Results

By type

          2022-04-06 08:39:34,998 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-04-06 08:39:38,603 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-04-06 08:39:41.387  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Apr 06, 2022 8:39:49 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Apr 06, 2022 8:39:49 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Apr 06, 2022 8:39:49 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Apr 06, 2022 8:39:49 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-04-06 08:39:51.303 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-04-06 08:39:52.294  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-04-06 08:39:52.885  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-04-06 08:39:55.601 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-04-06 08:39:55.603 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-04-06 08:39:55.605 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-04-06 08:39:55.608 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-04-06 08:39:55.794 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-04-06 08:39:55.797 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-04-06 08:39:56.290 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-04-06 08:39:59.987 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Apr 06, 2022 8:40:02 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-04-06 08:40:03.605  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 31.807 seconds (JVM running for 38.257)
Apr 06, 2022 8:40:08 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-04-06 08:41:02.293  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-06 08:41:02.299 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-06 08:41:02.410 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-04-06 08:41:02.412 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-06 08:41:02.492  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-04-06 08:41:02.494  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-06 08:41:02.495  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-06 08:41:02.496 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-06 08:41:02.497 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-06 08:41:02.584 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-06 08:41:02.590 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-06 08:41:02.593 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-06 08:41:02.695 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-06 08:41:02.698 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-06 08:41:02.699 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-06 08:41:02.702 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-06 08:41:03.849  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-06 08:41:03.852  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-06 08:41:03.852 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-06 08:41:03.853 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-06 08:41:03.861  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-06 08:41:03.862  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-06 08:41:03.863 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 08:41:03.863 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 08:41:03.863 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 08:41:03.889 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 08:41:03.890 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 08:41:03.890 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 08:41:03.895 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 08:41:03.895 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 08:41:03.896 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 08:41:03.897 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-06 08:41:04.010 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 473682973315951657899939917751128779387426138107
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 06 08:35:42 UTC 2022
           Final Date: Mon Apr 05 08:35:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [18:12:a7:dc:ce:0b:a4:3f:9f:5f:04:50:6e:3c:92:16:05:68:ae:bd]
            modulus: 9b5a2bbf097e9675c8505ffb4b408bca65cca4ab50d541426d59d90eaacfa8cdde4db14fca212b8224a5123ee4cd5c45239bba02a03421d2d18f1b3e5d263af4d304693f14cb65acb8e3313d41d4b55674bb61df20eadfdb7186d69fd159db15d8d0aeaf082776dc1537127fe18b2848ec92f1517b1b2eb774e55b44757e0a32e52aa58d4b37782497c18b339e53dc557defab1f4f87bc21fc9ec6f58c9fe1db4436e67e1f1c26cf1561758ab008cad276c64171883b1e23ec61d7e0a8ea0e4f6c429b1d5b7d9360765d1879278be78cda617e9a3797878b58ca1405183f172cfa2f26f5f8835bfd62755dd5931b86e40e688fbbea42beecabbc5c72f5115a90eda19db2711426f8ab75e4cd1f3b77459d11d15dbbca7355e906be1b4170a9cc33b9ccadbb76d55842c8dfeb399312464b5ae00c09e6f6d0c162c35ad83fa3fa4693bee46f94b957a61a95caab33bc685e8e1cf831e0fa822a7560af39bbb6d6bd8e0894b1c78b349cdf771a585c35cd2158982c17c706a954971264667e9adf
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 113ce01df2a971f8edd6f135720557defebc0966
                       305f0fcd1d3898360f64be324a69da769ba1991f
                       c6aac890688818809b0a458f0e3d3321d401cfdb
                       467d384bf651e0b36fc661f8a5c5a0738d8fe1df
                       4c03c505736d89077484e5e6b7ccb5f5c3cdf3e2
                       a81f01e0f6665cdd53f4ad659cc120e246c63f4e
                       83ed5f97a87d7c8da5273845e5b84e2b58bcf67d
                       2483953fc7ccdb15f304762795583f3ddf101562
                       ddd4da20d2755948f34a89c3271cbe08fa4c9218
                       322c9c5bf2fa397f0cce96e879d8bb248b8daa10
                       e48373715f9519e0b7a458cc4540a5090c22ea67
                       7691418f1ddcede62acfc58059187d41c41b606a
                       03707948f4f399b5f008e6b06c788f71479fc016
                       a3833b3b751b610d7bf7862195df28aa05b820f2
                       d4edac238151ff466e1a76bbcda64cb3fe63ef88
                       2989553414a758437e1332c367bc4b63ca9cf8c5
                       366f739c5b1268e4ac68f180c40f6c4444b2392b
                       2b385d75fc2349ec204f3676176ff41bc1891caa
                       f53d3f86fe973d28262fc0d3aa0afe5f360741a7
                       1906cb86
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [62:24:79:0e:98:f3:37:83:8f:92:0f:ea:a0:dd:7c:35:8c:ff:6d:77]
            modulus: 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
    public exponent: 10001

