Results

By type

          2021-10-26 05:56:39,297 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-10-26 05:56:40,209 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-10-26 05:56:40.972  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-10-26 05:56:44.218 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-10-26 05:56:44.504  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-10-26 05:56:44.649  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-10-26 05:56:46.797  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.089 seconds (JVM running for 10.01)
2021-10-26 05:57:43.647  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-26 05:57:43.664 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-26 05:57:43.714 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-10-26 05:57:43.725 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-26 05:57:43.759  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-10-26 05:57:43.764  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-26 05:57:43.765  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-26 05:57:43.768 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-26 05:57:43.769 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 05:57:43.773 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-26 05:57:43.781 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-26 05:57:43.785 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-26 05:57:43.848 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-26 05:57:43.858 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 05:57:43.859 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 05:57:43.866 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 05:57:44.531  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-26 05:57:44.539  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-26 05:57:44.540 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-26 05:57:44.545 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 05:57:44.560  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-26 05:57:44.562  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-26 05:57:44.563 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 05:57:44.563 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 05:57:44.564 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 05:57:44.580 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 05:57:44.580 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 05:57:44.581 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 05:57:44.587 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 05:57:44.588 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 05:57:44.589 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 05:57:44.591 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-26 05:57:44.636 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 663838185038368736768695760232781041896290811643
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Oct 26 05:54:06 UTC 2021
           Final Date: Sun Oct 26 05:54:05 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [98:e3:87:10:a3:01:c0:3d:e5:8d:34:e7:ff:64:0e:de:64:d8:1a:d3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ce7794da9e58f0fda32ba9b552482ee037511922
                       d496d8ffd67ecec609b610d4f7ca7084f7d37466
                       effd84ca55995ed76dea13787b2477734f1d9c20
                       65b057591bfa27e6edf45f9559f8444980950b0c
                       3e76cabf275bf60f0e7365aeb353632a9fd29bb4
                       3fb4d07fc3cd5ac8c94934300517487587d0cb8f
                       532109860b1c17b3c94f468a03a72ce1e63b8946
                       39a284911ff81d677741ea693181e01496b40b8d
                       ab503e7344c8fcb33910070a0d7ba95963a5ac43
                       7fc3233b23dac43fc7fa25c51be475c485c6a266
                       eb7cfb8b13837ba17d15c78cf98600a5f09129e3
                       0d726fdae1db09dfa8f34bf1a7efc72b0d39defe
                       aa065e4b6387ef600e9d82c9db5977f7c51c9a32
                       b93dc2123ced9debd0b25f4555d288fe5f595856
                       52b4fbebdfdfdc19597c8851eadc82612bfbb70f
                       e54affa0d747dab8212773167abf95d8d0c379a9
                       78949983d60fda12e345c3416e82011369a1af9d
                       db6bab8df9f69f8ea33215cd8bdd7523ea100ec6
                       a351d367f5bb438f307c221170e24f15c5da42f5
                       7576dccf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1a:e6:73:d4:71:ca:36:1d:f6:32:cd:c2:d1:84:ed:1c:c6:70:c5:95]
            modulus: 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
    public exponent: 10001

] 
2021-10-26 07:41:06.651  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-26 07:41:06.656 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-26 07:41:06.659 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-26 07:41:06.660 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-26 07:41:06.665  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-26 07:41:06.667  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-26 07:41:06.667  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-26 07:41:06.668 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-26 07:41:06.669 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-26 07:41:06.673 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-26 07:41:06.686 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-26 07:41:06.691 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 07:41:06.692 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 07:41:06.693 