Results

By type

          2023-01-13 05:18:23,011 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2023-01-13 05:18:24,464 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2023-01-13 05:18:25.197  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jan 13, 2023 5:18:27 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jan 13, 2023 5:18:27 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jan 13, 2023 5:18:27 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jan 13, 2023 5:18:27 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2023-01-13 05:18:27.838 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2023-01-13 05:18:28.166  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2023-01-13 05:18:28.348  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2023-01-13 05:18:29.033 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2023-01-13 05:18:29.035 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2023-01-13 05:18:29.036 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2023-01-13 05:18:29.040 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2023-01-13 05:18:29.078 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2023-01-13 05:18:29.081 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2023-01-13 05:18:29.199 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2023-01-13 05:18:29.792 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jan 13, 2023 5:18:30 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2023-01-13 05:18:30.656  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.47 seconds (JVM running for 10.165)
Jan 13, 2023 5:18:54 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2023-01-13 05:19:10.164  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-13 05:19:10.174 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-13 05:19:10.217 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2023-01-13 05:19:10.221 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-13 05:19:10.242  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2023-01-13 05:19:10.245  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-13 05:19:10.246  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-13 05:19:10.247 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-13 05:19:10.247 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-13 05:19:10.251 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-13 05:19:10.259 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-13 05:19:10.263 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-13 05:19:10.315 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-13 05:19:10.321 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-13 05:19:10.321 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-13 05:19:10.325 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-13 05:19:11.064  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-13 05:19:11.066  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-13 05:19:11.067 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-13 05:19:11.068 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-13 05:19:11.082  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-13 05:19:11.090  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-13 05:19:11.092 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-13 05:19:11.093 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-13 05:19:11.093 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-13 05:19:11.117 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-13 05:19:11.118 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-13 05:19:11.118 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-13 05:19:11.128 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-13 05:19:11.129 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-13 05:19:11.130 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-13 05:19:11.133 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-13 05:19:11.168 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 250463936742516270538741312356656936913436458449
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jan 13 05:15:00 UTC 2023
           Final Date: Wed Jan 12 05:14:59 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:2c:1c:1c:7e:43:6a:88:26:74:cc:01:b1:fe:38:d4:bf:9c:94:2a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 76f11e4a01e3f69d670c7b448e0d3736e923f485
                       f2ef691207b4b590fcc6efd3ec47874a4a1b721f
                       714c6ebe74afb413b94bd061950e68fe4f054888
                       812ec715c85e86b31e55c02538787879c2e2e18c
                       ac8828d771a64882fd40a754e4efd01daa2fd0fa
                       402d617d5a649f565a1a8279e73386a0000e07f6
                       81bbef5080f4a3ef8081b435122d1b38be87e862
                       5723430880bb367582ffa74ccb1e4c9775883dd9
                       81012887e3e4a92072f922e6c7c87e1914572dda
                       b5bfebf2d27fdb5214cdb7d65299f2f2d735640f
                       1eda3f58250d4e2555d8cd14284e411de0354129
                       6931b5c020857766e0a0706e1b883770e33f8457
                       7a93fa852d0388fbfdd7566c665f2d318a9bc8ee
                       0535f2ba682ab1a0414d3aeaabdb7dd22d627d66
                       1214169931c85c98014009521295b6248b498718
