
                       3d909cd00a1dbad10582aebe29c14b497e39db71
                       23eca7e4bd94777ddaaeb7adb7eac19a4b212569
                       086c252e96cc7817b1ab22b54f5df213766d81e6
                       e1b5eb99760a0fb9cca8f2a6250541131afce6f8
                       74c31bfa15324f7a822c69c5b377681a9348af00
                       ffd858a8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [16:23:df:f1:ba:83:77:ed:75:c6:74:12:50:12:c4:a4:63:db:e9:e4],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-24 06:15:14.808  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-24 06:15:14.823 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-24 06:15:14.825 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-24 06:15:14.827 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-24 06:15:14.827  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-24 06:15:14.828  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-24 06:15:14.828  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-24 06:15:14.829 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-24 06:15:14.829 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-24 06:15:14.830 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-24 06:15:14.834 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-24 06:15:14.835 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-24 06:15:14.835 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-24 06:15:14.835 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-24 06:15:14.998  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-24 06:15:14.999  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-24 06:15:14.999 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-24 06:15:15.000 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-24 06:15:15.001  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-24 06:15:15.002  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-24 06:15:15.003 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-24 06:15:15.003 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-24 06:15:15.003 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-24 06:15:15.004 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-24 06:15:15.004 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-24 06:15:15.005 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-24 06:15:15.005 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-24 06:15:15.005 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-24 06:15:15.006 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-24 06:15:15.006 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-24 06:15:15.009 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 231386589127374206264312096021368326948740015247
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 24 04:49:21 UTC 2022
           Final Date: Tue Nov 23 04:49:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f9:73:bb:f6:2b:8c:ae:e7:0b:b7:c6:09:31:9c:23:ca:f0:29:01:3d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 48788f10dcee02a64c52c05dc257eeac18789ca3
                       b78c4be2fb5ec3e4efde2e46f276b0bd5127e193
                       0cdf2a483f9bab7ff7bcea077a200d0d6d5d7f1d
                       8ae461817b5e2158f218b86359216955114d1f5d
                       04c29163d9609caeb023e7ab9565f92eaf6aeca0
                       92b4c297767c02275b223e6d47d9f563c7309b01
                       440e83018fe5f19b071c9c40d8a5a17706954e4e
                       d4b355e5bd563aed7c40507637e44a3c8d39949b
                       574680d248cd548e3360214d3c3ef11028e5e9ad
                       2b50625e9fec3127992085c43536bfe4e8141a3d
                       bcfd418a4bf18be51e32d8cf2d13db39e4b4528b
                       d3f11eea732f8ea9187fe3301b5bd8d4ae0362b1
                       786fb200974f123b5ec8ab248b044bcf09f0c738
                       f9c39de0a83ddc107390d82a00a3040d4a9d9573
                       3d909cd00a1dbad10582aebe29c14b497e39db71
                       23eca7e4bd94777ddaaeb7adb7eac19a4b212569
                       086c252e96cc7817b1ab22b54f5df213766d81e6
                       e1b5eb99760a0fb9cca8f2a6250541131afce6f8
                       74c31bfa15324f7a822c69c5b377681a9348af00
                       ffd858a8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2c:9d:9c:80:ab:03:c6:17:4f:be:76:ed:99:7e:b8:76:5e:40:99:95],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-24 06:21:23.267  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-24 06:21:23.270 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-24 06:21:23.277 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-24 06:21:23.279 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-24 06:21:23.280  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-24 06:21:23.281  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-24 06:21:23.282  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-24 06:21:23.282 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-24 06:21:23.283 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-24 06:21:23.283 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-24 06:21:23.290 