] 
2022-04-06 10:29:33.922  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-06 10:29:33.923 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-06 10:29:33.925 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-06 10:29:33.926 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-06 10:29:33.927  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-06 10:29:33.928  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-06 10:29:33.928  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-06 10:29:33.929 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-06 10:29:33.929 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-06 10:29:33.930 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-06 10:29:33.985 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-06 10:29:33.986 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-06 10:29:33.986 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-06 10:29:33.987 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-06 10:29:34.139  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-06 10:29:34.140  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-06 10:29:34.140 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-06 10:29:34.140 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-06 10:29:34.143  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-06 10:29:34.143  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-06 10:29:34.144 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 10:29:34.144 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 10:29:34.145 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 10:29:34.146 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 10:29:34.146 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 10:29:34.146 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 10:29:34.147 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 10:29:34.148 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 10:29:34.148 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 10:29:34.149 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-06 10:29:34.187 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 473682973315951657899939917751128779387426138107
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 06 08:35:42 UTC 2022
           Final Date: Mon Apr 05 08:35:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [18:12:a7:dc:ce:0b:a4:3f:9f:5f:04:50:6e:3c:92:16:05:68:ae:bd]
            modulus: 9b5a2bbf097e9675c8505ffb4b408bca65cca4ab50d541426d59d90eaacfa8cdde4db14fca212b8224a5123ee4cd5c45239bba02a03421d2d18f1b3e5d263af4d304693f14cb65acb8e3313d41d4b55674bb61df20eadfdb7186d69fd159db15d8d0aeaf082776dc1537127fe18b2848ec92f1517b1b2eb774e55b44757e0a32e52aa58d4b37782497c18b339e53dc557defab1f4f87bc21fc9ec6f58c9fe1db4436e67e1f1c26cf1561758ab008cad276c64171883b1e23ec61d7e0a8ea0e4f6c429b1d5b7d9360765d1879278be78cda617e9a3797878b58ca1405183f172cfa2f26f5f8835bfd62755dd5931b86e40e688fbbea42beecabbc5c72f5115a90eda19db2711426f8ab75e4cd1f3b77459d11d15dbbca7355e906be1b4170a9cc33b9ccadbb76d55842c8dfeb399312464b5ae00c09e6f6d0c162c35ad83fa3fa4693bee46f94b957a61a95caab33bc685e8e1cf831e0fa822a7560af39bbb6d6bd8e0894b1c78b349cdf771a585c35cd2158982c17c706a954971264667e9adf
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 113ce01df2a971f8edd6f135720557defebc0966
                       305f0fcd1d3898360f64be324a69da769ba1991f
                       c6aac890688818809b0a458f0e3d3321d401cfdb
                       467d384bf651e0b36fc661f8a5c5a0738d8fe1df
                       4c03c505736d89077484e5e6b7ccb5f5c3cdf3e2
                       a81f01e0f6665cdd53f4ad659cc120e246c63f4e
                       83ed5f97a87d7c8da5273845e5b84e2b58bcf67d
                       2483953fc7ccdb15f304762795583f3ddf101562
                       ddd4da20d2755948f34a89c3271cbe08fa4c9218
                       322c9c5bf2fa397f0cce96e879d8bb248b8daa10
                       e48373715f9519e0b7a458cc4540a5090c22ea67
                       7691418f1ddcede62acfc58059187d41c41b606a
                       03707948f4f399b5f008e6b06c788f71479fc016
                       a3833b3b751b610d7bf7862195df28aa05b820f2
                       d4edac238151ff466e1a76bbcda64cb3fe63ef88
                       2989553414a758437e1332c367bc4b63ca9cf8c5
                       366f739c5b1268e4ac68f180c40f6c4444b2392b
                       2b385d75fc2349ec204f3676176ff41bc1891caa
                       f53d3f86fe973d28262fc0d3aa0afe5f360741a7
                       1906cb86
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [be:36:00:dd:ef:67:de:57:02:d1:54:75:4e:2d:a7:26:13:6c:28:87]
            modulus: b0a45ae1c2be4bc42517b9c32e79a238bd848b3125511b16afc304796fb2c9d66cf9f88330a5105ddcdf6070f116ffc7028411c6efe163877589fdba36f262664946a3538689b6444692d629c871f148a21cb9eadd248feba82ff5d873ee7b8439c5e6fb5face0d02f4ee6b1290d4b586a6d923e2144bd8a60edf38a226bdd3b781429046698c29c579965b9c2f63e0f4fece143e06f8ee92ed4294becf2531af8920c8780dc7f96d7b5f1b933fee7df82eb620f247a42ab37636b5c40c712721c106e97eaa4a4c141163c68fe4d41776110c8a6f8f72ce09929b04b440a4dfc091b22a24ca17e94a6ab8d97c73b4be4b36e5f030b6e37d3a6b9ecc45d4b15a9
    public exponent: 10001

] 
2022-04-06 10:33:03.673  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-06 10:33:03.674 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-06 10:33:03.676 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-06 10:33:03.677 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-06 10:33:03.678  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-06 10:33:03.678  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-06 10:33:03.679  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-06 10:33:03.679 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-06 10:33:03.679 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-06 10:33:03.680 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-06 10:33:03.690 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-06 10:33:03.691 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-06 10:33:03.691 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-06 10:33:03.692 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-06 10:33:03.832  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-06 10:33:03.833  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-06 10:33:03.833 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-06 10:33:03.834 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-06 10:33:03.835  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-06 10:33:03.835  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-06 10:33:03.836 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 10:33:03.836 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 10:33:03.836 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 10:33:03.837 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 10:33:03.837 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 10:33:03.837 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 10:33:03.883 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 10:33:03.884 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 10:33:03.884 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 10:33:03.885 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-06 10:33:03.889 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 473682973315951657899939917751128779387426138107
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 06 08:35:42 UTC 2022
           Final Date: Mon Apr 05 08:35:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [18:12:a7:dc:ce:0b:a4:3f:9f:5f:04:50:6e:3c:92:16:05:68:ae:bd]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 113ce01df2a971f8edd6f135720557defebc0966
                       305f0fcd1d3898360f64be324a69da769ba1991f
                       c6aac890688818809b0a458f0e3d3321d401cfdb
                       467d384bf651e0b36fc661f8a5c5a0738d8fe1df
                       4c03c505736d89077484e5e6b7ccb5f5c3cdf3e2
                       a81f01e0f6665cdd53f4ad659cc120e246c63f4e
                       83ed5f97a87d7c8da5273845e5b84e2b58bcf67d
                       2483953fc7ccdb15f304762795583f3ddf101562
                       ddd4da20d2755948f34a89c3271cbe08fa4c9218
                       322c9c5bf2fa397f0cce96e879d8bb248b8daa10
                       e48373715f9519e0b7a458cc4540a5090c22ea67
                       7691418f1ddcede62acfc58059187d41c41b606a
                       03707948f4f399b5f008e6b06c788f71479fc016
                       a3833b3b751b610d7bf7862195df28aa05b820f2
                       d4edac238151ff466e1a76bbcda64cb3fe63ef88
                       2989553414a758437e1332c367bc4b63ca9cf8c5
                       366f739c5b1268e4ac68f180c40f6c4444b2392b
                       2b385d75fc2349ec204f3676176ff41bc1891caa
                       f53d3f86fe973d28262fc0d3aa0afe5f360741a7
                       1906cb86
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c6:7c:a7:c3:34:f0:95:c4:95:1d:01:b8:a3:ca:38:30:c7:48:b2:d4]
            modulus: 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
    public exponent: 10001

