Results

By type

          2021-10-14 05:56:57,827 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-10-14 05:56:58,617 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-10-14 05:56:59.364  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-10-14 05:57:02.226 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-10-14 05:57:02.468  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-10-14 05:57:02.613  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-10-14 05:57:04.685  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.46 seconds (JVM running for 9.19)
2021-10-14 05:57:52.392  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-14 05:57:52.404 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-14 05:57:52.451 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-10-14 05:57:52.464 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-14 05:57:52.490  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-10-14 05:57:52.494  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-14 05:57:52.495  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-14 05:57:52.498 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-14 05:57:52.499 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-14 05:57:52.504 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-14 05:57:52.512 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-14 05:57:52.516 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-14 05:57:52.559 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-14 05:57:52.566 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-14 05:57:52.567 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-14 05:57:52.571 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-14 05:57:53.190  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-14 05:57:53.194  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-14 05:57:53.195 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-14 05:57:53.198 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-14 05:57:53.207  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-14 05:57:53.209  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-14 05:57:53.210 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-14 05:57:53.210 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-14 05:57:53.211 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-14 05:57:53.225 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-14 05:57:53.225 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-14 05:57:53.226 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-14 05:57:53.235 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-14 05:57:53.236 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-14 05:57:53.236 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-14 05:57:53.238 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-14 05:57:53.275 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 258041478977839191363069299903358170077930608458
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Oct 14 05:54:18 UTC 2021
           Final Date: Tue Oct 14 05:54:17 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c4:7d:6a:c2:62:c2:54:18:81:73:99:fb:57:dc:e0:0f:09:8a:2a:4f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4422fe300f03785b7d8c6463c4c9f32c0ef5b138
                       a5203c62ac6ff250e1db01d086a0c4963f42eb65
                       63b620f3495f7fcc945077ca1a509a4cd11c9203
                       206ad787dac65eff25d1ce3f29afd30c2e20fd50
                       38d15c0393cfb2998247746d8db6fe8fd4f56d36
                       415f89c592f4111a8c40db0fada97b1fd7c00eb9
                       c381c2caf59b261aee79413c8e5114f809b0edee
                       2ccf3cbf9d9604f492d40e0b6df1a6dbfff14ca4
                       36278256a69fa1c69487afeea6b005e96e57456a
                       e47d4fbb6b1031e8d58b18d0bffe378d7c0545e5
                       bd504e943029f750cfa18924d4fe0d2a5d2094c1
                       45140a34d356b0fd854aa1382011913ea7976234
                       606a711eece98ba501e924803df54bdba0aaf80d
                       3090b42aee32b5de0face8f3d2577a162764f43c
                       0bae3be19dadfcb048783cf98c5be5de2bd4b027
                       a79b20b8379de21c2cf40e939af7f099f3d65a3b
                       5fc533da75e10758cc791770edbb9c022adfca9c
                       6e70f0fc3de398e39ebf1a2fcf8709710ed3e424
                       3274e364f53fdf2cb52a33fdbc04c1fb017cd622
                       6a301955
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d7:2c:ec:52:6e:b1:72:4f:eb:63:f2:a7:e1:b5:90:98:2f:85:32:bb]
            modulus: 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
    public exponent: 10001

] 