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 07:41:06.854  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-26 07:41:06.854  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-26 07:41:06.855 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-26 07:41:06.856 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 07:41:06.859  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-26 07:41:06.860  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-26 07:41:06.861 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 07:41:06.861 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 07:41:06.862 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 07:41:06.863 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 07:41:06.864 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 07:41:06.864 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 07:41:06.865 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 07:41:06.866 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 07:41:06.866 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 07:41:06.868 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-26 07:41:06.873 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 663838185038368736768695760232781041896290811643
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Oct 26 05:54:06 UTC 2021
           Final Date: Sun Oct 26 05:54:05 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [98:e3:87:10:a3:01:c0:3d:e5:8d:34:e7:ff:64:0e:de:64:d8:1a:d3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ce7794da9e58f0fda32ba9b552482ee037511922
                       d496d8ffd67ecec609b610d4f7ca7084f7d37466
                       effd84ca55995ed76dea13787b2477734f1d9c20
                       65b057591bfa27e6edf45f9559f8444980950b0c
                       3e76cabf275bf60f0e7365aeb353632a9fd29bb4
                       3fb4d07fc3cd5ac8c94934300517487587d0cb8f
                       532109860b1c17b3c94f468a03a72ce1e63b8946
                       39a284911ff81d677741ea693181e01496b40b8d
                       ab503e7344c8fcb33910070a0d7ba95963a5ac43
                       7fc3233b23dac43fc7fa25c51be475c485c6a266
                       eb7cfb8b13837ba17d15c78cf98600a5f09129e3
                       0d726fdae1db09dfa8f34bf1a7efc72b0d39defe
                       aa065e4b6387ef600e9d82c9db5977f7c51c9a32
                       b93dc2123ced9debd0b25f4555d288fe5f595856
                       52b4fbebdfdfdc19597c8851eadc82612bfbb70f
                       e54affa0d747dab8212773167abf95d8d0c379a9
                       78949983d60fda12e345c3416e82011369a1af9d
                       db6bab8df9f69f8ea33215cd8bdd7523ea100ec6
                       a351d367f5bb438f307c221170e24f15c5da42f5
                       7576dccf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d1:8c:7e:0a:89:1d:7a:ad:20:1c:29:e6:c6:46:99:25:0a:61:e8:ea]
            modulus: ca96ff13a4f6aed1bc4f3f5dbad572d2d517e81ce4fb8c341cb013eb6ff743a4f851d0535dd9b8e38d04ff1070cb56ffb17a67aaf4be91f4301553c7925c38b6259c477e28de60fade8fd6d97a336f1922c59f60d57b73abbfd91a0d9af901e415bdc77048608c57b14e67ff080430ae0e5bd972e832adc2dfc2180f625a618852a0c04c30b21e82d592785d54bd895505d56af22a420c2bf342e74a00001d2fa2cba036416f3f4b939d462dbcbef350ceda30802f707a32852c7c678395376ad591bb600ccb0664cecca7c67424f5aa1ae732d8a3261e252f688c7720f79632d636c72ff0709310124dd7fc75eb0f53d89c71a090a4bb6a67098a62091b5297
    public exponent: 10001

] 
2021-10-26 07:42:23.036  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-26 07:42:23.038 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-26 07:42:23.040 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-26 07:42:23.041 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-26 07:42:23.042  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-26 07:42:23.043  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-26 07:42:23.043  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-26 07:42:23.044 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-26 07:42:23.044 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-26 07:42:23.045 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-26 07:42:23.051 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-26 07:42:23.052 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 07:42:23.053 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 07:42:23.053 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 07:42:23.208  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-26 07:42:23.210  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-26 07:42:23.210 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-26 07:42:23.211 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 07:42:23.214  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-26 07:42:23.215  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-26 07:42:23.216 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 07:42:23.216 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 07:42:23.217 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 07:42:23.218 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 07:42:23.219 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 07:42:23.220 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 07:42:23.221 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 07:42:23.222 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 07:42:23.222 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 07:42:23.223 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-26 07:42:23.228 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 663838185038368736768695760232781041896290811643