                       0d9e5e14b7785664e5d445d4edd0edae464f8266
                       4f79b605306ee17565b295117dde092a5753a3ec
                       e0ea3ab3da2fdea5d2caa8d7846d95ac6e8e7a4b
                       87e36dc0b538adecba9dd98776d5d73b4ea5aa56
                       e71fb96b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [54:f7:09:fa:b1:42:01:9c:bd:ce:21:e4:01:f8:e0:05:d9:1b:41:23],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-13 07:02:01.296  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-13 07:02:01.300 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-13 07:02:01.304 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-13 07:02:01.306 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-13 07:02:01.307  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-13 07:02:01.308  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-13 07:02:01.309  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-13 07:02:01.310 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-13 07:02:01.311 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-13 07:02:01.312 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-13 07:02:01.318 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-13 07:02:01.322 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-13 07:02:01.323 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-13 07:02:01.324 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-13 07:02:01.778  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-13 07:02:01.778  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-13 07:02:01.779 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-13 07:02:01.779 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-13 07:02:01.781  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-13 07:02:01.782  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-13 07:02:01.782 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-13 07:02:01.783 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-13 07:02:01.783 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-13 07:02:01.784 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-13 07:02:01.784 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-13 07:02:01.785 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-13 07:02:01.786 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-13 07:02:01.786 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-13 07:02:01.786 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-13 07:02:01.787 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-13 07:02:01.791 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 250463936742516270538741312356656936913436458449
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jan 13 05:15:00 UTC 2023
           Final Date: Wed Jan 12 05:14:59 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:2c:1c:1c:7e:43:6a:88:26:74:cc:01:b1:fe:38:d4:bf:9c:94:2a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 76f11e4a01e3f69d670c7b448e0d3736e923f485
                       f2ef691207b4b590fcc6efd3ec47874a4a1b721f
                       714c6ebe74afb413b94bd061950e68fe4f054888
                       812ec715c85e86b31e55c02538787879c2e2e18c
                       ac8828d771a64882fd40a754e4efd01daa2fd0fa
                       402d617d5a649f565a1a8279e73386a0000e07f6
                       81bbef5080f4a3ef8081b435122d1b38be87e862
                       5723430880bb367582ffa74ccb1e4c9775883dd9
                       81012887e3e4a92072f922e6c7c87e1914572dda
                       b5bfebf2d27fdb5214cdb7d65299f2f2d735640f
                       1eda3f58250d4e2555d8cd14284e411de0354129
                       6931b5c020857766e0a0706e1b883770e33f8457
                       7a93fa852d0388fbfdd7566c665f2d318a9bc8ee
                       0535f2ba682ab1a0414d3aeaabdb7dd22d627d66
                       1214169931c85c98014009521295b6248b498718
                       0d9e5e14b7785664e5d445d4edd0edae464f8266
                       4f79b605306ee17565b295117dde092a5753a3ec
                       e0ea3ab3da2fdea5d2caa8d7846d95ac6e8e7a4b
                       87e36dc0b538adecba9dd98776d5d73b4ea5aa56
                       e71fb96b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a7:a3:93:00:4e:41:1a:8c:49:b8:ba:17:55:31:5e:e6:5e:5b:f4:64],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-13 07:04:04.904  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-13 07:04:04.906 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-13 07:04:04.909 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-01-13 07:04:04.910 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-13 07:04:04.911  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-01-13 07:04:04.912  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-13 07:04:04.912  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-13 07:04:04.913 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-13 07:04:04.914 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-13 07:04:04.915 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-13 07:04:04.920 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-13 07:04:04.921 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-13 07:04:04.921 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-13 07:04:04.922 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-13 