2021-10-14 08:01:17.115  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-14 08:01:17.118 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-14 08:01:17.123 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-14 08:01:17.125 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-14 08:01:17.126  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-14 08:01:17.127  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-14 08:01:17.128  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-14 08:01:17.128 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-14 08:01:17.129 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-14 08:01:17.130 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-14 08:01:17.142 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-14 08:01:17.143 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-14 08:01:17.144 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-14 08:01:17.144 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-14 08:01:17.357  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-14 08:01:17.358  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-14 08:01:17.359 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-14 08:01:17.359 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-14 08:01:17.363  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-14 08:01:17.363  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-14 08:01:17.364 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-14 08:01:17.365 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-14 08:01:17.365 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-14 08:01:17.366 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-14 08:01:17.367 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-14 08:01:17.367 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-14 08:01:17.369 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-14 08:01:17.369 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-14 08:01:17.370 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-14 08:01:17.371 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-14 08:01:17.378 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 258041478977839191363069299903358170077930608458
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Oct 14 05:54:18 UTC 2021
           Final Date: Tue Oct 14 05:54:17 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c4:7d:6a:c2:62:c2:54:18:81:73:99:fb:57:dc:e0:0f:09:8a:2a:4f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4422fe300f03785b7d8c6463c4c9f32c0ef5b138
                       a5203c62ac6ff250e1db01d086a0c4963f42eb65
                       63b620f3495f7fcc945077ca1a509a4cd11c9203
                       206ad787dac65eff25d1ce3f29afd30c2e20fd50
                       38d15c0393cfb2998247746d8db6fe8fd4f56d36
                       415f89c592f4111a8c40db0fada97b1fd7c00eb9
                       c381c2caf59b261aee79413c8e5114f809b0edee
                       2ccf3cbf9d9604f492d40e0b6df1a6dbfff14ca4
                       36278256a69fa1c69487afeea6b005e96e57456a
                       e47d4fbb6b1031e8d58b18d0bffe378d7c0545e5
                       bd504e943029f750cfa18924d4fe0d2a5d2094c1
                       45140a34d356b0fd854aa1382011913ea7976234
                       606a711eece98ba501e924803df54bdba0aaf80d
                       3090b42aee32b5de0face8f3d2577a162764f43c
                       0bae3be19dadfcb048783cf98c5be5de2bd4b027
                       a79b20b8379de21c2cf40e939af7f099f3d65a3b
                       5fc533da75e10758cc791770edbb9c022adfca9c
                       6e70f0fc3de398e39ebf1a2fcf8709710ed3e424
                       3274e364f53fdf2cb52a33fdbc04c1fb017cd622
                       6a301955
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cc:c3:27:c0:7d:d5:fa:c6:6a:89:0b:eb:dc:53:18:9e:60:1e:16:96]
            modulus: 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
    public exponent: 10001

] 
2021-10-14 08:04:51.594  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-14 08:04:51.597 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-14 08:04:51.601 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-14 08:04:51.602 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-14 08:04:51.602  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-14 08:04:51.603  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-14 08:04:51.604  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-14 08:04:51.605 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-14 08:04:51.605 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-14 08:04:51.606 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-14 08:04:51.620 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-14 08:04:51.623 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-14 08:04:51.623 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-14 08:04:51.625 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-14 08:04:51.787  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-14 08:04:51.788  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-14 08:04:51.788 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-14 08:04:51.788 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-14 08:04:51.794  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-14 08:04:51.794  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-14 08:04:51.795 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-14 08:04:51.796 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-14 08:04:51.796 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-14 08:04:51.797 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-14 08:04:51.798 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-14 08:04:51.798 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-14 08:04:51.799 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-14 08:04:51.799 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-14 08:04:51.800 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-14 08:04:51.801 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-14 08:04:51.806 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 258041478977839191363069299903358170077930608458
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Oct 14 05:54:18 UTC 2021