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Oct 26 05:54:06 UTC 2021
           Final Date: Sun Oct 26 05:54:05 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [98:e3:87:10:a3:01:c0:3d:e5:8d:34:e7:ff:64:0e:de:64:d8:1a:d3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ce7794da9e58f0fda32ba9b552482ee037511922
                       d496d8ffd67ecec609b610d4f7ca7084f7d37466
                       effd84ca55995ed76dea13787b2477734f1d9c20
                       65b057591bfa27e6edf45f9559f8444980950b0c
                       3e76cabf275bf60f0e7365aeb353632a9fd29bb4
                       3fb4d07fc3cd5ac8c94934300517487587d0cb8f
                       532109860b1c17b3c94f468a03a72ce1e63b8946
                       39a284911ff81d677741ea693181e01496b40b8d
                       ab503e7344c8fcb33910070a0d7ba95963a5ac43
                       7fc3233b23dac43fc7fa25c51be475c485c6a266
                       eb7cfb8b13837ba17d15c78cf98600a5f09129e3
                       0d726fdae1db09dfa8f34bf1a7efc72b0d39defe
                       aa065e4b6387ef600e9d82c9db5977f7c51c9a32
                       b93dc2123ced9debd0b25f4555d288fe5f595856
                       52b4fbebdfdfdc19597c8851eadc82612bfbb70f
                       e54affa0d747dab8212773167abf95d8d0c379a9
                       78949983d60fda12e345c3416e82011369a1af9d
                       db6bab8df9f69f8ea33215cd8bdd7523ea100ec6
                       a351d367f5bb438f307c221170e24f15c5da42f5
                       7576dccf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8f:c3:a3:7c:2b:9c:a3:ae:5e:98:b5:e1:72:7c:e7:db:2a:8f:80:28]
            modulus: d0fcd39bc075a8529bd303e42682071e6ee3f259360f7dc1962bfe19dca04a2eaa79d04aaee6841ca5601f50718cae96f464cc01b5bd0384ceb78f102f25f4d3544b43daa97e1665b95ceaf33cd85cb4ed6887f16213de58c3142b59c698665e39b4721673c705b99d0cbe274fe1a61112b3404baf797e9b77846e9111a976f444747547f056ecaa06de0f687ba7f5a0758c8d8e3b25a22ac77d71ea3713dab37d3a67aef71fc6ab71e5d709b074c24038487c0700cd43d10825cc108ae12ae16ea1c60f505aeb64e4f2ec9190d9d1716bc8af91373841d9ceb87c9240433104a3468b90b0301643b2580e831ae307c5ce085e1c4fbecbd957040f02f370ab25
    public exponent: 10001

] 
2021-10-26 07:44:12.517  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-26 07:44:12.520 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-26 07:44:12.523 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-26 07:44:12.525 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-26 07:44:12.525  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-26 07:44:12.527  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-26 07:44:12.527  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-26 07:44:12.528 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-26 07:44:12.528 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-26 07:44:12.529 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-26 07:44:12.536 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-26 07:44:12.537 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 07:44:12.538 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 07:44:12.539 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 07:44:12.745  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-26 07:44:12.746  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-26 07:44:12.747 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-26 07:44:12.747 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 07:44:12.749  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-26 07:44:12.750  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-26 07:44:12.750 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 07:44:12.750 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 07:44:12.751 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 07:44:12.752 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 07:44:12.752 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 07:44:12.752 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 07:44:12.753 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 07:44:12.754 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 07:44:12.754 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 07:44:12.755 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-26 07:44:12.760 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 663838185038368736768695760232781041896290811643
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Oct 26 05:54:06 UTC 2021
           Final Date: Sun Oct 26 05:54:05 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [98:e3:87:10:a3:01:c0:3d:e5:8d:34:e7:ff:64:0e:de:64:d8:1a:d3]
            modulus: eae95a30fa97a07d0960ca92f67d9d330b66f90db343ec1b2baf94e5149c79cf743d764c3dfe23b2db3844d956dfd80a6659b5c19fe48852128ce4703694c7a13f020e1237afdd39edd4b043dac21175b2914254a8cff582133c47fbd297eb881535f166ecaad292854502b6725e822912e259119dc5cae772f5108ec090a7d1237445c5e7d81f23ed097d3e5f7d9dcc099e397c97a13c24ed4a65354cf0b96deaa5ab974fd9990008fb4a5d0a25c3091f391fc60ce616e7b207a89ad804c2700863e914dc593f5f3007ec7faebb21f3f33ca4a1c262c3cfa3624c87d00528f0f16eeb9da2e6dc9ca2dc0463ac490179df306c1674e77f5f50bac0a62b9183a7bec9c4e739308a3d3c9c5741d04822c55054184154fefa3efe5e38414aa71bd73f712dfc0de5b38269bdf957407b7e897914af204aa631f74bb7d51156a877a55972cbe7a1ab59afbdd1065f72c0a642a3624a707c905e229fdc8d959f6f414362d6c0831897b4432e4a7419ff8d00da4e35c6a9513b314b34fbb900341285ff
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ce7794da9e58f0fda32ba9b552482ee037511922
                       d496d8ffd67ecec609b610d4f7ca7084f7d37466