] 
2022-04-06 10:34:36.181  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-06 10:34:36.182 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-06 10:34:36.183 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-06 10:34:36.183 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-06 10:34:36.184  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-06 10:34:36.184  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-06 10:34:36.185  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-06 10:34:36.185 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-06 10:34:36.185 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-06 10:34:36.186 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-06 10:34:36.190 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-06 10:34:36.190 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-06 10:34:36.191 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-06 10:34:36.191 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-06 10:34:36.323  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-06 10:34:36.323  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-06 10:34:36.323 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-06 10:34:36.324 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-06 10:34:36.325  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-06 10:34:36.326  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-06 10:34:36.326 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 10:34:36.326 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 10:34:36.326 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 10:34:36.327 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 10:34:36.327 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 10:34:36.327 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 10:34:36.328 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 10:34:36.328 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 10:34:36.328 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 10:34:36.329 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-06 10:34:36.384 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 473682973315951657899939917751128779387426138107
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 06 08:35:42 UTC 2022
           Final Date: Mon Apr 05 08:35:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [18:12:a7:dc:ce:0b:a4:3f:9f:5f:04:50:6e:3c:92:16:05:68:ae:bd]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 113ce01df2a971f8edd6f135720557defebc0966
                       305f0fcd1d3898360f64be324a69da769ba1991f
                       c6aac890688818809b0a458f0e3d3321d401cfdb
                       467d384bf651e0b36fc661f8a5c5a0738d8fe1df
                       4c03c505736d89077484e5e6b7ccb5f5c3cdf3e2
                       a81f01e0f6665cdd53f4ad659cc120e246c63f4e
                       83ed5f97a87d7c8da5273845e5b84e2b58bcf67d
                       2483953fc7ccdb15f304762795583f3ddf101562
                       ddd4da20d2755948f34a89c3271cbe08fa4c9218
                       322c9c5bf2fa397f0cce96e879d8bb248b8daa10
                       e48373715f9519e0b7a458cc4540a5090c22ea67
                       7691418f1ddcede62acfc58059187d41c41b606a
                       03707948f4f399b5f008e6b06c788f71479fc016
                       a3833b3b751b610d7bf7862195df28aa05b820f2
                       d4edac238151ff466e1a76bbcda64cb3fe63ef88
                       2989553414a758437e1332c367bc4b63ca9cf8c5
                       366f739c5b1268e4ac68f180c40f6c4444b2392b
                       2b385d75fc2349ec204f3676176ff41bc1891caa
                       f53d3f86fe973d28262fc0d3aa0afe5f360741a7
                       1906cb86
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5c:d5:a0:b4:ef:03:2d:a3:77:97:0b:a7:61:70:11:d1:d5:30:b2:15]
            modulus: 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
    public exponent: 10001

] 
2022-04-06 10:37:14.269  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-06 10:37:14.270 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-06 10:37:14.271 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-06 10:37:14.271 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-06 10:37:14.272  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-06 10:37:14.272  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-06 10:37:14.273  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-06 10:37:14.273 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-06 10:37:14.273 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-06 10:37:14.274 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-06 10:37:14.278 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-06 10:37:14.278 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-06 10:37:14.278 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-06 10:37:14.279 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-06 10:37:14.386  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-06 10:37:14.386  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-06 10:37:14.386 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-06 10:37:14.387 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-06 10:37:14.388  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-06 10:37:14.388  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-06 10:37:14.389 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 10:37:14.389 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 10:37:14.389 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 10:37:14.390 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 10:37:14.390 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 10:37:14.390 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 10:37:14.391 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 10:37:14.391 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 10:37:14.391 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 10:37:14.392 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-06 10:37:14.396 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 473682973315951657899939917751128779387426138107
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 06 08:35:42 UTC 2022
           Final Date: Mon Apr 05 08:35:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [18:12:a7:dc:ce:0b:a4:3f:9f:5f:04:50:6e:3c:92:16:05:68:ae:bd]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 113ce01df2a971f8edd6f135720557defebc0966
                       305f0fcd1d3898360f64be324a69da769ba1991f
                       c6aac890688818809b0a458f0e3d3321d401cfdb
                       467d384bf651e0b36fc661f8a5c5a0738d8fe1df
                       4c03c505736d89077484e5e6b7ccb5f5c3cdf3e2
                       a81f01e0f6665cdd53f4ad659cc120e246c63f4e
                       83ed5f97a87d7c8da5273845e5b84e2b58bcf67d
                       2483953fc7ccdb15f304762795583f3ddf101562
                       ddd4da20d2755948f34a89c3271cbe08fa4c9218
                       322c9c5bf2fa397f0cce96e879d8bb248b8daa10
                       e48373715f9519e0b7a458cc4540a5090c22ea67
                       7691418f1ddcede62acfc58059187d41c41b606a
                       03707948f4f399b5f008e6b06c788f71479fc016
                       a3833b3b751b610d7bf7862195df28aa05b820f2
                       d4edac238151ff466e1a76bbcda64cb3fe63ef88
                       2989553414a758437e1332c367bc4b63ca9cf8c5
                       366f739c5b1268e4ac68f180c40f6c4444b2392b
                       2b385d75fc2349ec204f3676176ff41bc1891caa
                       f53d3f86fe973d28262fc0d3aa0afe5f360741a7
                       1906cb86
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [00:fd:a1:b0:87:5a:7f:05:5f:54:a1:69:16:31:bd:45:46:e7:0d:4f]
            modulus: bedd44820d3316a332bf7f73e049b2db997f31877fa10b553474d95c57a3227b39c9fe15c80f45de3553b020d815aee18ee239de31146e0230df54c40a3237f48f348ed92ed7233bc2034fd63a4fc2c354669d4b350d1e92744dcf5d3ad4b7b585b3d67201ddc2222c23a7ad131f7b6995ca326aa7037a7eaf934dd2ca364d42c17ec469e0c090866b029272cada8080996fd290eb0e93819306145dfd18ea0054d482fe808beb49c254781de5efd77c6c1e881a24d1b28e26e9799b0d4013b6349252c5b2424ddf75ea0b770c44efea5a60bdfbc2fdadbc2870e2e4ce453cef099a75526eff8339897f7e90d4b57074192113d6806ccc0bc92b09feb47598a3
    public exponent: 10001