07:04:05.082  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-13 07:04:05.083  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-13 07:04:05.084 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-13 07:04:05.085 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-13 07:04:05.088  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-13 07:04:05.090  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-13 07:04:05.091 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-13 07:04:05.092 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-13 07:04:05.092 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-13 07:04:05.095 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-13 07:04:05.096 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-13 07:04:05.097 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-13 07:04:05.099 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-13 07:04:05.100 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-13 07:04:05.101 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-13 07:04:05.106 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-13 07:04:05.110 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 250463936742516270538741312356656936913436458449
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jan 13 05:15:00 UTC 2023
           Final Date: Wed Jan 12 05:14:59 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:2c:1c:1c:7e:43:6a:88:26:74:cc:01:b1:fe:38:d4:bf:9c:94:2a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 76f11e4a01e3f69d670c7b448e0d3736e923f485
                       f2ef691207b4b590fcc6efd3ec47874a4a1b721f
                       714c6ebe74afb413b94bd061950e68fe4f054888
                       812ec715c85e86b31e55c02538787879c2e2e18c
                       ac8828d771a64882fd40a754e4efd01daa2fd0fa
                       402d617d5a649f565a1a8279e73386a0000e07f6
                       81bbef5080f4a3ef8081b435122d1b38be87e862
                       5723430880bb367582ffa74ccb1e4c9775883dd9
                       81012887e3e4a92072f922e6c7c87e1914572dda
                       b5bfebf2d27fdb5214cdb7d65299f2f2d735640f
                       1eda3f58250d4e2555d8cd14284e411de0354129
                       6931b5c020857766e0a0706e1b883770e33f8457
                       7a93fa852d0388fbfdd7566c665f2d318a9bc8ee
                       0535f2ba682ab1a0414d3aeaabdb7dd22d627d66
                       1214169931c85c98014009521295b6248b498718
                       0d9e5e14b7785664e5d445d4edd0edae464f8266
                       4f79b605306ee17565b295117dde092a5753a3ec
                       e0ea3ab3da2fdea5d2caa8d7846d95ac6e8e7a4b
                       87e36dc0b538adecba9dd98776d5d73b4ea5aa56
                       e71fb96b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a5:7a:c5:f6:91:a4:a0:bd:25:e3:ba:4b:9b:8c:39:dc:c9:31:67:9e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-13 07:06:00.388  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-13 07:06:00.390 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-13 07:06:00.391 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-01-13 07:06:00.392 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-13 07:06:00.392  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-01-13 07:06:00.393  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-13 07:06:00.393  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-13 07:06:00.394 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-13 07:06:00.394 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-13 07:06:00.394 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-13 07:06:00.398 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-13 07:06:00.399 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-13 07:06:00.399 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-13 07:06:00.400 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-13 07:06:00.653  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-13 07:06:00.654  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-13 07:06:00.654 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-13 07:06:00.655 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-13 07:06:00.670  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-13 07:06:00.671  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-13 07:06:00.672 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-13 07:06:00.672 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-13 07:06:00.673 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-13 07:06:00.674 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-13 07:06:00.677 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-13 07:06:00.678 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-13 07:06:00.679 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-13 07:06:00.679 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-13 07:06:00.680 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-13 07:06:00.681 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-13 07:06:00.697 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 250463936742516270538741312356656936913436458449
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jan 13 05:15:00 UTC 2023