                       effd84ca55995ed76dea13787b2477734f1d9c20
                       65b057591bfa27e6edf45f9559f8444980950b0c
                       3e76cabf275bf60f0e7365aeb353632a9fd29bb4
                       3fb4d07fc3cd5ac8c94934300517487587d0cb8f
                       532109860b1c17b3c94f468a03a72ce1e63b8946
                       39a284911ff81d677741ea693181e01496b40b8d
                       ab503e7344c8fcb33910070a0d7ba95963a5ac43
                       7fc3233b23dac43fc7fa25c51be475c485c6a266
                       eb7cfb8b13837ba17d15c78cf98600a5f09129e3
                       0d726fdae1db09dfa8f34bf1a7efc72b0d39defe
                       aa065e4b6387ef600e9d82c9db5977f7c51c9a32
                       b93dc2123ced9debd0b25f4555d288fe5f595856
                       52b4fbebdfdfdc19597c8851eadc82612bfbb70f
                       e54affa0d747dab8212773167abf95d8d0c379a9
                       78949983d60fda12e345c3416e82011369a1af9d
                       db6bab8df9f69f8ea33215cd8bdd7523ea100ec6
                       a351d367f5bb438f307c221170e24f15c5da42f5
                       7576dccf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c3:62:2c:5d:27:d9:ff:c7:2b:4a:60:a0:0d:0b:4d:bf:14:50:3a:55]
            modulus: bf084b803ae9d38d25314eb4715df5f08a33af542161c890c42342def6f58b62cb60fe0bdcbaeb7ad7acb84a4dfcef81600c2711f70ecf50291b55e135349f77945d441fdf677a3aac161483b0b534493b5ea84f2e03982ea45154206995a4c5753a6cd81a5a1f464e0bfcd488eb228a67866a6a383bf688bb69485a671be749cadd21a0f4b137d0278a4f93313bddaf5da4d60101f83b401227ecf9452251a19ba08e2cd8f7bde1ea40d298533d1d1c09360a83044a1cb3492d999094248348f258ebbcb675c8e97bef4212ed0bba0bde3d595e433235af6bca8acc07da715430f378fb55bdedb73b070e11822bc81a660d41a374b8a98a76e8506c4473c797
    public exponent: 10001

] 
2021-10-26 07:45:56.692  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-26 07:45:56.695 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-26 07:45:56.698 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-26 07:45:56.699 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-26 07:45:56.699  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-26 07:45:56.700  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-26 07:45:56.701  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-26 07:45:56.702 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-26 07:45:56.704 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-26 07:45:56.704 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-26 07:45:56.710 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-26 07:45:56.712 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 07:45:56.712 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 07:45:56.713 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 07:45:56.878  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-26 07:45:56.879  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-26 07:45:56.880 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-26 07:45:56.880 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 07:45:56.882  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-26 07:45:56.883  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-26 07:45:56.883 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 07:45:56.884 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 07:45:56.884 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 07:45:56.885 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 07:45:56.885 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 07:45:56.886 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 07:45:56.886 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 07:45:56.887 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 07:45:56.887 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 07:45:56.888 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-26 07:45:56.892 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 663838185038368736768695760232781041896290811643
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Oct 26 05:54:06 UTC 2021
           Final Date: Sun Oct 26 05:54:05 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [98:e3:87:10:a3:01:c0:3d:e5:8d:34:e7:ff:64:0e:de:64:d8:1a:d3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ce7794da9e58f0fda32ba9b552482ee037511922
                       d496d8ffd67ecec609b610d4f7ca7084f7d37466
                       effd84ca55995ed76dea13787b2477734f1d9c20
                       65b057591bfa27e6edf45f9559f8444980950b0c
                       3e76cabf275bf60f0e7365aeb353632a9fd29bb4
                       3fb4d07fc3cd5ac8c94934300517487587d0cb8f
                       532109860b1c17b3c94f468a03a72ce1e63b8946
                       39a284911ff81d677741ea693181e01496b40b8d
                       ab503e7344c8fcb33910070a0d7ba95963a5ac43
                       7fc3233b23dac43fc7fa25c51be475c485c6a266
                       eb7cfb8b13837ba17d15c78cf98600a5f09129e3
                       0d726fdae1db09dfa8f34bf1a7efc72b0d39defe
                       aa065e4b6387ef600e9d82c9db5977f7c51c9a32
                       b93dc2123ced9debd0b25f4555d288fe5f595856
                       52b4fbebdfdfdc19597c8851eadc82612bfbb70f
                       e54affa0d747dab8212773167abf95d8d0c379a9
                       78949983d60fda12e345c3416e82011369a1af9d
                       db6bab8df9f69f8ea33215cd8bdd7523ea100ec6
                       a351d367f5bb438f307c221170e24f15c5da42f5
                       7576dccf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cb:68:30:1b:b2:76:c8:90:e7:42:97:7a:8d:02:b1:8a:32:c1:24:2f]