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-24 06:21:23.293 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-24 06:21:23.293 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-24 06:21:23.294 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-24 06:21:23.508  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-24 06:21:23.509  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-24 06:21:23.510 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-24 06:21:23.510 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-24 06:21:23.511  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-24 06:21:23.511  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-24 06:21:23.512 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-24 06:21:23.512 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-24 06:21:23.512 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-24 06:21:23.513 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-24 06:21:23.513 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-24 06:21:23.514 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-24 06:21:23.514 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-24 06:21:23.515 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-24 06:21:23.515 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-24 06:21:23.516 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-24 06:21:23.519 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 231386589127374206264312096021368326948740015247
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 24 04:49:21 UTC 2022
           Final Date: Tue Nov 23 04:49:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f9:73:bb:f6:2b:8c:ae:e7:0b:b7:c6:09:31:9c:23:ca:f0:29:01:3d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 48788f10dcee02a64c52c05dc257eeac18789ca3
                       b78c4be2fb5ec3e4efde2e46f276b0bd5127e193
                       0cdf2a483f9bab7ff7bcea077a200d0d6d5d7f1d
                       8ae461817b5e2158f218b86359216955114d1f5d
                       04c29163d9609caeb023e7ab9565f92eaf6aeca0
                       92b4c297767c02275b223e6d47d9f563c7309b01
                       440e83018fe5f19b071c9c40d8a5a17706954e4e
                       d4b355e5bd563aed7c40507637e44a3c8d39949b
                       574680d248cd548e3360214d3c3ef11028e5e9ad
                       2b50625e9fec3127992085c43536bfe4e8141a3d
                       bcfd418a4bf18be51e32d8cf2d13db39e4b4528b
                       d3f11eea732f8ea9187fe3301b5bd8d4ae0362b1
                       786fb200974f123b5ec8ab248b044bcf09f0c738
                       f9c39de0a83ddc107390d82a00a3040d4a9d9573
                       3d909cd00a1dbad10582aebe29c14b497e39db71
                       23eca7e4bd94777ddaaeb7adb7eac19a4b212569
                       086c252e96cc7817b1ab22b54f5df213766d81e6
                       e1b5eb99760a0fb9cca8f2a6250541131afce6f8
                       74c31bfa15324f7a822c69c5b377681a9348af00
                       ffd858a8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [97:f0:09:9e:20:5a:ec:c3:c2:b7:ef:a4:16:95:51:62:75:84:f7:42],[56:66:d1:a4]
        modulus: ceda88f4464b446afbd9154df660f12fb6f46989fe67479c498aa695cb76bd3f81b259925aa83be7c82432bf0309065f7435e6cecbfc6033ad86f4855b2680d2be3427d51a9f6ddc4882b687f7beabfc75c00d89a4e77b55b32e0fa3b0194c901bbf26b02c4040975aac6caefbfbdf1d365bf33209b3ff0c41323fdf3cfe06dc4ef6f348b0d93f45a721edbd8febfd3d2c3cd17902f9b05b9d42fabf8fad9e77187ab9b63c0ffe6d7b3f9ccd7a1e334f8eebccf3fff7e982fc8817a50e862656e66891561b5616d6cc41e45af9b75940295ba4493627c941a23201b2a5f2124c92f53e7a34b85d4dd70dd59143c0bc412b3f73218e140f490bc07ba6cc80f739
public exponent: 10001

] 
2022-11-24 06:27:39.623  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-24 06:27:39.625 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-24 06:27:39.627 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-24 06:27:39.628 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-24 06:27:39.636  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-24 06:27:39.637  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-24 06:27:39.638  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-24 06:27:39.639 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-24 06:27:39.639 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-24 06:27:39.640 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-24 06:27:39.644 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-24 06:27:39.644 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-24 06:27:39.645 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-24 06:27:39.645 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-24 06:27:39.797  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-24 06:27:39.798  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-24 06:27:39.798 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-24 06:27:39.798 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-24 06:27:39.799  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-24 06:27:39.800  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-24 06:27:39.800 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-24 06:27:39.800 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-24 06:27:39.801 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-24 06:27:39.801 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-24 06:27:39.802 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-24 06:27:39.802 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-24 06:27:39.803 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-24 06:27:39.803 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-24 06:27:39.803 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-24 06:27:39.804 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-24 06:27:39.807 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 231386589127374206264312096021368326948740015247