           Final Date: Wed Jan 12 05:14:59 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:2c:1c:1c:7e:43:6a:88:26:74:cc:01:b1:fe:38:d4:bf:9c:94:2a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 76f11e4a01e3f69d670c7b448e0d3736e923f485
                       f2ef691207b4b590fcc6efd3ec47874a4a1b721f
                       714c6ebe74afb413b94bd061950e68fe4f054888
                       812ec715c85e86b31e55c02538787879c2e2e18c
                       ac8828d771a64882fd40a754e4efd01daa2fd0fa
                       402d617d5a649f565a1a8279e73386a0000e07f6
                       81bbef5080f4a3ef8081b435122d1b38be87e862
                       5723430880bb367582ffa74ccb1e4c9775883dd9
                       81012887e3e4a92072f922e6c7c87e1914572dda
                       b5bfebf2d27fdb5214cdb7d65299f2f2d735640f
                       1eda3f58250d4e2555d8cd14284e411de0354129
                       6931b5c020857766e0a0706e1b883770e33f8457
                       7a93fa852d0388fbfdd7566c665f2d318a9bc8ee
                       0535f2ba682ab1a0414d3aeaabdb7dd22d627d66
                       1214169931c85c98014009521295b6248b498718
                       0d9e5e14b7785664e5d445d4edd0edae464f8266
                       4f79b605306ee17565b295117dde092a5753a3ec
                       e0ea3ab3da2fdea5d2caa8d7846d95ac6e8e7a4b
                       87e36dc0b538adecba9dd98776d5d73b4ea5aa56
                       e71fb96b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [49:57:93:c6:19:13:78:28:43:08:7e:d5:57:cc:e6:d3:99:f5:6b:b7],[56:66:d1:a4]
        modulus: d3b10dcdbbf2f3d9eeb8c5256997dee42b13e346cbdb6857b32829f83f5f10c3a7603e5275c9089fc80b80627c15364e98c30505a9d2a650b64f6d4e3f0d623ff878fae5ece1954a36acd30a0c6699a9d8ebe7e8b760caaacdef913fbd05b819dfb26ceae9115abaeb6d99d66da9bf5a0fee68493d8194f69223893dc9cb9ab6721b01f879e965e3a2bd934e3a60fb9f87ad2338447f58a7d98cea50a9a0302a0db02f3db6b09b0bcb7bdc992dd7fb1eb4324622ee2f212b56619a028e7acc5bff75f2841c41d2e07c3b1d8c16b444f01d21588a2a3f5b562573009b1950c0f8b69d2bd907c7a03d703b57dfdba6c2f1ec7d1294b38d0c81c00d80c6cd764729
public exponent: 10001

] 
2023-01-13 07:09:37.505  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-13 07:09:37.508 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-13 07:09:37.510 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-13 07:09:37.511 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-13 07:09:37.511  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-13 07:09:37.512  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-13 07:09:37.513  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-13 07:09:37.513 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-13 07:09:37.514 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-13 07:09:37.514 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-13 07:09:37.518 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-13 07:09:37.519 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-13 07:09:37.520 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-13 07:09:37.520 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-13 07:09:37.755  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-13 07:09:37.756  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-13 07:09:37.757 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-13 07:09:37.757 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-13 07:09:37.759  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-13 07:09:37.760  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-13 07:09:37.760 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-13 07:09:37.761 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-13 07:09:37.761 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-13 07:09:37.763 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-13 07:09:37.764 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-13 07:09:37.764 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-13 07:09:37.765 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-13 07:09:37.765 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-13 07:09:37.766 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-13 07:09:37.767 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-13 07:09:37.771 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 250463936742516270538741312356656936913436458449
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jan 13 05:15:00 UTC 2023
           Final Date: Wed Jan 12 05:14:59 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:2c:1c:1c:7e:43:6a:88:26:74:cc:01:b1:fe:38:d4:bf:9c:94:2a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 76f11e4a01e3f69d670c7b448e0d3736e923f485
                       f2ef691207b4b590fcc6efd3ec47874a4a1b721f
                       714c6ebe74afb413b94bd061950e68fe4f054888
                       812ec715c85e86b31e55c02538787879c2e2e18c
                       ac8828d771a64882fd40a754e4efd01daa2fd0fa
                       402d617d5a649f565a1a8279e73386a0000e07f6
                       81bbef5080f4a3ef8081b435122d1b38be87e862
                       5723430880bb367582ffa74ccb1e4c9775883dd9
                       81012887e3e4a92072f922e6c7c87e1914572dda
                       b5bfebf2d27fdb5214cdb7d65299f2f2d735640f
                       1eda3f58250d4e2555d8cd14284e411de0354129
                       6931b5c020857766e0a0706e1b883770e33f8457