            modulus: 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
    public exponent: 10001

] 
2021-10-26 07:46:04.637  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-26 07:46:04.639 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-26 07:46:04.640 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-26 07:46:04.641 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-26 07:46:04.641  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-26 07:46:04.642  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-26 07:46:04.643  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-26 07:46:04.643 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-26 07:46:04.644 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-26 07:46:04.644 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-26 07:46:04.650 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-26 07:46:04.652 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 07:46:04.653 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 07:46:04.654 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 07:46:04.778  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-26 07:46:04.778  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-26 07:46:04.779 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-26 07:46:04.779 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 07:46:04.780  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-26 07:46:04.781  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-26 07:46:04.781 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 07:46:04.782 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 07:46:04.782 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 07:46:04.783 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 07:46:04.784 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 07:46:04.784 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 07:46:04.785 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 07:46:04.785 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 07:46:04.785 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 07:46:04.786 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-26 07:46:04.790 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 663838185038368736768695760232781041896290811643
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Oct 26 05:54:06 UTC 2021
           Final Date: Sun Oct 26 05:54:05 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [98:e3:87:10:a3:01:c0:3d:e5:8d:34:e7:ff:64:0e:de:64:d8:1a:d3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ce7794da9e58f0fda32ba9b552482ee037511922
                       d496d8ffd67ecec609b610d4f7ca7084f7d37466
                       effd84ca55995ed76dea13787b2477734f1d9c20
                       65b057591bfa27e6edf45f9559f8444980950b0c
                       3e76cabf275bf60f0e7365aeb353632a9fd29bb4
                       3fb4d07fc3cd5ac8c94934300517487587d0cb8f
                       532109860b1c17b3c94f468a03a72ce1e63b8946
                       39a284911ff81d677741ea693181e01496b40b8d
                       ab503e7344c8fcb33910070a0d7ba95963a5ac43
                       7fc3233b23dac43fc7fa25c51be475c485c6a266
                       eb7cfb8b13837ba17d15c78cf98600a5f09129e3
                       0d726fdae1db09dfa8f34bf1a7efc72b0d39defe
                       aa065e4b6387ef600e9d82c9db5977f7c51c9a32
                       b93dc2123ced9debd0b25f4555d288fe5f595856
                       52b4fbebdfdfdc19597c8851eadc82612bfbb70f
                       e54affa0d747dab8212773167abf95d8d0c379a9
                       78949983d60fda12e345c3416e82011369a1af9d
                       db6bab8df9f69f8ea33215cd8bdd7523ea100ec6
                       a351d367f5bb438f307c221170e24f15c5da42f5
                       7576dccf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8a:eb:4f:33:63:4f:59:83:c2:85:de:8e:90:bc:15:53:17:93:69:5c]
            modulus: b77ec8931148c76e7000951678b80a2e50468854e747fbc88477aefe94e5cfafd9d9fe2fd32e981c169a0d76b07de4e3c391d82ba6cbd4207f7b033b5d42650940c00157735b2719e4b6216c4ce639718ab3890c794261a4a1754e77c8b974187f49edd99b2ce63a5fa5bb09ea7222af588f3a379f455d7e94f6ebcd9ed0698630721fe1028e293a158e9340ed94fa1d3245d975ed18e17fefad62b4655de934415a541a7aaebe1fbbd916026b9f34409791aff3ce43aa32da3f5eaa091bac78160a47d15467f0003b80dcb3c0767d9be3f22ab874a87df43b5767ad6ea6989b23ae2a576c69e3f65183fde8c68e097517bc5ad9b29bb15f8f0c32bb2f00f80f
    public exponent: 10001

] 
2021-10-26 07:46:29.014  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-26 07:46:29.016 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-26 07:46:29.018 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-26 07:46:29.019 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-26 07:46:29.019  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-26 07:46:29.020  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-26 07:46:29.020  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-26 07:46:29.021 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-26 07:46:29.021 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-26 07:46:29.022 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-26 07:46:29.026 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-26 07:46:29.027 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 07:46:29.028 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 07:46:29.028 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 07:46:29.189  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-26 07:46:29.191  