] 
2022-04-06 10:41:41.335  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-06 10:41:41.336 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-06 10:41:41.338 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-04-06 10:41:41.338 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-06 10:41:41.339  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-04-06 10:41:41.339  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-06 10:41:41.339  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-06 10:41:41.340 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-06 10:41:41.340 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-06 10:41:41.341 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-06 10:41:41.346 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-06 10:41:41.346 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-06 10:41:41.346 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-06 10:41:41.347 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-06 10:41:41.449  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-06 10:41:41.450  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-06 10:41:41.450 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-06 10:41:41.450 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-06 10:41:41.452  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-06 10:41:41.452  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-06 10:41:41.452 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 10:41:41.453 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 10:41:41.453 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 10:41:41.453 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 10:41:41.453 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 10:41:41.454 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 10:41:41.454 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 10:41:41.455 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 10:41:41.455 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 10:41:41.483 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-06 10:41:41.490 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 473682973315951657899939917751128779387426138107
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 06 08:35:42 UTC 2022
           Final Date: Mon Apr 05 08:35:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [18:12:a7:dc:ce:0b:a4:3f:9f:5f:04:50:6e:3c:92:16:05:68:ae:bd]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 113ce01df2a971f8edd6f135720557defebc0966
                       305f0fcd1d3898360f64be324a69da769ba1991f
                       c6aac890688818809b0a458f0e3d3321d401cfdb
                       467d384bf651e0b36fc661f8a5c5a0738d8fe1df
                       4c03c505736d89077484e5e6b7ccb5f5c3cdf3e2
                       a81f01e0f6665cdd53f4ad659cc120e246c63f4e
                       83ed5f97a87d7c8da5273845e5b84e2b58bcf67d
                       2483953fc7ccdb15f304762795583f3ddf101562
                       ddd4da20d2755948f34a89c3271cbe08fa4c9218
                       322c9c5bf2fa397f0cce96e879d8bb248b8daa10
                       e48373715f9519e0b7a458cc4540a5090c22ea67
                       7691418f1ddcede62acfc58059187d41c41b606a
                       03707948f4f399b5f008e6b06c788f71479fc016
                       a3833b3b751b610d7bf7862195df28aa05b820f2
                       d4edac238151ff466e1a76bbcda64cb3fe63ef88
                       2989553414a758437e1332c367bc4b63ca9cf8c5
                       366f739c5b1268e4ac68f180c40f6c4444b2392b
                       2b385d75fc2349ec204f3676176ff41bc1891caa
                       f53d3f86fe973d28262fc0d3aa0afe5f360741a7
                       1906cb86
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ad:50:fa:da:92:25:ed:27:8e:ac:a4:75:58:06:31:fe:9b:a4:b8:77]
            modulus: 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
    public exponent: 10001

] 
2022-04-06 10:42:48.387  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-06 10:42:48.388 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-06 10:42:48.390 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-06 10:42:48.390 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-06 10:42:48.390  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-06 10:42:48.391  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-06 10:42:48.391  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-06 10:42:48.391 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-06 10:42:48.392 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-06 10:42:48.392 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-06 10:42:48.396 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-06 10:42:48.396 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-06 10:42:48.397 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-06 10:42:48.397 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-06 10:42:48.505  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-06 10:42:48.505  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-06 10:42:48.506 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-06 10:42:48.506 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-06 10:42:48.507  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-06 10:42:48.507  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-06 10:42:48.508 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 10:42:48.508 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 10:42:48.508 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 10:42:48.509 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 10:42:48.509 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 10:42:48.510 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 10:42:48.510 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 10:42:48.510 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 10:42:48.511 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 10:42:48.511 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-06 10:42:48.514 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 473682973315951657899939917751128779387426138107
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 06 08:35:42 UTC 2022
           Final Date: Mon Apr 05 08:35:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [18:12:a7:dc:ce:0b:a4:3f:9f:5f:04:50:6e:3c:92:16:05:68:ae:bd]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 113ce01df2a971f8edd6f135720557defebc0966
                       305f0fcd1d3898360f64be324a69da769ba1991f
                       c6aac890688818809b0a458f0e3d3321d401cfdb
                       467d384bf651e0b36fc661f8a5c5a0738d8fe1df
                       4c03c505736d89077484e5e6b7ccb5f5c3cdf3e2
                       a81f01e0f6665cdd53f4ad659cc120e246c63f4e
                       83ed5f97a87d7c8da5273845e5b84e2b58bcf67d
                       2483953fc7ccdb15f304762795583f3ddf101562
                       ddd4da20d2755948f34a89c3271cbe08fa4c9218
                       322c9c5bf2fa397f0cce96e879d8bb248b8daa10
                       e48373715f9519e0b7a458cc4540a5090c22ea67
                       7691418f1ddcede62acfc58059187d41c41b606a
                       03707948f4f399b5f008e6b06c788f71479fc016
                       a3833b3b751b610d7bf7862195df28aa05b820f2
                       d4edac238151ff466e1a76bbcda64cb3fe63ef88
                       2989553414a758437e1332c367bc4b63ca9cf8c5
                       366f739c5b1268e4ac68f180c40f6c4444b2392b
                       2b385d75fc2349ec204f3676176ff41bc1891caa
                       f53d3f86fe973d28262fc0d3aa0afe5f360741a7
                       1906cb86
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5c:f0:fa:0f:a5:28:d6:ac:7c:a1:b6:cd:a1:6a:ac:1b:86:c2:17:7e]
            modulus: 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
    public exponent: 10001