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 24 04:49:21 UTC 2022
           Final Date: Tue Nov 23 04:49:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f9:73:bb:f6:2b:8c:ae:e7:0b:b7:c6:09:31:9c:23:ca:f0:29:01:3d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 48788f10dcee02a64c52c05dc257eeac18789ca3
                       b78c4be2fb5ec3e4efde2e46f276b0bd5127e193
                       0cdf2a483f9bab7ff7bcea077a200d0d6d5d7f1d
                       8ae461817b5e2158f218b86359216955114d1f5d
                       04c29163d9609caeb023e7ab9565f92eaf6aeca0
                       92b4c297767c02275b223e6d47d9f563c7309b01
                       440e83018fe5f19b071c9c40d8a5a17706954e4e
                       d4b355e5bd563aed7c40507637e44a3c8d39949b
                       574680d248cd548e3360214d3c3ef11028e5e9ad
                       2b50625e9fec3127992085c43536bfe4e8141a3d
                       bcfd418a4bf18be51e32d8cf2d13db39e4b4528b
                       d3f11eea732f8ea9187fe3301b5bd8d4ae0362b1
                       786fb200974f123b5ec8ab248b044bcf09f0c738
                       f9c39de0a83ddc107390d82a00a3040d4a9d9573
                       3d909cd00a1dbad10582aebe29c14b497e39db71
                       23eca7e4bd94777ddaaeb7adb7eac19a4b212569
                       086c252e96cc7817b1ab22b54f5df213766d81e6
                       e1b5eb99760a0fb9cca8f2a6250541131afce6f8
                       74c31bfa15324f7a822c69c5b377681a9348af00
                       ffd858a8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b9:6f:74:c8:3c:70:12:b2:c5:9e:c4:49:34:a5:8c:71:d1:f0:a3:e2],[56:66:d1:a4]
        modulus: c2e26eb84e162c0c269965229b94d1acef7e0a3e7d8de5c1f62e2c48b0d0db8842b7b8f65129ae57960bb18b7a15c5ba78466a657baaff6763b46a845d67a76afa1261666ac06c4fcb515cb5ed0271c638527318826f77863ccf8c319da52c7a0231c13acadf5f289ae5a23c38c35b43e72bedb91bce96f0451ae6069f494f761d2a886a7c68805af075b530948683335b3e993d22787797b6dbb10d95469f998edeceb500f2ad8856c38190c23f1ced6433b5a9a8d9c2cf60d9966fe01e3a28e6df061a90f17ff63fe933201b9818f8570767122b3a5e6473786abdeac304d17ff536cbf3d96fe8e19cd4d71ab5d5cbbd41c318de33f416980661338bbfce6f
public exponent: 10001

] 
2022-11-24 06:27:59.297  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-24 06:27:59.298 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-24 06:27:59.300 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-24 06:27:59.301 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-24 06:27:59.302  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-24 06:27:59.302  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-24 06:27:59.303  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-24 06:27:59.303 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-24 06:27:59.304 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-24 06:27:59.304 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-24 06:27:59.308 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-24 06:27:59.309 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-24 06:27:59.309 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-24 06:27:59.309 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-24 06:27:59.428  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-24 06:27:59.429  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-24 06:27:59.430 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-24 06:27:59.430 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-24 06:27:59.432  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-24 06:27:59.432  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-24 06:27:59.433 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-24 06:27:59.433 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-24 06:27:59.434 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-24 06:27:59.434 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-24 06:27:59.435 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-24 06:27:59.435 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-24 06:27:59.437 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-24 06:27:59.437 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-24 06:27:59.438 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-24 06:27:59.439 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-24 06:27:59.445 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 231386589127374206264312096021368326948740015247