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-26 07:46:29.191 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-26 07:46:29.192 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 07:46:29.195  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-26 07:46:29.196  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-26 07:46:29.197 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 07:46:29.197 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 07:46:29.198 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 07:46:29.199 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 07:46:29.199 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 07:46:29.200 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 07:46:29.200 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 07:46:29.201 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 07:46:29.201 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 07:46:29.202 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-26 07:46:29.206 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 663838185038368736768695760232781041896290811643
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Oct 26 05:54:06 UTC 2021
           Final Date: Sun Oct 26 05:54:05 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [98:e3:87:10:a3:01:c0:3d:e5:8d:34:e7:ff:64:0e:de:64:d8:1a:d3]
            modulus: eae95a30fa97a07d0960ca92f67d9d330b66f90db343ec1b2baf94e5149c79cf743d764c3dfe23b2db3844d956dfd80a6659b5c19fe48852128ce4703694c7a13f020e1237afdd39edd4b043dac21175b2914254a8cff582133c47fbd297eb881535f166ecaad292854502b6725e822912e259119dc5cae772f5108ec090a7d1237445c5e7d81f23ed097d3e5f7d9dcc099e397c97a13c24ed4a65354cf0b96deaa5ab974fd9990008fb4a5d0a25c3091f391fc60ce616e7b207a89ad804c2700863e914dc593f5f3007ec7faebb21f3f33ca4a1c262c3cfa3624c87d00528f0f16eeb9da2e6dc9ca2dc0463ac490179df306c1674e77f5f50bac0a62b9183a7bec9c4e739308a3d3c9c5741d04822c55054184154fefa3efe5e38414aa71bd73f712dfc0de5b38269bdf957407b7e897914af204aa631f74bb7d51156a877a55972cbe7a1ab59afbdd1065f72c0a642a3624a707c905e229fdc8d959f6f414362d6c0831897b4432e4a7419ff8d00da4e35c6a9513b314b34fbb900341285ff
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ce7794da9e58f0fda32ba9b552482ee037511922
                       d496d8ffd67ecec609b610d4f7ca7084f7d37466
                       effd84ca55995ed76dea13787b2477734f1d9c20
                       65b057591bfa27e6edf45f9559f8444980950b0c
                       3e76cabf275bf60f0e7365aeb353632a9fd29bb4
                       3fb4d07fc3cd5ac8c94934300517487587d0cb8f
                       532109860b1c17b3c94f468a03a72ce1e63b8946
                       39a284911ff81d677741ea693181e01496b40b8d
                       ab503e7344c8fcb33910070a0d7ba95963a5ac43
                       7fc3233b23dac43fc7fa25c51be475c485c6a266
                       eb7cfb8b13837ba17d15c78cf98600a5f09129e3
                       0d726fdae1db09dfa8f34bf1a7efc72b0d39defe
                       aa065e4b6387ef600e9d82c9db5977f7c51c9a32
                       b93dc2123ced9debd0b25f4555d288fe5f595856
                       52b4fbebdfdfdc19597c8851eadc82612bfbb70f
                       e54affa0d747dab8212773167abf95d8d0c379a9
                       78949983d60fda12e345c3416e82011369a1af9d
                       db6bab8df9f69f8ea33215cd8bdd7523ea100ec6
                       a351d367f5bb438f307c221170e24f15c5da42f5
                       7576dccf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cd:7b:58:ab:f5:fe:4d:c4:43:31:e8:31:83:25:9f:d4:25:c1:07:17]
            modulus: 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
    public exponent: 10001

] 
2021-10-26 07:47:03.162  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-26 07:47:03.164 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-26 07:47:03.166 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-26 07:47:03.167 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-26 07:47:03.168  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-26 07:47:03.168  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-26 07:47:03.169  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-26 07:47:03.170 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-26 07:47:03.170 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-26 07:47:03.171 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-26 07:47:03.176 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-26 07:47:03.177 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 07:47:03.178 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 07:47:03.178 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 07:47:03.310  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-26 07:47:03.313  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-26 07:47:03.314 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-26 07:47:03.314 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 07:47:03.316  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-26 07:47:03.317  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-26 07:47:03.317 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 07:47:03.318 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 07:47:03.318 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 07:47:03.319 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 07:47:03.319 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 07:47:03.320 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 07:47:03.321 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 07:47:03.321 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 07:47:03.322 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 07:47:03.323 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-26 07:47:03.327 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 663838185038368736768695760232781041896290811643