] 
2022-04-06 10:45:15.926  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-06 10:45:15.927 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-06 10:45:15.928 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-06 10:45:15.929 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-06 10:45:15.929  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-06 10:45:15.930  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-06 10:45:15.930  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-06 10:45:15.930 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-06 10:45:15.930 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-06 10:45:15.931 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-06 10:45:15.936 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-06 10:45:15.937 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-06 10:45:15.937 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-06 10:45:15.937 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-06 10:45:16.042  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-06 10:45:16.042  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-06 10:45:16.043 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-06 10:45:16.043 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-06 10:45:16.044  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-06 10:45:16.044  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-06 10:45:16.044 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 10:45:16.044 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 10:45:16.045 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 10:45:16.045 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 10:45:16.045 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 10:45:16.045 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 10:45:16.046 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 10:45:16.046 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 10:45:16.046 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 10:45:16.047 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-06 10:45:16.049 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 473682973315951657899939917751128779387426138107
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 06 08:35:42 UTC 2022
           Final Date: Mon Apr 05 08:35:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [18:12:a7:dc:ce:0b:a4:3f:9f:5f:04:50:6e:3c:92:16:05:68:ae:bd]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 113ce01df2a971f8edd6f135720557defebc0966
                       305f0fcd1d3898360f64be324a69da769ba1991f
                       c6aac890688818809b0a458f0e3d3321d401cfdb
                       467d384bf651e0b36fc661f8a5c5a0738d8fe1df
                       4c03c505736d89077484e5e6b7ccb5f5c3cdf3e2
                       a81f01e0f6665cdd53f4ad659cc120e246c63f4e
                       83ed5f97a87d7c8da5273845e5b84e2b58bcf67d
                       2483953fc7ccdb15f304762795583f3ddf101562
                       ddd4da20d2755948f34a89c3271cbe08fa4c9218
                       322c9c5bf2fa397f0cce96e879d8bb248b8daa10
                       e48373715f9519e0b7a458cc4540a5090c22ea67
                       7691418f1ddcede62acfc58059187d41c41b606a
                       03707948f4f399b5f008e6b06c788f71479fc016
                       a3833b3b751b610d7bf7862195df28aa05b820f2
                       d4edac238151ff466e1a76bbcda64cb3fe63ef88
                       2989553414a758437e1332c367bc4b63ca9cf8c5
                       366f739c5b1268e4ac68f180c40f6c4444b2392b
                       2b385d75fc2349ec204f3676176ff41bc1891caa
                       f53d3f86fe973d28262fc0d3aa0afe5f360741a7
                       1906cb86
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f0:41:16:c5:cc:e2:5e:07:a6:0a:38:99:a7:1c:0d:71:e0:a3:54:20]
            modulus: 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
    public exponent: 10001

] 
2022-04-06 10:50:48.674  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-06 10:50:48.675 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-06 10:50:48.676 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-06 10:50:48.677 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-06 10:50:48.677  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-06 10:50:48.678  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-06 10:50:48.678  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-06 10:50:48.678 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-06 10:50:48.678 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-06 10:50:48.679 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-06 10:50:48.682 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-06 10:50:48.683 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-06 10:50:48.683 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-06 10:50:48.683 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-06 10:50:48.832  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-06 10:50:48.833  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-06 10:50:48.833 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-06 10:50:48.833 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-06 10:50:48.834  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-06 10:50:48.835  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-06 10:50:48.835 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 10:50:48.835 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 10:50:48.835 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 10:50:48.836 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 10:50:48.836 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 10:50:48.836 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 10:50:48.837 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 10:50:48.837 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 10:50:48.837 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 10:50:48.838 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-06 10:50:48.842 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 473682973315951657899939917751128779387426138107
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 06 08:35:42 UTC 2022
           Final Date: Mon Apr 05 08:35:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [18:12:a7:dc:ce:0b:a4:3f:9f:5f:04:50:6e:3c:92:16:05:68:ae:bd]
            modulus: 9b5a2bbf097e9675c8505ffb4b408bca65cca4ab50d541426d59d90eaacfa8cdde4db14fca212b8224a5123ee4cd5c45239bba02a03421d2d18f1b3e5d263af4d304693f14cb65acb8e3313d41d4b55674bb61df20eadfdb7186d69fd159db15d8d0aeaf082776dc1537127fe18b2848ec92f1517b1b2eb774e55b44757e0a32e52aa58d4b37782497c18b339e53dc557defab1f4f87bc21fc9ec6f58c9fe1db4436e67e1f1c26cf1561758ab008cad276c64171883b1e23ec61d7e0a8ea0e4f6c429b1d5b7d9360765d1879278be78cda617e9a3797878b58ca1405183f172cfa2f26f5f8835bfd62755dd5931b86e40e688fbbea42beecabbc5c72f5115a90eda19db2711426f8ab75e4cd1f3b77459d11d15dbbca7355e906be1b4170a9cc33b9ccadbb76d55842c8dfeb399312464b5ae00c09e6f6d0c162c35ad83fa3fa4693bee46f94b957a61a95caab33bc685e8e1cf831e0fa822a7560af39bbb6d6bd8e0894b1c78b349cdf771a585c35cd2158982c17c706a954971264667e9adf
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 113ce01df2a971f8edd6f135720557defebc0966
                       305f0fcd1d3898360f64be324a69da769ba1991f
                       c6aac890688818809b0a458f0e3d3321d401cfdb
                       467d384bf651e0b36fc661f8a5c5a0738d8fe1df
                       4c03c505736d89077484e5e6b7ccb5f5c3cdf3e2
                       a81f01e0f6665cdd53f4ad659cc120e246c63f4e
                       83ed5f97a87d7c8da5273845e5b84e2b58bcf67d
                       2483953fc7ccdb15f304762795583f3ddf101562
                       ddd4da20d2755948f34a89c3271cbe08fa4c9218
                       322c9c5bf2fa397f0cce96e879d8bb248b8daa10
                       e48373715f9519e0b7a458cc4540a5090c22ea67
                       7691418f1ddcede62acfc58059187d41c41b606a
                       03707948f4f399b5f008e6b06c788f71479fc016
                       a3833b3b751b610d7bf7862195df28aa05b820f2
                       d4edac238151ff466e1a76bbcda64cb3fe63ef88
                       2989553414a758437e1332c367bc4b63ca9cf8c5
                       366f739c5b1268e4ac68f180c40f6c4444b2392b
                       2b385d75fc2349ec204f3676176ff41bc1891caa
                       f53d3f86fe973d28262fc0d3aa0afe5f360741a7
                       1906cb86
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [05:ca:2f:61:c9:3c:39:af:48:10:3e:1b:ca:7c:75:dc:38:6d:45:8f]
            modulus: 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
    public exponent: 10001