                       7a93fa852d0388fbfdd7566c665f2d318a9bc8ee
                       0535f2ba682ab1a0414d3aeaabdb7dd22d627d66
                       1214169931c85c98014009521295b6248b498718
                       0d9e5e14b7785664e5d445d4edd0edae464f8266
                       4f79b605306ee17565b295117dde092a5753a3ec
                       e0ea3ab3da2fdea5d2caa8d7846d95ac6e8e7a4b
                       87e36dc0b538adecba9dd98776d5d73b4ea5aa56
                       e71fb96b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [50:97:2b:ba:36:05:c7:75:a8:5e:55:9a:05:b9:17:0c:53:d6:36:17],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-13 07:18:11.457  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-13 07:18:11.460 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-13 07:18:11.463 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-01-13 07:18:11.465 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-13 07:18:11.466  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-01-13 07:18:11.468  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-13 07:18:11.469  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-13 07:18:11.470 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-13 07:18:11.471 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-13 07:18:11.472 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-13 07:18:11.481 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-13 07:18:11.482 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-13 07:18:11.482 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-13 07:18:11.483 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-13 07:18:11.714  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-13 07:18:11.714  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-13 07:18:11.715 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-13 07:18:11.715 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-13 07:18:11.716  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-13 07:18:11.716  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-13 07:18:11.717 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-13 07:18:11.717 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-13 07:18:11.717 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-13 07:18:11.718 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-13 07:18:11.718 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-13 07:18:11.719 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-13 07:18:11.719 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-13 07:18:11.720 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-13 07:18:11.720 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-13 07:18:11.721 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-13 07:18:11.724 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 250463936742516270538741312356656936913436458449
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jan 13 05:15:00 UTC 2023
           Final Date: Wed Jan 12 05:14:59 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:2c:1c:1c:7e:43:6a:88:26:74:cc:01:b1:fe:38:d4:bf:9c:94:2a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 76f11e4a01e3f69d670c7b448e0d3736e923f485
                       f2ef691207b4b590fcc6efd3ec47874a4a1b721f
                       714c6ebe74afb413b94bd061950e68fe4f054888
                       812ec715c85e86b31e55c02538787879c2e2e18c
                       ac8828d771a64882fd40a754e4efd01daa2fd0fa
                       402d617d5a649f565a1a8279e73386a0000e07f6
                       81bbef5080f4a3ef8081b435122d1b38be87e862
                       5723430880bb367582ffa74ccb1e4c9775883dd9
                       81012887e3e4a92072f922e6c7c87e1914572dda
                       b5bfebf2d27fdb5214cdb7d65299f2f2d735640f
                       1eda3f58250d4e2555d8cd14284e411de0354129
                       6931b5c020857766e0a0706e1b883770e33f8457
                       7a93fa852d0388fbfdd7566c665f2d318a9bc8ee
                       0535f2ba682ab1a0414d3aeaabdb7dd22d627d66
                       1214169931c85c98014009521295b6248b498718
                       0d9e5e14b7785664e5d445d4edd0edae464f8266
                       4f79b605306ee17565b295117dde092a5753a3ec
                       e0ea3ab3da2fdea5d2caa8d7846d95ac6e8e7a4b
                       87e36dc0b538adecba9dd98776d5d73b4ea5aa56
                       e71fb96b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4b:85:d4:c9:38:75:06:44:96:38:0f:cc:0c:56:18:df:c1:51:2e:2f],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-13 07:24:12.310  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-13 07:24:12.312 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-13 07:24:12.318 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-13 07:24:12.324 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-13 07:24:12.324  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-13 07:24:12.325  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-13 07:24:12.325  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-13 07:24:12.326 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-13 07:24:12.326 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-13 07:24:12.327 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-13 07:24:12.332 