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Oct 26 05:54:06 UTC 2021
           Final Date: Sun Oct 26 05:54:05 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [98:e3:87:10:a3:01:c0:3d:e5:8d:34:e7:ff:64:0e:de:64:d8:1a:d3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ce7794da9e58f0fda32ba9b552482ee037511922
                       d496d8ffd67ecec609b610d4f7ca7084f7d37466
                       effd84ca55995ed76dea13787b2477734f1d9c20
                       65b057591bfa27e6edf45f9559f8444980950b0c
                       3e76cabf275bf60f0e7365aeb353632a9fd29bb4
                       3fb4d07fc3cd5ac8c94934300517487587d0cb8f
                       532109860b1c17b3c94f468a03a72ce1e63b8946
                       39a284911ff81d677741ea693181e01496b40b8d
                       ab503e7344c8fcb33910070a0d7ba95963a5ac43
                       7fc3233b23dac43fc7fa25c51be475c485c6a266
                       eb7cfb8b13837ba17d15c78cf98600a5f09129e3
                       0d726fdae1db09dfa8f34bf1a7efc72b0d39defe
                       aa065e4b6387ef600e9d82c9db5977f7c51c9a32
                       b93dc2123ced9debd0b25f4555d288fe5f595856
                       52b4fbebdfdfdc19597c8851eadc82612bfbb70f
                       e54affa0d747dab8212773167abf95d8d0c379a9
                       78949983d60fda12e345c3416e82011369a1af9d
                       db6bab8df9f69f8ea33215cd8bdd7523ea100ec6
                       a351d367f5bb438f307c221170e24f15c5da42f5
                       7576dccf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [74:c3:6b:f9:f1:5f:49:e9:a6:81:76:a8:e0:71:57:47:b5:e3:21:bf]
            modulus: ba0157539f35360d84d760acaf4dbebd2ae538fd19455a766eb0719c5f3046ddb37a822d2dc5484ec6c8768c8630c4eb39e1eb9af0ce43466656daa8b813cb8225ab5cdc8b2736ce4287a1cee51d623f010fef02a59fbb57e8554397ef94733ea97b1fa94fa36833c9e5f59c7220fd2d8a3b17dd390010d3872364321d1093c4b59f498a6bd96d42458cf68fdedf6af5e191b4d481c1faffa55128b1d10d172bf93031a818e1fdd9dfb108ba91cf44f6f8cd91d9ab088577f3ebfc0d9571516fc21a175263398c366136482f58b90009adccf33535f70ca3fa2854f80494e5b974912f5ebf1a44d44ca38d3b6b3dc0a9474ed52a923d217dba2ba79f0f8d0405
    public exponent: 10001

] 
2021-10-26 07:48:49.108  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-26 07:48:49.110 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-26 07:48:49.113 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-26 07:48:49.114 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-26 07:48:49.114  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-26 07:48:49.115  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-26 07:48:49.115  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-26 07:48:49.115 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-26 07:48:49.116 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-26 07:48:49.116 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-26 07:48:49.121 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-26 07:48:49.121 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 07:48:49.122 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 07:48:49.122 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 07:48:49.269  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-26 07:48:49.272  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-26 07:48:49.272 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-26 07:48:49.272 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 07:48:49.274  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-26 07:48:49.274  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-26 07:48:49.275 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 07:48:49.275 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 07:48:49.275 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 07:48:49.276 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 07:48:49.276 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 07:48:49.276 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 07:48:49.277 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 07:48:49.278 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 07:48:49.278 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 07:48:49.279 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-26 07:48:49.283 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 663838185038368736768695760232781041896290811643
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Oct 26 05:54:06 UTC 2021
           Final Date: Sun Oct 26 05:54:05 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [98:e3:87:10:a3:01:c0:3d:e5:8d:34:e7:ff:64:0e:de:64:d8:1a:d3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ce7794da9e58f0fda32ba9b552482ee037511922
                       d496d8ffd67ecec609b610d4f7ca7084f7d37466
                       effd84ca55995ed76dea13787b2477734f1d9c20
                       65b057591bfa27e6edf45f9559f8444980950b0c
                       3e76cabf275bf60f0e7365aeb353632a9fd29bb4
                       3fb4d07fc3cd5ac8c94934300517487587d0cb8f
                       532109860b1c17b3c94f468a03a72ce1e63b8946
                       39a284911ff81d677741ea693181e01496b40b8d
                       ab503e7344c8fcb33910070a0d7ba95963a5ac43
                       7fc3233b23dac43fc7fa25c51be475c485c6a266
                       eb7cfb8b13837ba17d15c78cf98600a5f09129e3
