Results

By type

          2022-04-13 01:45:25,429 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-04-13 01:45:29,131 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-04-13 01:45:31.933  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Apr 13, 2022 1:45:40 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Apr 13, 2022 1:45:40 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Apr 13, 2022 1:45:40 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Apr 13, 2022 1:45:40 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-04-13 01:45:42.444 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-04-13 01:45:43.722  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-04-13 01:45:44.330  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-04-13 01:45:47.224 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-04-13 01:45:47.226 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-04-13 01:45:47.227 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-04-13 01:45:47.230 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-04-13 01:45:47.344 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-04-13 01:45:47.347 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-04-13 01:45:47.940 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-04-13 01:45:52.326 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Apr 13, 2022 1:45:55 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-04-13 01:45:56.142  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 33.718 seconds (JVM running for 40.497)
Apr 13, 2022 1:45:58 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-04-13 01:46:25.933  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-13 01:46:26.022 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-13 01:46:26.134 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-04-13 01:46:26.137 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-13 01:46:26.228  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-04-13 01:46:26.230  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-13 01:46:26.231  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-13 01:46:26.232 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-13 01:46:26.233 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-13 01:46:26.236 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-13 01:46:26.323 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-13 01:46:26.326 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-13 01:46:26.439 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-13 01:46:26.529 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-13 01:46:26.529 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-13 01:46:26.533 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-13 01:46:28.537  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-13 01:46:28.539  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-13 01:46:28.539 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-13 01:46:28.540 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-13 01:46:28.621  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-13 01:46:28.622  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-13 01:46:28.623 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-13 01:46:28.624 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-13 01:46:28.624 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-13 01:46:28.635 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-13 01:46:28.635 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-13 01:46:28.635 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-13 01:46:28.641 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-13 01:46:28.641 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-13 01:46:28.641 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-13 01:46:28.643 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-13 01:46:28.825 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 66114269842418920480124352074080615679360463241
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 13 01:41:59 UTC 2022
           Final Date: Mon Apr 12 01:41:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:f6:86:e7:2a:ab:bd:91:33:8a:bb:14:cf:7e:3c:44:6d:21:b4:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 04769576a654a42ad92ea03186c2bae7f1b43a24
                       d425db60981fcd11d091cc86aae444a1912620f5
                       4b0027783afd15d8efc8792602abeb68e8214c1f
                       c7a0824be6096e3d4728e4f1bc137de1b57b0ffd
                       c39d1797e5a8cbd5abf39c8b47e138c9cb657109
                       39123709b3858417aa5bbef772e92da209cc26c1
                       6fac991182004f6dcd5b6d349b5c00021e038f7b
                       56f52026a11f4f72c1dc48f3b38f5a46d713ee79
                       9554e220e60ed78531ee1f30e45e643ae1a72b93
                       5b9a3bcdfacb4bc118454112cfc080d9dec38437
                       290b84792b5805f8b2567a4ca9a1dc6f9d3b25b1
                       c8e8f86fd2be21d099eadc6931350dc895817b43
                       e66fefb6e6bb8814d88d034ccb568226128a00e8
                       e3b68efe7003638f008eb35f953a3198ad081ffa
                       4e9ddb2dd2b571690b5fcbcb27a482a7ecb2687a
                       422105230572981784ec2c14d04a6f7737e19236
                       64cae1c289fdd61b0ce1bf7823233e081b75e47d
                       810e3253d3f92b34b01fc4b1e8cd43bd95eab34d
                       d94f5bcc6a7fd028c90b991e5e3df4f9e0ee82c4
                       3ebd75ad
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e4:e7:ed:a8:72:d1:b3:7f:4f:2d:cd:33:2b:2e:fe:f6:e6:d4:6d:e0]
            modulus: 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
    public exponent: 10001