           Final Date: Tue Oct 14 05:54:17 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c4:7d:6a:c2:62:c2:54:18:81:73:99:fb:57:dc:e0:0f:09:8a:2a:4f]
            modulus: bd1afb84a8bfccdfa329570406efd45a870f107c0aef3fcab900408b755251cb49b671164c7eec318ba7ea2a677c8d1c03f034a29161f1707c24ab48c7d0433103365293ce0cdc5b752e29508ee8b7eabfda15851f3ffdda12d73fa606e061d87381d2c530c436b5f36a3ccfb781edaf565af29f48f2344bd013daddd50cc840f5a3bb222f038c97d323949dd95ff6a717a162a9f47435fe2b11aa45be128746fbc8b0797c47be28e03d1229284bdf80894bca000fc4b1626d7e3355f8e52e023a8057add677b36966309354d44971c21a1558ce2bdb430308b20b4e6f5d46c28109e27bb1032b08e00944fdfc98feeb15ddfa719326ab138913d580d7937bd20c576b7fa1a15db5dbad9f73c3722aec2c92b6c620186e46c147cc77a937f48dee3999bee3dc3271afebefc96184c66a6c7679fc0d862b386aaf8656ac34e0938f612756fa3387ff7f2868f09a5607a6a55d948dfedcb0f95c5ac24d86dd1b8c5441860e67759cb8fd87b218b87a5ba3e34c70ea7c4ca352ac03c216c8419ce1
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4422fe300f03785b7d8c6463c4c9f32c0ef5b138
                       a5203c62ac6ff250e1db01d086a0c4963f42eb65
                       63b620f3495f7fcc945077ca1a509a4cd11c9203
                       206ad787dac65eff25d1ce3f29afd30c2e20fd50
                       38d15c0393cfb2998247746d8db6fe8fd4f56d36
                       415f89c592f4111a8c40db0fada97b1fd7c00eb9
                       c381c2caf59b261aee79413c8e5114f809b0edee
                       2ccf3cbf9d9604f492d40e0b6df1a6dbfff14ca4
                       36278256a69fa1c69487afeea6b005e96e57456a
                       e47d4fbb6b1031e8d58b18d0bffe378d7c0545e5
                       bd504e943029f750cfa18924d4fe0d2a5d2094c1
                       45140a34d356b0fd854aa1382011913ea7976234
                       606a711eece98ba501e924803df54bdba0aaf80d
                       3090b42aee32b5de0face8f3d2577a162764f43c
                       0bae3be19dadfcb048783cf98c5be5de2bd4b027
                       a79b20b8379de21c2cf40e939af7f099f3d65a3b
                       5fc533da75e10758cc791770edbb9c022adfca9c
                       6e70f0fc3de398e39ebf1a2fcf8709710ed3e424
                       3274e364f53fdf2cb52a33fdbc04c1fb017cd622
                       6a301955
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [04:08:d9:c5:95:12:9c:ee:94:f4:d5:2f:55:ee:00:0f:e3:44:c5:56]
            modulus: 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
    public exponent: 10001

] 
2021-10-14 08:05:52.650  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-14 08:05:52.653 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-14 08:05:52.658 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-14 08:05:52.660 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-14 08:05:52.660  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-14 08:05:52.661  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-14 08:05:52.662  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-14 08:05:52.662 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-14 08:05:52.663 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-14 08:05:52.666 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-14 08:05:52.684 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-14 08:05:52.686 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-14 08:05:52.686 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-14 08:05:52.687 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-14 08:05:52.873  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-14 08:05:52.875  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-14 08:05:52.876 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-14 08:05:52.876 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-14 08:05:52.881  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-14 08:05:52.882  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-14 08:05:52.883 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-14 08:05:52.883 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-14 08:05:52.884 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-14 08:05:52.886 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-14 08:05:52.887 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-14 08:05:52.887 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-14 08:05:52.889 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-14 08:05:52.889 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-14 08:05:52.890 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-14 08:05:52.897 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-14 08:05:52.912 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 258041478977839191363069299903358170077930608458
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Oct 14 05:54:18 UTC 2021
           Final Date: Tue Oct 14 05:54:17 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c4:7d:6a:c2:62:c2:54:18:81:73:99:fb:57:dc:e0:0f:09:8a:2a:4f]
            modulus: bd1afb84a8bfccdfa329570406efd45a870f107c0aef3fcab900408b755251cb49b671164c7eec318ba7ea2a677c8d1c03f034a29161f1707c24ab48c7d0433103365293ce0cdc5b752e29508ee8b7eabfda15851f3ffdda12d73fa606e061d87381d2c530c436b5f36a3ccfb781edaf565af29f48f2344bd013daddd50cc840f5a3bb222f038c97d323949dd95ff6a717a162a9f47435fe2b11aa45be128746fbc8b0797c47be28e03d1229284bdf80894bca000fc4b1626d7e3355f8e52e023a8057add677b36966309354d44971c21a1558ce2bdb430308b20b4e6f5d46c28109e27bb1032b08e00944fdfc98feeb15ddfa719326ab138913d580d7937bd20c576b7fa1a15db5dbad9f73c3722aec2c92b6c620186e46c147cc77a937f48dee3999bee3dc3271afebefc96184c66a6c7679fc0d862b386aaf8656ac34e0938f612756fa3387ff7f2868f09a5607a6a55d948dfedcb0f95c5ac24d86dd1b8c5441860e67759cb8fd87b218b87a5ba3e34c70ea7c4ca352ac03c216c8419ce1