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-13 07:24:12.333 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-13 07:24:12.333 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-13 07:24:12.333 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-13 07:24:12.568  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-13 07:24:12.569  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-13 07:24:12.569 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-13 07:24:12.570 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-13 07:24:12.571  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-13 07:24:12.571  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-13 07:24:12.572 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-13 07:24:12.572 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-13 07:24:12.573 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-13 07:24:12.574 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-13 07:24:12.574 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-13 07:24:12.575 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-13 07:24:12.576 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-13 07:24:12.576 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-13 07:24:12.588 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-13 07:24:12.602 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-13 07:24:12.646 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 250463936742516270538741312356656936913436458449
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jan 13 05:15:00 UTC 2023
           Final Date: Wed Jan 12 05:14:59 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:2c:1c:1c:7e:43:6a:88:26:74:cc:01:b1:fe:38:d4:bf:9c:94:2a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 76f11e4a01e3f69d670c7b448e0d3736e923f485
                       f2ef691207b4b590fcc6efd3ec47874a4a1b721f
                       714c6ebe74afb413b94bd061950e68fe4f054888
                       812ec715c85e86b31e55c02538787879c2e2e18c
                       ac8828d771a64882fd40a754e4efd01daa2fd0fa
                       402d617d5a649f565a1a8279e73386a0000e07f6
                       81bbef5080f4a3ef8081b435122d1b38be87e862
                       5723430880bb367582ffa74ccb1e4c9775883dd9
                       81012887e3e4a92072f922e6c7c87e1914572dda
                       b5bfebf2d27fdb5214cdb7d65299f2f2d735640f
                       1eda3f58250d4e2555d8cd14284e411de0354129
                       6931b5c020857766e0a0706e1b883770e33f8457
                       7a93fa852d0388fbfdd7566c665f2d318a9bc8ee
                       0535f2ba682ab1a0414d3aeaabdb7dd22d627d66
                       1214169931c85c98014009521295b6248b498718
                       0d9e5e14b7785664e5d445d4edd0edae464f8266
                       4f79b605306ee17565b295117dde092a5753a3ec
                       e0ea3ab3da2fdea5d2caa8d7846d95ac6e8e7a4b
                       87e36dc0b538adecba9dd98776d5d73b4ea5aa56
                       e71fb96b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [51:70:04:2f:8a:6b:9c:ab:70:c0:89:01:09:f1:2d:af:52:12:e9:8a],[56:66:d1:a4]
        modulus: eb6500df072cdf3082994a5c91d6bb7811e92adc6e4e5c510d2dad23b7f9b81cf4f797908a53c8eaf30944d97b1338090dce285a559dfdc6de75a31396d5a90dcaed8405a33c8218f09bfd7165f4e081c9669ba7b22dd7c2207f724462c1a946cd866caf37ab7523c8f9f9fc6bb3b15c1420de96ff0f3ea3760b694a385d76f2fd803f6e9ccb7e09cab838526d3e05587175fcd02bdaae565a0668e2d130cd32d90d1777bbfed3811ede4d7a05d225fd79d3ad10be4353d909f7aae3715119e0712a74bc579245f38abba6efdef8b7ee6f90eb8800c83e7d67f0a291c82934bda9c7fa7e3aeac6babd1364a47a495245eb17168911b4fba695d5f00f6df618c3
public exponent: 10001

] 
2023-01-13 07:24:30.030  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-13 07:24:30.031 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-13 07:24:30.032 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-13 07:24:30.033 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-13 07:24:30.033  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-13 07:24:30.034  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-13 07:24:30.035  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-13 07:24:30.035 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-13 07:24:30.035 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-13 07:24:30.036 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-13 07:24:30.042 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-13 07:24:30.043 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-13 07:24:30.043 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-13 07:24:30.044 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-13 07:24:30.326  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-13 07:24:30.326  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-13 07:24:30.327 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-13 07:24:30.327 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-13 07:24:30.328  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-13 07:24:30.329  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-13 07:24:30.329 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-13 07:24:30.330 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-13 07:24:30.330 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-13 07:24:30.331 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-13 07:24:30.331 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-13 07:24:30.331 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-13 07:24:30.332 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-13 07:24:30.332 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-13 07:24:30.333 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-13 07:24:30.333 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-13 07:24:30.336 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 250463936742516270538741312356656936913436458449