] 
2022-04-13 03:25:06.153  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-13 03:25:06.155 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-13 03:25:06.157 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-13 03:25:06.158 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-13 03:25:06.158  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-13 03:25:06.159  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-13 03:25:06.160  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-13 03:25:06.160 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-13 03:25:06.160 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-13 03:25:06.161 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-13 03:25:06.170 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-13 03:25:06.171 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-13 03:25:06.219 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-13 03:25:06.220 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-13 03:25:06.350  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-13 03:25:06.350  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-13 03:25:06.351 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-13 03:25:06.351 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-13 03:25:06.353  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-13 03:25:06.353  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-13 03:25:06.354 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-13 03:25:06.354 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-13 03:25:06.354 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-13 03:25:06.355 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-13 03:25:06.356 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-13 03:25:06.356 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-13 03:25:06.357 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-13 03:25:06.357 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-13 03:25:06.357 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-13 03:25:06.358 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-13 03:25:06.435 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 66114269842418920480124352074080615679360463241
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 13 01:41:59 UTC 2022
           Final Date: Mon Apr 12 01:41:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:f6:86:e7:2a:ab:bd:91:33:8a:bb:14:cf:7e:3c:44:6d:21:b4:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 04769576a654a42ad92ea03186c2bae7f1b43a24
                       d425db60981fcd11d091cc86aae444a1912620f5
                       4b0027783afd15d8efc8792602abeb68e8214c1f
                       c7a0824be6096e3d4728e4f1bc137de1b57b0ffd
                       c39d1797e5a8cbd5abf39c8b47e138c9cb657109
                       39123709b3858417aa5bbef772e92da209cc26c1
                       6fac991182004f6dcd5b6d349b5c00021e038f7b
                       56f52026a11f4f72c1dc48f3b38f5a46d713ee79
                       9554e220e60ed78531ee1f30e45e643ae1a72b93
                       5b9a3bcdfacb4bc118454112cfc080d9dec38437
                       290b84792b5805f8b2567a4ca9a1dc6f9d3b25b1
                       c8e8f86fd2be21d099eadc6931350dc895817b43
                       e66fefb6e6bb8814d88d034ccb568226128a00e8
                       e3b68efe7003638f008eb35f953a3198ad081ffa
                       4e9ddb2dd2b571690b5fcbcb27a482a7ecb2687a
                       422105230572981784ec2c14d04a6f7737e19236
                       64cae1c289fdd61b0ce1bf7823233e081b75e47d
                       810e3253d3f92b34b01fc4b1e8cd43bd95eab34d
                       d94f5bcc6a7fd028c90b991e5e3df4f9e0ee82c4
                       3ebd75ad
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [68:93:47:6b:bf:02:e1:49:2f:30:80:2d:06:d9:39:3d:e1:b3:09:b8]
            modulus: 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
    public exponent: 10001

] 
2022-04-13 03:28:28.405  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-13 03:28:28.406 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-13 03:28:28.407 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-13 03:28:28.408 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-13 03:28:28.409  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-13 03:28:28.410  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-13 03:28:28.410  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-13 03:28:28.410 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-13 03:28:28.411 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-13 03:28:28.411 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-13 03:28:28.421 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-13 03:28:28.422 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-13 03:28:28.422 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-13 03:28:28.422 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-13 03:28:28.551  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-13 03:28:28.551  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-13 03:28:28.552 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-13 03:28:28.552 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-13 03:28:28.554  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-13 03:28:28.554  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-13 03:28:28.554 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-13 03:28:28.555 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-13 03:28:28.555 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-13 03:28:28.556 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-13 03:28:28.556 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-13 03:28:28.556 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-13 03:28:28.557 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-13 03:28:28.557 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-13 03:28:28.558 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-13 03:28:28.559 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-13 03:28:28.561 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 66114269842418920480124352074080615679360463241
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 13 01:41:59 UTC 2022
           Final Date: Mon Apr 12 01:41:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:f6:86:e7:2a:ab:bd:91:33:8a:bb:14:cf:7e:3c:44:6d:21:b4:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 04769576a654a42ad92ea03186c2bae7f1b43a24
                       d425db60981fcd11d091cc86aae444a1912620f5
                       4b0027783afd15d8efc8792602abeb68e8214c1f
                       c7a0824be6096e3d4728e4f1bc137de1b57b0ffd
                       c39d1797e5a8cbd5abf39c8b47e138c9cb657109
                       39123709b3858417aa5bbef772e92da209cc26c1
                       6fac991182004f6dcd5b6d349b5c00021e038f7b
                       56f52026a11f4f72c1dc48f3b38f5a46d713ee79
                       9554e220e60ed78531ee1f30e45e643ae1a72b93
                       5b9a3bcdfacb4bc118454112cfc080d9dec38437
                       290b84792b5805f8b2567a4ca9a1dc6f9d3b25b1
                       c8e8f86fd2be21d099eadc6931350dc895817b43
                       e66fefb6e6bb8814d88d034ccb568226128a00e8
                       e3b68efe7003638f008eb35f953a3198ad081ffa
                       4e9ddb2dd2b571690b5fcbcb27a482a7ecb2687a
                       422105230572981784ec2c14d04a6f7737e19236
                       64cae1c289fdd61b0ce1bf7823233e081b75e47d
                       810e3253d3f92b34b01fc4b1e8cd43bd95eab34d
                       d94f5bcc6a7fd028c90b991e5e3df4f9e0ee82c4
                       3ebd75ad
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bc:3f:3a:0e:27:7e:52:81:3e:e9:f6:82:21:8a:f7:ee:87:74:1a:57]
            modulus: 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
    public exponent: 10001