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4422fe300f03785b7d8c6463c4c9f32c0ef5b138
                       a5203c62ac6ff250e1db01d086a0c4963f42eb65
                       63b620f3495f7fcc945077ca1a509a4cd11c9203
                       206ad787dac65eff25d1ce3f29afd30c2e20fd50
                       38d15c0393cfb2998247746d8db6fe8fd4f56d36
                       415f89c592f4111a8c40db0fada97b1fd7c00eb9
                       c381c2caf59b261aee79413c8e5114f809b0edee
                       2ccf3cbf9d9604f492d40e0b6df1a6dbfff14ca4
                       36278256a69fa1c69487afeea6b005e96e57456a
                       e47d4fbb6b1031e8d58b18d0bffe378d7c0545e5
                       bd504e943029f750cfa18924d4fe0d2a5d2094c1
                       45140a34d356b0fd854aa1382011913ea7976234
                       606a711eece98ba501e924803df54bdba0aaf80d
                       3090b42aee32b5de0face8f3d2577a162764f43c
                       0bae3be19dadfcb048783cf98c5be5de2bd4b027
                       a79b20b8379de21c2cf40e939af7f099f3d65a3b
                       5fc533da75e10758cc791770edbb9c022adfca9c
                       6e70f0fc3de398e39ebf1a2fcf8709710ed3e424
                       3274e364f53fdf2cb52a33fdbc04c1fb017cd622
                       6a301955
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e0:0f:28:80:e9:fb:f1:1d:2e:59:51:92:b9:35:b4:c9:05:cc:da:7e]
            modulus: babb617ea33020c88d8b86479cc8ed145e859296defb4630edcd3d5413fe1bf8758da65ed3a7b801cf518cb4431d8141a65f6029f9ef0374b6dce67f08306613533a5735670da399f8c5c98870ac10c78387b27f7876ec169b5239da5a763b34dd015fb7a42808f631c9a2c64265e19a95e2c62c691f75ba3fdf4cd5f10a531e83cd283e85ba6a346e98f0fbcd7aad1c65feb81f98908f34c9bd570a0c62fca5c1a5568843bf99b10e06a13fbf53c139342727df9f5ddae635997f521f0692b0799b31a10314c95842f33eba6c420055ba8c6080ccd6cd00d3550756f03dc796e583b3b7566694533a31538f2490e562c1ee9e0b20c574eec66cf0d48bff6c03
    public exponent: 10001

] 
2021-10-14 08:06:24.387  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-14 08:06:24.390 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-14 08:06:24.392 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-14 08:06:24.393 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-14 08:06:24.394  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-14 08:06:24.395  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-14 08:06:24.396  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-14 08:06:24.397 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-14 08:06:24.398 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-14 08:06:24.399 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-14 08:06:24.406 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-14 08:06:24.409 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-14 08:06:24.410 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-14 08:06:24.410 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-14 08:06:24.574  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-14 08:06:24.576  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-14 08:06:24.576 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-14 08:06:24.577 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-14 08:06:24.579  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-14 08:06:24.582  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-14 08:06:24.584 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-14 08:06:24.584 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-14 08:06:24.585 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-14 08:06:24.587 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-14 08:06:24.587 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-14 08:06:24.588 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-14 08:06:24.589 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-14 08:06:24.590 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-14 08:06:24.591 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-14 08:06:24.594 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-14 08:06:24.599 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 258041478977839191363069299903358170077930608458
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Oct 14 05:54:18 UTC 2021
           Final Date: Tue Oct 14 05:54:17 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c4:7d:6a:c2:62:c2:54:18:81:73:99:fb:57:dc:e0:0f:09:8a:2a:4f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4422fe300f03785b7d8c6463c4c9f32c0ef5b138
                       a5203c62ac6ff250e1db01d086a0c4963f42eb65
                       63b620f3495f7fcc945077ca1a509a4cd11c9203
                       206ad787dac65eff25d1ce3f29afd30c2e20fd50
                       38d15c0393cfb2998247746d8db6fe8fd4f56d36
                       415f89c592f4111a8c40db0fada97b1fd7c00eb9
                       c381c2caf59b261aee79413c8e5114f809b0edee
                       2ccf3cbf9d9604f492d40e0b6df1a6dbfff14ca4
                       36278256a69fa1c69487afeea6b005e96e57456a
                       e47d4fbb6b1031e8d58b18d0bffe378d7c0545e5
                       bd504e943029f750cfa18924d4fe0d2a5d2094c1
                       45140a34d356b0fd854aa1382011913ea7976234