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jan 13 05:15:00 UTC 2023
           Final Date: Wed Jan 12 05:14:59 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:2c:1c:1c:7e:43:6a:88:26:74:cc:01:b1:fe:38:d4:bf:9c:94:2a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 76f11e4a01e3f69d670c7b448e0d3736e923f485
                       f2ef691207b4b590fcc6efd3ec47874a4a1b721f
                       714c6ebe74afb413b94bd061950e68fe4f054888
                       812ec715c85e86b31e55c02538787879c2e2e18c
                       ac8828d771a64882fd40a754e4efd01daa2fd0fa
                       402d617d5a649f565a1a8279e73386a0000e07f6
                       81bbef5080f4a3ef8081b435122d1b38be87e862
                       5723430880bb367582ffa74ccb1e4c9775883dd9
                       81012887e3e4a92072f922e6c7c87e1914572dda
                       b5bfebf2d27fdb5214cdb7d65299f2f2d735640f
                       1eda3f58250d4e2555d8cd14284e411de0354129
                       6931b5c020857766e0a0706e1b883770e33f8457
                       7a93fa852d0388fbfdd7566c665f2d318a9bc8ee
                       0535f2ba682ab1a0414d3aeaabdb7dd22d627d66
                       1214169931c85c98014009521295b6248b498718
                       0d9e5e14b7785664e5d445d4edd0edae464f8266
                       4f79b605306ee17565b295117dde092a5753a3ec
                       e0ea3ab3da2fdea5d2caa8d7846d95ac6e8e7a4b
                       87e36dc0b538adecba9dd98776d5d73b4ea5aa56
                       e71fb96b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2c:a0:34:c8:a5:0d:94:4c:61:c1:9b:7d:9f:97:84:db:b9:86:eb:cf],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-13 07:52:13.933  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-13 07:52:13.936 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-13 07:52:13.939 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-13 07:52:13.940 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-13 07:52:13.941  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-13 07:52:13.941  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-13 07:52:13.942  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-13 07:52:13.942 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-13 07:52:13.943 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-13 07:52:13.943 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-13 07:52:13.948 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-13 07:52:13.949 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-13 07:52:13.949 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-13 07:52:13.950 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-13 07:52:14.211  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-13 07:52:14.212  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-13 07:52:14.212 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-13 07:52:14.213 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-13 07:52:14.215  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-13 07:52:14.215  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-13 07:52:14.216 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-13 07:52:14.216 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-13 07:52:14.216 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-13 07:52:14.217 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-13 07:52:14.217 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-13 07:52:14.218 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-13 07:52:14.218 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-13 07:52:14.219 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-13 07:52:14.219 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-13 07:52:14.220 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-13 07:52:14.225 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 250463936742516270538741312356656936913436458449
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jan 13 05:15:00 UTC 2023
           Final Date: Wed Jan 12 05:14:59 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:2c:1c:1c:7e:43:6a:88:26:74:cc:01:b1:fe:38:d4:bf:9c:94:2a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 76f11e4a01e3f69d670c7b448e0d3736e923f485
                       f2ef691207b4b590fcc6efd3ec47874a4a1b721f
                       714c6ebe74afb413b94bd061950e68fe4f054888
                       812ec715c85e86b31e55c02538787879c2e2e18c
                       ac8828d771a64882fd40a754e4efd01daa2fd0fa
                       402d617d5a649f565a1a8279e73386a0000e07f6
                       81bbef5080f4a3ef8081b435122d1b38be87e862
                       5723430880bb367582ffa74ccb1e4c9775883dd9