] 
2022-04-06 10:50:49.153  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-06 10:50:49.154 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-06 10:50:49.155 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-06 10:50:49.155 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-06 10:50:49.155  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-06 10:50:49.156  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-06 10:50:49.156  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-06 10:50:49.156 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-06 10:50:49.156 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-06 10:50:49.156 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-06 10:50:49.160 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-06 10:50:49.161 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-06 10:50:49.161 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-06 10:50:49.161 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-06 10:50:49.234  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-06 10:50:49.234  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-06 10:50:49.234 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-06 10:50:49.234 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-06 10:50:49.235  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-06 10:50:49.236  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-06 10:50:49.236 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 10:50:49.236 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 10:50:49.236 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 10:50:49.236 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 10:50:49.237 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 10:50:49.237 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 10:50:49.237 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 10:50:49.237 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 10:50:49.238 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 10:50:49.238 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-06 10:50:49.241 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 473682973315951657899939917751128779387426138107
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 06 08:35:42 UTC 2022
           Final Date: Mon Apr 05 08:35:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [18:12:a7:dc:ce:0b:a4:3f:9f:5f:04:50:6e:3c:92:16:05:68:ae:bd]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 113ce01df2a971f8edd6f135720557defebc0966
                       305f0fcd1d3898360f64be324a69da769ba1991f
                       c6aac890688818809b0a458f0e3d3321d401cfdb
                       467d384bf651e0b36fc661f8a5c5a0738d8fe1df
                       4c03c505736d89077484e5e6b7ccb5f5c3cdf3e2
                       a81f01e0f6665cdd53f4ad659cc120e246c63f4e
                       83ed5f97a87d7c8da5273845e5b84e2b58bcf67d
                       2483953fc7ccdb15f304762795583f3ddf101562
                       ddd4da20d2755948f34a89c3271cbe08fa4c9218
                       322c9c5bf2fa397f0cce96e879d8bb248b8daa10
                       e48373715f9519e0b7a458cc4540a5090c22ea67
                       7691418f1ddcede62acfc58059187d41c41b606a
                       03707948f4f399b5f008e6b06c788f71479fc016
                       a3833b3b751b610d7bf7862195df28aa05b820f2
                       d4edac238151ff466e1a76bbcda64cb3fe63ef88
                       2989553414a758437e1332c367bc4b63ca9cf8c5
                       366f739c5b1268e4ac68f180c40f6c4444b2392b
                       2b385d75fc2349ec204f3676176ff41bc1891caa
                       f53d3f86fe973d28262fc0d3aa0afe5f360741a7
                       1906cb86
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [30:9e:14:e3:1a:35:aa:9a:83:14:ba:f3:c0:32:98:10:a6:a6:18:2c]
            modulus: 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
    public exponent: 10001

] 
2022-04-06 10:51:51.791  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-06 10:51:51.792 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-06 10:51:51.793 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-04-06 10:51:51.793 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-06 10:51:51.793  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-04-06 10:51:51.794  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-06 10:51:51.794  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-06 10:51:51.794 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-06 10:51:51.794 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-06 10:51:51.795 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-06 10:51:51.798 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-06 10:51:51.799 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-06 10:51:51.799 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-06 10:51:51.799 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-06 10:51:51.903  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-06 10:51:51.904  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-06 10:51:51.904 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-06 10:51:51.904 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-06 10:51:51.906  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-06 10:51:51.906  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-06 10:51:51.906 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 10:51:51.907 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 10:51:51.907 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 10:51:51.907 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 10:51:51.908 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 10:51:51.908 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 10:51:51.909 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 10:51:51.909 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 10:51:51.909 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 10:51:51.910 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-06 10:51:51.913 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 473682973315951657899939917751128779387426138107
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 06 08:35:42 UTC 2022
           Final Date: Mon Apr 05 08:35:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [18:12:a7:dc:ce:0b:a4:3f:9f:5f:04:50:6e:3c:92:16:05:68:ae:bd]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 113ce01df2a971f8edd6f135720557defebc0966
                       305f0fcd1d3898360f64be324a69da769ba1991f
                       c6aac890688818809b0a458f0e3d3321d401cfdb
                       467d384bf651e0b36fc661f8a5c5a0738d8fe1df
                       4c03c505736d89077484e5e6b7ccb5f5c3cdf3e2
                       a81f01e0f6665cdd53f4ad659cc120e246c63f4e
                       83ed5f97a87d7c8da5273845e5b84e2b58bcf67d
                       2483953fc7ccdb15f304762795583f3ddf101562
                       ddd4da20d2755948f34a89c3271cbe08fa4c9218
                       322c9c5bf2fa397f0cce96e879d8bb248b8daa10
                       e48373715f9519e0b7a458cc4540a5090c22ea67
                       7691418f1ddcede62acfc58059187d41c41b606a
                       03707948f4f399b5f008e6b06c788f71479fc016
                       a3833b3b751b610d7bf7862195df28aa05b820f2
                       d4edac238151ff466e1a76bbcda64cb3fe63ef88
                       2989553414a758437e1332c367bc4b63ca9cf8c5
                       366f739c5b1268e4ac68f180c40f6c4444b2392b
                       2b385d75fc2349ec204f3676176ff41bc1891caa
                       f53d3f86fe973d28262fc0d3aa0afe5f360741a7
                       1906cb86
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [80:e7:5b:ce:5b:0f:3d:97:4f:98:3b:81:14:12:a7:9f:6f:ba:c5:cd]
            modulus: bc2037b54929bd3f355b6d13d217a18fc83c4e4c429d7eea55b03b1f8116148195b6e0520c8cf16f530bf4aede9c6ff9a7bef8a427c5031e18a84ac176848c7e156406addc5b53fdb53a4aadc078b3ccda526495bc320cce86709abb2f50491db1a93285729616296e9cdcb7eed7b529f1c26658edbfdd40400826ad4281f64ec3dbfcd655c11ce182bb15b37062524971ba2be2eeddd2f4fe46ddacb8f1c07ab3f3f6011fbafcb5698fda2c2cbeb64828186271461f43e921a95940acf9f9ab5d42c395b4fbe7c6ede022dbb40c971cf641977119f4e2b2a742f49bdcdf030632290989bb9b232ca26adef1b2f4c818f726ba3be92f816a49cd1a4d3841f14b
    public exponent: 10001