                       606a711eece98ba501e924803df54bdba0aaf80d
                       3090b42aee32b5de0face8f3d2577a162764f43c
                       0bae3be19dadfcb048783cf98c5be5de2bd4b027
                       a79b20b8379de21c2cf40e939af7f099f3d65a3b
                       5fc533da75e10758cc791770edbb9c022adfca9c
                       6e70f0fc3de398e39ebf1a2fcf8709710ed3e424
                       3274e364f53fdf2cb52a33fdbc04c1fb017cd622
                       6a301955
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4f:d5:cc:5f:e5:75:4c:66:3b:a6:b1:a3:d3:23:9c:4e:d0:49:f1:84]
            modulus: c52b9412e8da1c34c7af95d942cf3126f5138ba50afc3f7ef219e195b7320bbfa7fe963fa69f6d91d26a1edd617bfd4bd8e23cab899d8f3d38ee7e82165cb2b5bbc4b0125448fcad97cbd7603d5a36c9d085044d417bd5322eaef4bedb6e9b7d8a8750060ed71711b7f1dd05a9b111f4638ba21385a3bcd0d91386a871d898ce064c183c12328d627e1f44b7dd852642bd0641090a7eb619674b5f8e336065c212f94ab07d5fa835ae69bffea6c3b0c14982915bd85f9f5c6acf8bd0ee7a136b5c0bc6b80cbb82bb218e27e81b904142ff6f2cb0b96d8ccd2ec20fdec6592aee7bf4e5e6256100ac7466d25ef609fc38e8f96f8ab3f21ede0b85f2422bab96b3
    public exponent: 10001

] 
2021-10-14 08:06:41.478  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-14 08:06:41.480 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-14 08:06:41.481 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-14 08:06:41.482 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-14 08:06:41.483  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-14 08:06:41.483  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-14 08:06:41.484  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-14 08:06:41.484 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-14 08:06:41.484 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-14 08:06:41.485 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-14 08:06:41.491 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-14 08:06:41.492 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-14 08:06:41.492 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-14 08:06:41.493 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-14 08:06:41.613  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-14 08:06:41.614  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-14 08:06:41.614 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-14 08:06:41.615 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-14 08:06:41.617  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-14 08:06:41.618  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-14 08:06:41.618 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-14 08:06:41.619 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-14 08:06:41.619 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-14 08:06:41.620 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-14 08:06:41.620 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-14 08:06:41.621 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-14 08:06:41.621 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-14 08:06:41.622 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-14 08:06:41.622 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-14 08:06:41.623 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-14 08:06:41.628 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 258041478977839191363069299903358170077930608458
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Oct 14 05:54:18 UTC 2021
           Final Date: Tue Oct 14 05:54:17 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c4:7d:6a:c2:62:c2:54:18:81:73:99:fb:57:dc:e0:0f:09:8a:2a:4f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4422fe300f03785b7d8c6463c4c9f32c0ef5b138
                       a5203c62ac6ff250e1db01d086a0c4963f42eb65
                       63b620f3495f7fcc945077ca1a509a4cd11c9203
                       206ad787dac65eff25d1ce3f29afd30c2e20fd50
                       38d15c0393cfb2998247746d8db6fe8fd4f56d36
                       415f89c592f4111a8c40db0fada97b1fd7c00eb9
                       c381c2caf59b261aee79413c8e5114f809b0edee
                       2ccf3cbf9d9604f492d40e0b6df1a6dbfff14ca4
                       36278256a69fa1c69487afeea6b005e96e57456a
                       e47d4fbb6b1031e8d58b18d0bffe378d7c0545e5
                       bd504e943029f750cfa18924d4fe0d2a5d2094c1
                       45140a34d356b0fd854aa1382011913ea7976234
                       606a711eece98ba501e924803df54bdba0aaf80d
                       3090b42aee32b5de0face8f3d2577a162764f43c
                       0bae3be19dadfcb048783cf98c5be5de2bd4b027
                       a79b20b8379de21c2cf40e939af7f099f3d65a3b
                       5fc533da75e10758cc791770edbb9c022adfca9c
                       6e70f0fc3de398e39ebf1a2fcf8709710ed3e424
                       3274e364f53fdf2cb52a33fdbc04c1fb017cd622
                       6a301955
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fd:36:6a:d4:24:98:bb:30:ef:db:c7:60:24:8f:a8:7c:07:69:86:79]
            modulus: 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
    public exponent: 10001

] 