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 24 04:49:21 UTC 2022
           Final Date: Tue Nov 23 04:49:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f9:73:bb:f6:2b:8c:ae:e7:0b:b7:c6:09:31:9c:23:ca:f0:29:01:3d],[56:66:d1:a4]
        modulus: a95d3d2d66fcbeb9fb5d4da34824ba341f0b91bc60e56bae5fb756603bea9c1719677bb971b0bf5d7991b9a91d2d4aee997a8c98a6b645664f0a5532b29945b7ef1afdedacbac084d345b62f02ddc63651344a07a18edacf89d036702abbb2dc254fefe808e989f9f2c05ec7b3c90bbbaf5c30931ec958f74f878376ae2b576bde0b651260e6a7185874d4249dbe432ee7c158f527b3f2e9ab420c0c43d3b57c257db36bbf933a5c3ed0ef2f228f6bd5feaca8ac59e04248c1b010e3863c9509319ea61cd0606b451ada26dbb0aa45d5deb93196bc567dfd0e80eb73e5b5762997c257dd02df5677c9786ed72f785c40df831be9a03bd20eb3513847b85da5da5731d25e103f56567d85ffdc860fba9a61ccceb5c8bdf93455ccbedcff2749e82777e62a9b6bc3a20fce09260520d16bd05aa6727675fa02a1ba99432f33913bb01fb009078c6c965f7b6a3c950a7cceeff31b7b49956489846bcfe52c365ef297218fcbe28d31bfd7f804d1ad24d8a6927d6734fb9702ce32d3362fa87be869
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 48788f10dcee02a64c52c05dc257eeac18789ca3
                       b78c4be2fb5ec3e4efde2e46f276b0bd5127e193
                       0cdf2a483f9bab7ff7bcea077a200d0d6d5d7f1d
                       8ae461817b5e2158f218b86359216955114d1f5d
                       04c29163d9609caeb023e7ab9565f92eaf6aeca0
                       92b4c297767c02275b223e6d47d9f563c7309b01
                       440e83018fe5f19b071c9c40d8a5a17706954e4e
                       d4b355e5bd563aed7c40507637e44a3c8d39949b
                       574680d248cd548e3360214d3c3ef11028e5e9ad
                       2b50625e9fec3127992085c43536bfe4e8141a3d
                       bcfd418a4bf18be51e32d8cf2d13db39e4b4528b
                       d3f11eea732f8ea9187fe3301b5bd8d4ae0362b1
                       786fb200974f123b5ec8ab248b044bcf09f0c738
                       f9c39de0a83ddc107390d82a00a3040d4a9d9573
                       3d909cd00a1dbad10582aebe29c14b497e39db71
                       23eca7e4bd94777ddaaeb7adb7eac19a4b212569
                       086c252e96cc7817b1ab22b54f5df213766d81e6
                       e1b5eb99760a0fb9cca8f2a6250541131afce6f8
                       74c31bfa15324f7a822c69c5b377681a9348af00
                       ffd858a8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fa:53:aa:ea:51:01:91:36:82:c3:e8:7b:43:15:9a:8b:cd:cd:b7:b5],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-24 06:52:18.740  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-24 06:52:18.743 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-24 06:52:18.745 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-24 06:52:18.746 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-24 06:52:18.746  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-24 06:52:18.747  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-24 06:52:18.747  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-24 06:52:18.747 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-24 06:52:18.748 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-24 06:52:18.748 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-24 06:52:18.752 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-24 06:52:18.753 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-24 06:52:18.753 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-24 06:52:18.753 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-24 06:52:18.918  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-24 06:52:18.919  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-24 06:52:18.920 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-24 06:52:18.920 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-24 06:52:18.924  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-24 06:52:18.924  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-24 06:52:18.925 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-24 06:52:18.925 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-24 06:52:18.925 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-24 06:52:18.926 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-24 06:52:18.926 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-24 06:52:18.926 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-24 06:52:18.927 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-24 06:52:18.927 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-24 06:52:18.928 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-24 06:52:18.928 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-24 06:52:18.932 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 231386589127374206264312096021368326948740015247
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 24 04:49:21 UTC 2022
           Final Date: Tue Nov 23 04:49:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f9:73:bb:f6:2b:8c:ae:e7:0b:b7:c6:09:31:9c:23:ca:f0:29:01:3d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 48788f10dcee02a64c52c05dc257eeac18789ca3
                       b78c4be2fb5ec3e4efde2e46f276b0bd5127e193
                       0cdf2a483f9bab7ff7bcea077a200d0d6d5d7f1d