] 
2022-04-06 10:56:15.548  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-06 10:56:15.549 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-06 10:56:15.552 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-06 10:56:15.553 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-06 10:56:15.553  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-06 10:56:15.554  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-06 10:56:15.554  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-06 10:56:15.554 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-06 10:56:15.554 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-06 10:56:15.555 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-06 10:56:15.560 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-06 10:56:15.560 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-06 10:56:15.560 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-06 10:56:15.561 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-06 10:56:15.669  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-06 10:56:15.670  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-06 10:56:15.670 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-06 10:56:15.670 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-06 10:56:15.671  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-06 10:56:15.671  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-06 10:56:15.672 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 10:56:15.672 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 10:56:15.672 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 10:56:15.673 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 10:56:15.673 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 10:56:15.673 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 10:56:15.674 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 10:56:15.674 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 10:56:15.674 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 10:56:15.675 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-06 10:56:15.678 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 473682973315951657899939917751128779387426138107
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 06 08:35:42 UTC 2022
           Final Date: Mon Apr 05 08:35:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [18:12:a7:dc:ce:0b:a4:3f:9f:5f:04:50:6e:3c:92:16:05:68:ae:bd]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 113ce01df2a971f8edd6f135720557defebc0966
                       305f0fcd1d3898360f64be324a69da769ba1991f
                       c6aac890688818809b0a458f0e3d3321d401cfdb
                       467d384bf651e0b36fc661f8a5c5a0738d8fe1df
                       4c03c505736d89077484e5e6b7ccb5f5c3cdf3e2
                       a81f01e0f6665cdd53f4ad659cc120e246c63f4e
                       83ed5f97a87d7c8da5273845e5b84e2b58bcf67d
                       2483953fc7ccdb15f304762795583f3ddf101562
                       ddd4da20d2755948f34a89c3271cbe08fa4c9218
                       322c9c5bf2fa397f0cce96e879d8bb248b8daa10
                       e48373715f9519e0b7a458cc4540a5090c22ea67
                       7691418f1ddcede62acfc58059187d41c41b606a
                       03707948f4f399b5f008e6b06c788f71479fc016
                       a3833b3b751b610d7bf7862195df28aa05b820f2
                       d4edac238151ff466e1a76bbcda64cb3fe63ef88
                       2989553414a758437e1332c367bc4b63ca9cf8c5
                       366f739c5b1268e4ac68f180c40f6c4444b2392b
                       2b385d75fc2349ec204f3676176ff41bc1891caa
                       f53d3f86fe973d28262fc0d3aa0afe5f360741a7
                       1906cb86
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1d:42:fa:47:9b:49:d6:12:20:62:26:7c:97:6b:d8:cb:0f:e2:fc:bb]
            modulus: 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
    public exponent: 10001

] 
2022-04-06 11:19:24.306  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-06 11:19:24.307 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-06 11:19:24.308 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-06 11:19:24.309 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-06 11:19:24.309  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-06 11:19:24.310  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-06 11:19:24.310  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-06 11:19:24.310 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-06 11:19:24.310 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-06 11:19:24.311 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-06 11:19:24.317 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-06 11:19:24.318 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-06 11:19:24.318 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-06 11:19:24.318 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-06 11:19:24.484  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-06 11:19:24.485  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-06 11:19:24.485 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-06 11:19:24.485 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-06 11:19:24.486  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-06 11:19:24.487  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-06 11:19:24.487 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 11:19:24.487 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 11:19:24.487 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 11:19:24.488 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 11:19:24.488 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 11:19:24.488 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 11:19:24.488 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 11:19:24.489 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 11:19:24.489 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 11:19:24.489 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-06 11:19:24.491 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 473682973315951657899939917751128779387426138107
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 06 08:35:42 UTC 2022
           Final Date: Mon Apr 05 08:35:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [18:12:a7:dc:ce:0b:a4:3f:9f:5f:04:50:6e:3c:92:16:05:68:ae:bd]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 113ce01df2a971f8edd6f135720557defebc0966
                       305f0fcd1d3898360f64be324a69da769ba1991f
                       c6aac890688818809b0a458f0e3d3321d401cfdb
                       467d384bf651e0b36fc661f8a5c5a0738d8fe1df
                       4c03c505736d89077484e5e6b7ccb5f5c3cdf3e2
                       a81f01e0f6665cdd53f4ad659cc120e246c63f4e
                       83ed5f97a87d7c8da5273845e5b84e2b58bcf67d
                       2483953fc7ccdb15f304762795583f3ddf101562
                       ddd4da20d2755948f34a89c3271cbe08fa4c9218
                       322c9c5bf2fa397f0cce96e879d8bb248b8daa10
                       e48373715f9519e0b7a458cc4540a5090c22ea67
                       7691418f1ddcede62acfc58059187d41c41b606a
                       03707948f4f399b5f008e6b06c788f71479fc016
                       a3833b3b751b610d7bf7862195df28aa05b820f2
                       d4edac238151ff466e1a76bbcda64cb3fe63ef88
                       2989553414a758437e1332c367bc4b63ca9cf8c5
                       366f739c5b1268e4ac68f180c40f6c4444b2392b
                       2b385d75fc2349ec204f3676176ff41bc1891caa
                       f53d3f86fe973d28262fc0d3aa0afe5f360741a7
                       1906cb86
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d2:3a:31:17:3b:8c:cc:a1:4e:bf:fd:c0:bd:b0:26:bf:16:d3:3f:1c]
            modulus: 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
    public exponent: 10001