2021-10-14 08:06:42.591  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-14 08:06:42.592 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-14 08:06:42.597 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-14 08:06:42.598 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-14 08:06:42.599  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-14 08:06:42.600  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-14 08:06:42.600  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-14 08:06:42.601 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-14 08:06:42.601 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-14 08:06:42.602 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-14 08:06:42.606 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-14 08:06:42.607 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-14 08:06:42.607 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-14 08:06:42.608 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-14 08:06:42.706  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-14 08:06:42.706  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-14 08:06:42.708 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-14 08:06:42.708 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-14 08:06:42.710  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-14 08:06:42.710  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-14 08:06:42.711 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-14 08:06:42.712 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-14 08:06:42.712 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-14 08:06:42.718 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-14 08:06:42.718 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-14 08:06:42.719 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-14 08:06:42.720 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-14 08:06:42.720 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-14 08:06:42.721 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-14 08:06:42.722 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-14 08:06:42.727 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 258041478977839191363069299903358170077930608458
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Oct 14 05:54:18 UTC 2021
           Final Date: Tue Oct 14 05:54:17 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c4:7d:6a:c2:62:c2:54:18:81:73:99:fb:57:dc:e0:0f:09:8a:2a:4f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4422fe300f03785b7d8c6463c4c9f32c0ef5b138
                       a5203c62ac6ff250e1db01d086a0c4963f42eb65
                       63b620f3495f7fcc945077ca1a509a4cd11c9203
                       206ad787dac65eff25d1ce3f29afd30c2e20fd50
                       38d15c0393cfb2998247746d8db6fe8fd4f56d36
                       415f89c592f4111a8c40db0fada97b1fd7c00eb9
                       c381c2caf59b261aee79413c8e5114f809b0edee
                       2ccf3cbf9d9604f492d40e0b6df1a6dbfff14ca4
                       36278256a69fa1c69487afeea6b005e96e57456a
                       e47d4fbb6b1031e8d58b18d0bffe378d7c0545e5
                       bd504e943029f750cfa18924d4fe0d2a5d2094c1
                       45140a34d356b0fd854aa1382011913ea7976234
                       606a711eece98ba501e924803df54bdba0aaf80d
                       3090b42aee32b5de0face8f3d2577a162764f43c
                       0bae3be19dadfcb048783cf98c5be5de2bd4b027
                       a79b20b8379de21c2cf40e939af7f099f3d65a3b
                       5fc533da75e10758cc791770edbb9c022adfca9c
                       6e70f0fc3de398e39ebf1a2fcf8709710ed3e424
                       3274e364f53fdf2cb52a33fdbc04c1fb017cd622
                       6a301955
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fd:36:6a:d4:24:98:bb:30:ef:db:c7:60:24:8f:a8:7c:07:69:86:79]
            modulus: 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
    public exponent: 10001

] 
2021-10-14 08:07:01.819  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-14 08:07:01.821 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-14 08:07:01.823 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-14 08:07:01.824 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-14 08:07:01.825  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-14 08:07:01.826  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-14 08:07:01.826  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-14 08:07:01.827 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-14 08:07:01.827 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-14 08:07:01.828 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-14 08:07:01.836 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-14 08:07:01.837 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-14 08:07:01.838 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-14 08:07:01.838 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-14 08:07:02.023  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-14 08:07:02.028  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-14 08:07:02.028 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-14 08:07:02.030 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-14 08:07:02.034  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-14 08:07:02.034  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-14 08:07:02.035 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-14 08:07:02.035 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-14 08:07:02.035 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-14 08:07:02.036 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-14 08:07:02.037 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-14 08:07:02.037 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-14 08:07:02.038 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-14 08:07:02.038 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-14 08:07:02.038 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-14 08:07:02.040 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-14 08:07:02.044 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 258041478977839191363069299903358170077930608458