                       8ae461817b5e2158f218b86359216955114d1f5d
                       04c29163d9609caeb023e7ab9565f92eaf6aeca0
                       92b4c297767c02275b223e6d47d9f563c7309b01
                       440e83018fe5f19b071c9c40d8a5a17706954e4e
                       d4b355e5bd563aed7c40507637e44a3c8d39949b
                       574680d248cd548e3360214d3c3ef11028e5e9ad
                       2b50625e9fec3127992085c43536bfe4e8141a3d
                       bcfd418a4bf18be51e32d8cf2d13db39e4b4528b
                       d3f11eea732f8ea9187fe3301b5bd8d4ae0362b1
                       786fb200974f123b5ec8ab248b044bcf09f0c738
                       f9c39de0a83ddc107390d82a00a3040d4a9d9573
                       3d909cd00a1dbad10582aebe29c14b497e39db71
                       23eca7e4bd94777ddaaeb7adb7eac19a4b212569
                       086c252e96cc7817b1ab22b54f5df213766d81e6
                       e1b5eb99760a0fb9cca8f2a6250541131afce6f8
                       74c31bfa15324f7a822c69c5b377681a9348af00
                       ffd858a8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f0:fe:5c:b1:f7:d6:1b:09:fd:df:79:d7:58:98:e9:39:75:b1:83:d2],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-24 06:52:26.040  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-24 06:52:26.041 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-24 06:52:26.044 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-24 06:52:26.045 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-24 06:52:26.046  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-24 06:52:26.046  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-24 06:52:26.047  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-24 06:52:26.047 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-24 06:52:26.048 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-24 06:52:26.048 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-24 06:52:26.052 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-24 06:52:26.052 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-24 06:52:26.052 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-24 06:52:26.053 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-24 06:52:26.174  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-24 06:52:26.175  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-24 06:52:26.175 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-24 06:52:26.176 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-24 06:52:26.177  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-24 06:52:26.177  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-24 06:52:26.177 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-24 06:52:26.178 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-24 06:52:26.178 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-24 06:52:26.178 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-24 06:52:26.179 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-24 06:52:26.179 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-24 06:52:26.179 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-24 06:52:26.179 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-24 06:52:26.180 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-24 06:52:26.180 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-24 06:52:26.183 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 231386589127374206264312096021368326948740015247
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 24 04:49:21 UTC 2022
           Final Date: Tue Nov 23 04:49:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f9:73:bb:f6:2b:8c:ae:e7:0b:b7:c6:09:31:9c:23:ca:f0:29:01:3d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 48788f10dcee02a64c52c05dc257eeac18789ca3
                       b78c4be2fb5ec3e4efde2e46f276b0bd5127e193
                       0cdf2a483f9bab7ff7bcea077a200d0d6d5d7f1d
                       8ae461817b5e2158f218b86359216955114d1f5d
                       04c29163d9609caeb023e7ab9565f92eaf6aeca0
                       92b4c297767c02275b223e6d47d9f563c7309b01
                       440e83018fe5f19b071c9c40d8a5a17706954e4e
                       d4b355e5bd563aed7c40507637e44a3c8d39949b
                       574680d248cd548e3360214d3c3ef11028e5e9ad
                       2b50625e9fec3127992085c43536bfe4e8141a3d
                       bcfd418a4bf18be51e32d8cf2d13db39e4b4528b
                       d3f11eea732f8ea9187fe3301b5bd8d4ae0362b1
                       786fb200974f123b5ec8ab248b044bcf09f0c738
                       f9c39de0a83ddc107390d82a00a3040d4a9d9573
                       3d909cd00a1dbad10582aebe29c14b497e39db71
                       23eca7e4bd94777ddaaeb7adb7eac19a4b212569
                       086c252e96cc7817b1ab22b54f5df213766d81e6
                       e1b5eb99760a0fb9cca8f2a6250541131afce6f8
                       74c31bfa15324f7a822c69c5b377681a9348af00
                       ffd858a8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c3:bb:39:3b:4d:35:15:23:17:07:a3:4b:6a:e1:a6:3a:fd:3f:ea:8f],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]