] 
2022-04-06 11:20:16.722  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-06 11:20:16.723 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-06 11:20:16.724 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-04-06 11:20:16.726 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-06 11:20:16.726  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-04-06 11:20:16.727  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-06 11:20:16.727  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-06 11:20:16.728 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-06 11:20:16.728 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-06 11:20:16.728 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-06 11:20:16.737 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-06 11:20:16.738 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-06 11:20:16.738 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-06 11:20:16.738 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-06 11:20:16.836  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-06 11:20:16.836  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-06 11:20:16.837 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-06 11:20:16.837 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-06 11:20:16.838  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-06 11:20:16.839  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-06 11:20:16.839 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 11:20:16.839 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 11:20:16.839 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 11:20:16.840 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 11:20:16.840 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 11:20:16.840 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 11:20:16.841 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 11:20:16.841 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 11:20:16.841 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 11:20:16.842 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-06 11:20:16.844 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 473682973315951657899939917751128779387426138107
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 06 08:35:42 UTC 2022
           Final Date: Mon Apr 05 08:35:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [18:12:a7:dc:ce:0b:a4:3f:9f:5f:04:50:6e:3c:92:16:05:68:ae:bd]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 113ce01df2a971f8edd6f135720557defebc0966
                       305f0fcd1d3898360f64be324a69da769ba1991f
                       c6aac890688818809b0a458f0e3d3321d401cfdb
                       467d384bf651e0b36fc661f8a5c5a0738d8fe1df
                       4c03c505736d89077484e5e6b7ccb5f5c3cdf3e2
                       a81f01e0f6665cdd53f4ad659cc120e246c63f4e
                       83ed5f97a87d7c8da5273845e5b84e2b58bcf67d
                       2483953fc7ccdb15f304762795583f3ddf101562
                       ddd4da20d2755948f34a89c3271cbe08fa4c9218
                       322c9c5bf2fa397f0cce96e879d8bb248b8daa10
                       e48373715f9519e0b7a458cc4540a5090c22ea67
                       7691418f1ddcede62acfc58059187d41c41b606a
                       03707948f4f399b5f008e6b06c788f71479fc016
                       a3833b3b751b610d7bf7862195df28aa05b820f2
                       d4edac238151ff466e1a76bbcda64cb3fe63ef88
                       2989553414a758437e1332c367bc4b63ca9cf8c5
                       366f739c5b1268e4ac68f180c40f6c4444b2392b
                       2b385d75fc2349ec204f3676176ff41bc1891caa
                       f53d3f86fe973d28262fc0d3aa0afe5f360741a7
                       1906cb86
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [da:6d:03:26:1d:77:51:8f:6e:ce:2f:a8:1a:64:39:cb:cc:76:f3:0d]
            modulus: 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
    public exponent: 10001

] 
2022-04-06 11:47:31.778  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-06 11:47:31.779 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-06 11:47:31.781 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-06 11:47:31.781 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-06 11:47:31.782  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-06 11:47:31.782  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-06 11:47:31.782  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-06 11:47:31.783 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-06 11:47:31.783 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-06 11:47:31.783 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-06 11:47:31.787 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-06 11:47:31.788 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-06 11:47:31.788 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-06 11:47:31.788 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-06 11:47:31.937  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-06 11:47:31.938  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-06 11:47:31.938 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-06 11:47:31.938 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-06 11:47:31.940  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-06 11:47:31.940  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-06 11:47:31.940 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 11:47:31.940 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 11:47:31.940 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 11:47:31.941 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 11:47:31.941 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 11:47:31.941 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 11:47:31.942 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-06 11:47:31.942 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-06 11:47:31.942 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-06 11:47:31.942 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-06 11:47:31.945 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 473682973315951657899939917751128779387426138107
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 06 08:35:42 UTC 2022
           Final Date: Mon Apr 05 08:35:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [18:12:a7:dc:ce:0b:a4:3f:9f:5f:04:50:6e:3c:92:16:05:68:ae:bd]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 113ce01df2a971f8edd6f135720557defebc0966
                       305f0fcd1d3898360f64be324a69da769ba1991f
                       c6aac890688818809b0a458f0e3d3321d401cfdb
                       467d384bf651e0b36fc661f8a5c5a0738d8fe1df
                       4c03c505736d89077484e5e6b7ccb5f5c3cdf3e2
                       a81f01e0f6665cdd53f4ad659cc120e246c63f4e
                       83ed5f97a87d7c8da5273845e5b84e2b58bcf67d
                       2483953fc7ccdb15f304762795583f3ddf101562
                       ddd4da20d2755948f34a89c3271cbe08fa4c9218
                       322c9c5bf2fa397f0cce96e879d8bb248b8daa10
                       e48373715f9519e0b7a458cc4540a5090c22ea67
                       7691418f1ddcede62acfc58059187d41c41b606a
                       03707948f4f399b5f008e6b06c788f71479fc016
                       a3833b3b751b610d7bf7862195df28aa05b820f2
                       d4edac238151ff466e1a76bbcda64cb3fe63ef88
                       2989553414a758437e1332c367bc4b63ca9cf8c5
                       366f739c5b1268e4ac68f180c40f6c4444b2392b
                       2b385d75fc2349ec204f3676176ff41bc1891caa
                       f53d3f86fe973d28262fc0d3aa0afe5f360741a7
                       1906cb86
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7b:e4:25:a7:a3:77:76:6c:6c:01:0c:71:8f:da:b1:c5:3f:ce:25:cd]
            modulus: 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
    public exponent: 10001

]