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Oct 14 05:54:18 UTC 2021
           Final Date: Tue Oct 14 05:54:17 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c4:7d:6a:c2:62:c2:54:18:81:73:99:fb:57:dc:e0:0f:09:8a:2a:4f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4422fe300f03785b7d8c6463c4c9f32c0ef5b138
                       a5203c62ac6ff250e1db01d086a0c4963f42eb65
                       63b620f3495f7fcc945077ca1a509a4cd11c9203
                       206ad787dac65eff25d1ce3f29afd30c2e20fd50
                       38d15c0393cfb2998247746d8db6fe8fd4f56d36
                       415f89c592f4111a8c40db0fada97b1fd7c00eb9
                       c381c2caf59b261aee79413c8e5114f809b0edee
                       2ccf3cbf9d9604f492d40e0b6df1a6dbfff14ca4
                       36278256a69fa1c69487afeea6b005e96e57456a
                       e47d4fbb6b1031e8d58b18d0bffe378d7c0545e5
                       bd504e943029f750cfa18924d4fe0d2a5d2094c1
                       45140a34d356b0fd854aa1382011913ea7976234
                       606a711eece98ba501e924803df54bdba0aaf80d
                       3090b42aee32b5de0face8f3d2577a162764f43c
                       0bae3be19dadfcb048783cf98c5be5de2bd4b027
                       a79b20b8379de21c2cf40e939af7f099f3d65a3b
                       5fc533da75e10758cc791770edbb9c022adfca9c
                       6e70f0fc3de398e39ebf1a2fcf8709710ed3e424
                       3274e364f53fdf2cb52a33fdbc04c1fb017cd622
                       6a301955
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [db:a4:10:11:7e:79:0d:16:49:d7:b3:70:ff:e4:ca:80:7d:5b:5a:78]
            modulus: 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
    public exponent: 10001

] 
2021-10-14 08:08:34.968  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-14 08:08:34.972 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-14 08:08:34.976 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-14 08:08:34.978 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-14 08:08:34.978  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-14 08:08:34.982  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-14 08:08:34.983  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-14 08:08:34.988 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-14 08:08:34.996 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-14 08:08:35.005 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-14 08:08:35.020 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-14 08:08:35.023 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-14 08:08:35.023 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-14 08:08:35.024 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-14 08:08:35.230  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-14 08:08:35.231  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-14 08:08:35.232 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-14 08:08:35.232 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-14 08:08:35.233  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-14 08:08:35.234  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-14 08:08:35.235 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-14 08:08:35.235 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-14 08:08:35.235 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-14 08:08:35.236 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-14 08:08:35.236 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-14 08:08:35.237 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-14 08:08:35.237 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-14 08:08:35.238 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-14 08:08:35.238 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-14 08:08:35.239 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-14 08:08:35.243 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 258041478977839191363069299903358170077930608458
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Oct 14 05:54:18 UTC 2021
           Final Date: Tue Oct 14 05:54:17 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c4:7d:6a:c2:62:c2:54:18:81:73:99:fb:57:dc:e0:0f:09:8a:2a:4f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4422fe300f03785b7d8c6463c4c9f32c0ef5b138
                       a5203c62ac6ff250e1db01d086a0c4963f42eb65
                       63b620f3495f7fcc945077ca1a509a4cd11c9203
                       206ad787dac65eff25d1ce3f29afd30c2e20fd50
                       38d15c0393cfb2998247746d8db6fe8fd4f56d36
                       415f89c592f4111a8c40db0fada97b1fd7c00eb9
                       c381c2caf59b261aee79413c8e5114f809b0edee
                       2ccf3cbf9d9604f492d40e0b6df1a6dbfff14ca4
                       36278256a69fa1c69487afeea6b005e96e57456a
                       e47d4fbb6b1031e8d58b18d0bffe378d7c0545e5
                       bd504e943029f750cfa18924d4fe0d2a5d2094c1
                       45140a34d356b0fd854aa1382011913ea7976234
                       606a711eece98ba501e924803df54bdba0aaf80d
                       3090b42aee32b5de0face8f3d2577a162764f43c