                       81012887e3e4a92072f922e6c7c87e1914572dda
                       b5bfebf2d27fdb5214cdb7d65299f2f2d735640f
                       1eda3f58250d4e2555d8cd14284e411de0354129
                       6931b5c020857766e0a0706e1b883770e33f8457
                       7a93fa852d0388fbfdd7566c665f2d318a9bc8ee
                       0535f2ba682ab1a0414d3aeaabdb7dd22d627d66
                       1214169931c85c98014009521295b6248b498718
                       0d9e5e14b7785664e5d445d4edd0edae464f8266
                       4f79b605306ee17565b295117dde092a5753a3ec
                       e0ea3ab3da2fdea5d2caa8d7846d95ac6e8e7a4b
                       87e36dc0b538adecba9dd98776d5d73b4ea5aa56
                       e71fb96b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [32:45:e2:38:80:aa:00:1f:16:2e:b7:e2:62:c3:a7:22:23:ec:c9:10],[56:66:d1:a4]
        modulus: dda34739bf54e5ac43b7d91dbe1e8669772917c62d340de3176b5fde634f22698342cb0aaa6500fb394471fb2201161d008c7faeb7ee753cbcb7e482bb87016faf9f00f0d084f9e1287b8e95ed0004bb9637d993d33f9bd5d028df6a057d47c2b65f64d8ad36642c0b84b868d4ff3f7d2a9dce32f0be5d6e5ee9cc3faca6d699f2764d4d903059011693502995a1a657edd5f2f33138e58c820c49085771156d743f4a8612c30ab9cc48c4715866d9d2d01a176642cc0bf7a6ad0f5ca262d2b44254661bf2b4166c02ccc65f7682137707af5c644641e1067372606e33276f41e14d1787f4a7503255dcfd8a903ac90e1a6e01c6c848100bebb15473fb6edb0b
public exponent: 10001

] 
2023-01-13 07:52:21.985  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-13 07:52:21.986 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-13 07:52:21.988 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-13 07:52:21.988 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-13 07:52:21.989  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-13 07:52:21.990  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-13 07:52:21.990  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-13 07:52:21.990 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-13 07:52:21.991 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-13 07:52:21.991 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-13 07:52:21.994 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-13 07:52:21.995 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-13 07:52:21.995 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-13 07:52:21.995 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-13 07:52:22.135  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-13 07:52:22.136  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-13 07:52:22.136 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-13 07:52:22.136 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-13 07:52:22.137  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-13 07:52:22.138  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-13 07:52:22.138 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-13 07:52:22.138 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-13 07:52:22.139 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-13 07:52:22.139 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-13 07:52:22.139 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-13 07:52:22.140 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-13 07:52:22.140 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-13 07:52:22.141 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-13 07:52:22.141 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-13 07:52:22.142 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-13 07:52:22.144 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 250463936742516270538741312356656936913436458449
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jan 13 05:15:00 UTC 2023
           Final Date: Wed Jan 12 05:14:59 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7c:2c:1c:1c:7e:43:6a:88:26:74:cc:01:b1:fe:38:d4:bf:9c:94:2a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 76f11e4a01e3f69d670c7b448e0d3736e923f485
                       f2ef691207b4b590fcc6efd3ec47874a4a1b721f
                       714c6ebe74afb413b94bd061950e68fe4f054888
                       812ec715c85e86b31e55c02538787879c2e2e18c
                       ac8828d771a64882fd40a754e4efd01daa2fd0fa
                       402d617d5a649f565a1a8279e73386a0000e07f6
                       81bbef5080f4a3ef8081b435122d1b38be87e862
                       5723430880bb367582ffa74ccb1e4c9775883dd9
                       81012887e3e4a92072f922e6c7c87e1914572dda
                       b5bfebf2d27fdb5214cdb7d65299f2f2d735640f
                       1eda3f58250d4e2555d8cd14284e411de0354129
                       6931b5c020857766e0a0706e1b883770e33f8457
                       7a93fa852d0388fbfdd7566c665f2d318a9bc8ee
                       0535f2ba682ab1a0414d3aeaabdb7dd22d627d66
                       1214169931c85c98014009521295b6248b498718
                       0d9e5e14b7785664e5d445d4edd0edae464f8266
                       4f79b605306ee17565b295117dde092a5753a3ec
                       e0ea3ab3da2fdea5d2caa8d7846d95ac6e8e7a4b
                       87e36dc0b538adecba9dd98776d5d73b4ea5aa56
                       e71fb96b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5f:69:66:d4:8c:c5:ef:7f:3b:9d:53:37:c3:ce:53:43:6d:b4:7d:94],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]