                       0d726fdae1db09dfa8f34bf1a7efc72b0d39defe
                       aa065e4b6387ef600e9d82c9db5977f7c51c9a32
                       b93dc2123ced9debd0b25f4555d288fe5f595856
                       52b4fbebdfdfdc19597c8851eadc82612bfbb70f
                       e54affa0d747dab8212773167abf95d8d0c379a9
                       78949983d60fda12e345c3416e82011369a1af9d
                       db6bab8df9f69f8ea33215cd8bdd7523ea100ec6
                       a351d367f5bb438f307c221170e24f15c5da42f5
                       7576dccf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [14:a9:79:e5:4f:63:95:41:1e:b3:23:17:75:25:c5:c6:78:0a:a1:64]
            modulus: c2fca7849466ced47a207758a166a18a5d96f1cda2b357a921e96d04b67dfef4e9cf93f508e7217723cc711916e0fe1c428d0adadd133a5415ba829ca27e09fbe2779546e6bf25be02d6fa321d908f8537a4047c73cce87779df018ab57577995d840feab738864ee45046f005ebfed1c502153120254f865ccccbdfad70198b7d8deefe9c3c98969e40ab527c5745420a68e90cbeb42faff8cb951c423b67909b5bac511cb9c00f7da373e255d3bb7aefa07fd52034c06aa70468ac1d8d38cb064f976a3c399bfae13185d1cd3e04b7ef8775c496161656b93254c4d1b1673dece3f5884a0296c5e9ddcecbc3f26c9ba0ca0d366fd902f5c741210c10b04d8b
    public exponent: 10001

] 
2021-10-26 07:58:31.301  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-26 07:58:31.304 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-26 07:58:31.306 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-26 07:58:31.307 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-26 07:58:31.307  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-26 07:58:31.308  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-26 07:58:31.308  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-26 07:58:31.308 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-26 07:58:31.309 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-26 07:58:31.309 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-26 07:58:31.315 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-26 07:58:31.315 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 07:58:31.316 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-26 07:58:31.316 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 07:58:31.464  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-26 07:58:31.464  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-26 07:58:31.465 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-26 07:58:31.465 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-26 07:58:31.466  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-26 07:58:31.467  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-26 07:58:31.467 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 07:58:31.467 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 07:58:31.468 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 07:58:31.468 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 07:58:31.469 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 07:58:31.469 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 07:58:31.470 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-26 07:58:31.470 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-26 07:58:31.470 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-26 07:58:31.471 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-26 07:58:31.480 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 663838185038368736768695760232781041896290811643
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Oct 26 05:54:06 UTC 2021
           Final Date: Sun Oct 26 05:54:05 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [98:e3:87:10:a3:01:c0:3d:e5:8d:34:e7:ff:64:0e:de:64:d8:1a:d3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ce7794da9e58f0fda32ba9b552482ee037511922
                       d496d8ffd67ecec609b610d4f7ca7084f7d37466
                       effd84ca55995ed76dea13787b2477734f1d9c20
                       65b057591bfa27e6edf45f9559f8444980950b0c
                       3e76cabf275bf60f0e7365aeb353632a9fd29bb4
                       3fb4d07fc3cd5ac8c94934300517487587d0cb8f
                       532109860b1c17b3c94f468a03a72ce1e63b8946
                       39a284911ff81d677741ea693181e01496b40b8d
                       ab503e7344c8fcb33910070a0d7ba95963a5ac43
                       7fc3233b23dac43fc7fa25c51be475c485c6a266
                       eb7cfb8b13837ba17d15c78cf98600a5f09129e3
                       0d726fdae1db09dfa8f34bf1a7efc72b0d39defe
                       aa065e4b6387ef600e9d82c9db5977f7c51c9a32
                       b93dc2123ced9debd0b25f4555d288fe5f595856
                       52b4fbebdfdfdc19597c8851eadc82612bfbb70f
                       e54affa0d747dab8212773167abf95d8d0c379a9
                       78949983d60fda12e345c3416e82011369a1af9d
                       db6bab8df9f69f8ea33215cd8bdd7523ea100ec6
                       a351d367f5bb438f307c221170e24f15c5da42f5
                       7576dccf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d3:c5:11:15:f4:42:e6:03:1c:3c:96:c9:5e:68:f6:c6:e7:e3:d5:36]
            modulus: a56c9ab2d74b6aef975e11da3d687bde80b1810d53e644dbea1a414872889a5ee7c747a0c549e0e95b3077b012d5654b74dab8bc0fa902ab98853cdd2d40ee0a068dbafcb2e865070e93e8863ebe0a0ba36880c21aacc2f3ab7fa4ef1898cb9980c439800253fef8e619f86286801b0d862818c843e5c0226053fa0675e18e6b2f12d899eb5ea142a267b73526424ae20f49ca6e6cadfe2b4b5a1fd7e8cd502b4b6999e037bd3241fbd02ddb259da54117a9d562899a45943a5c630b2e9d935f02926d71df967f2bc6d5922877d8b4c5b5050f38316f513b69803ae2cf203c9e4ff8ff78ebde154cd094e0fca8b0083504c7799540bc74336ec2ae78c133cb51
    public exponent: 10001

]