                       0bae3be19dadfcb048783cf98c5be5de2bd4b027
                       a79b20b8379de21c2cf40e939af7f099f3d65a3b
                       5fc533da75e10758cc791770edbb9c022adfca9c
                       6e70f0fc3de398e39ebf1a2fcf8709710ed3e424
                       3274e364f53fdf2cb52a33fdbc04c1fb017cd622
                       6a301955
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [37:95:4e:47:e9:5f:28:d6:62:87:98:12:e7:8e:63:04:e3:dd:2f:95]
            modulus: c61e90853236bc1c7c12723f60aa5b8381c25145be58bd0c826fa7c40cc09a5c76a9b2afe600cb3067a469facf4d9daad9cf8584589c5e0152a9dee48258ca0ab675ce411da0941f91262961d973a0e2e1b59614ae363aac273f80e52472f71448911ff6e1f1d400bc868c7afe25155714b5879abc4e30212533b0537592c09e32edf8e8b1cffa70977012e269a0ffdd34d03c12ea6e610e9f77cf5c322b93b47819a3032c8463619d1b29d361d438db77254136c9692d8dd7a971c102e5abed27c5991d4d6dca05d543480c0f2f4144de589a5db220e0bb43ee41bfcb7e6490f45822415f66103f897498c7e4b3f115ba1547a696602ac091e739925ff8d2cd
    public exponent: 10001

] 
2021-10-14 08:08:44.979  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-14 08:08:44.980 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-14 08:08:44.982 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-14 08:08:44.982 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-14 08:08:44.983  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-14 08:08:44.984  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-14 08:08:44.984  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-14 08:08:44.984 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-14 08:08:44.985 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-14 08:08:44.985 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-14 08:08:44.996 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-14 08:08:44.996 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-14 08:08:44.996 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-14 08:08:44.997 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-14 08:08:45.168  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-14 08:08:45.169  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-14 08:08:45.170 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-14 08:08:45.170 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-14 08:08:45.171  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-14 08:08:45.172  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-14 08:08:45.175 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-14 08:08:45.176 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-14 08:08:45.176 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-14 08:08:45.177 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-14 08:08:45.178 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-14 08:08:45.178 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-14 08:08:45.179 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-14 08:08:45.180 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-14 08:08:45.181 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-14 08:08:45.182 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-14 08:08:45.188 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 258041478977839191363069299903358170077930608458
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Oct 14 05:54:18 UTC 2021
           Final Date: Tue Oct 14 05:54:17 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c4:7d:6a:c2:62:c2:54:18:81:73:99:fb:57:dc:e0:0f:09:8a:2a:4f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4422fe300f03785b7d8c6463c4c9f32c0ef5b138
                       a5203c62ac6ff250e1db01d086a0c4963f42eb65
                       63b620f3495f7fcc945077ca1a509a4cd11c9203
                       206ad787dac65eff25d1ce3f29afd30c2e20fd50
                       38d15c0393cfb2998247746d8db6fe8fd4f56d36
                       415f89c592f4111a8c40db0fada97b1fd7c00eb9
                       c381c2caf59b261aee79413c8e5114f809b0edee
                       2ccf3cbf9d9604f492d40e0b6df1a6dbfff14ca4
                       36278256a69fa1c69487afeea6b005e96e57456a
                       e47d4fbb6b1031e8d58b18d0bffe378d7c0545e5
                       bd504e943029f750cfa18924d4fe0d2a5d2094c1
                       45140a34d356b0fd854aa1382011913ea7976234
                       606a711eece98ba501e924803df54bdba0aaf80d
                       3090b42aee32b5de0face8f3d2577a162764f43c
                       0bae3be19dadfcb048783cf98c5be5de2bd4b027
                       a79b20b8379de21c2cf40e939af7f099f3d65a3b
                       5fc533da75e10758cc791770edbb9c022adfca9c
                       6e70f0fc3de398e39ebf1a2fcf8709710ed3e424
                       3274e364f53fdf2cb52a33fdbc04c1fb017cd622
                       6a301955
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [21:47:29:87:46:5d:aa:72:5f:1a:71:59:c0:8f:c8:8b:6d:c2:68:bd]
            modulus: d3e3a613d29db87d83a044bec0c8c9dbb233ed89a2bb7706a4df670e9401df12b61a03054e286b7e5ca7290a9dc839a2d1554579f3a209e9fb818e4ceb6eda705510b4e7d0711e86a9a2f1ea345d808af8166badb4cb8a4963d5eb74707a67b4dbcd3b3a8f57f3fc10097bb32be9eba3c02459c08c32f461d523d0ad9d6b9f45d8b89d17dd94359fbefd45991660592a48497d1bfe583e88d499fd02f82a2db2866aa65884600f93be4d6c3d3b21e55c119309a3d37ea6feb9fe4e95a60ba0af71de3436b00504e9e660ee5f18618fc9409f3d99adcc373fe2aa0b4ece404f5c7e5fd46aeb0bab7a9229917226655ff9a759395f8d90349b15106be9abf6cb99
    public exponent: 10001

]