] 
2022-04-13 03:30:24.005  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-13 03:30:24.008 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-13 03:30:24.010 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-13 03:30:24.011 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-13 03:30:24.011  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-13 03:30:24.012  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-13 03:30:24.012  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-13 03:30:24.012 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-13 03:30:24.012 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-13 03:30:24.013 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-13 03:30:24.017 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-13 03:30:24.017 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-13 03:30:24.017 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-13 03:30:24.018 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-13 03:30:24.119  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-13 03:30:24.120  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-13 03:30:24.120 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-13 03:30:24.120 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-13 03:30:24.122  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-13 03:30:24.122  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-13 03:30:24.123 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-13 03:30:24.123 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-13 03:30:24.123 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-13 03:30:24.124 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-13 03:30:24.124 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-13 03:30:24.124 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-13 03:30:24.125 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-13 03:30:24.125 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-13 03:30:24.125 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-13 03:30:24.126 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-13 03:30:24.129 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 66114269842418920480124352074080615679360463241
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 13 01:41:59 UTC 2022
           Final Date: Mon Apr 12 01:41:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:f6:86:e7:2a:ab:bd:91:33:8a:bb:14:cf:7e:3c:44:6d:21:b4:b2]
            modulus: f4b13f69a5cd38d1c85857dec4190e96c3c77d68042565ec841fbb8cd1aefce92e6c98db2be85711857ac6a5b187dd4e0299a16b1e5556497d045d88131e3471394ff891a54ad1ce02bca84d03c50bd9fa00e3dd14c607a7d772919415d8b3e6ae30d23d4660deb2f957d547782ccf4a47ad663a53ae21dbbe2e7c673db7dcde4835b3c2cb861547f5bb53f3faf0a8f86d954972862d885492e6b36ffd8d7cc8b1cadf5293ef65382dd62cb547345d9b75b16d0908c87d4fbc5746d2127b240ea528e35a226be75684281f9ba5ec4026931b9f99717d8a5df18bff4c421cbf2891c8e741dc1cc245d653e063469fee895542e43a9675970093cf6c063b172bafd5e6e9f59d4ad0f57b190df03e973177f0126f63872d6d24dccb9e216ec80085784ee3ea9872b87bdecae1a686ea34f961d348b8542a5be29c4921fb113639affc72a916dfa6ff09431a8d40c17040b45c2f844d2fd3d28e347dd7d48eec1aedc589d67b26b26fce4778cc2a2fa8de541f0bf354bd09518ff3ff6b68daa40f19
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 04769576a654a42ad92ea03186c2bae7f1b43a24
                       d425db60981fcd11d091cc86aae444a1912620f5
                       4b0027783afd15d8efc8792602abeb68e8214c1f
                       c7a0824be6096e3d4728e4f1bc137de1b57b0ffd
                       c39d1797e5a8cbd5abf39c8b47e138c9cb657109
                       39123709b3858417aa5bbef772e92da209cc26c1
                       6fac991182004f6dcd5b6d349b5c00021e038f7b
                       56f52026a11f4f72c1dc48f3b38f5a46d713ee79
                       9554e220e60ed78531ee1f30e45e643ae1a72b93
                       5b9a3bcdfacb4bc118454112cfc080d9dec38437
                       290b84792b5805f8b2567a4ca9a1dc6f9d3b25b1
                       c8e8f86fd2be21d099eadc6931350dc895817b43
                       e66fefb6e6bb8814d88d034ccb568226128a00e8
                       e3b68efe7003638f008eb35f953a3198ad081ffa
                       4e9ddb2dd2b571690b5fcbcb27a482a7ecb2687a
                       422105230572981784ec2c14d04a6f7737e19236
                       64cae1c289fdd61b0ce1bf7823233e081b75e47d
                       810e3253d3f92b34b01fc4b1e8cd43bd95eab34d
                       d94f5bcc6a7fd028c90b991e5e3df4f9e0ee82c4
                       3ebd75ad
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ae:0c:d6:8a:83:eb:59:3b:dd:51:a5:2d:35:c1:79:f2:37:0d:2f:97]
            modulus: b8ba67cf996feaa4807f4a6bb1c8adf86e85352d57a43a6a662c57226fe161bd1ddc904cce6e48bf6c1622669a009b5cb3a1e1ed14649e02e0a27be7eac819f9f9d470581b6a16bcc2ec3fe045ac8ccdb1d3897137bda43b9f47b2f40572cc8aca6444270d91e27d9c18fda01864e5bcbb2122515e5bd8334cbcdaa010cf00ade5dc254f2768b260ef9ef91fbf8c2ceacd888a57b36ca980ff8f35d794a4c71da382497af8a4308cf9062a0efd3e993004c386d68ecfa3a687296753eb7ae5fdada04ec55571c568fa2829fd1cc57682b5199308900b13c333f54c274a6b96d7565a22ee4609c41e0dd5cf342bfe80ad494e30a2fd23c907759fc383bd7b4db9
    public exponent: 10001

] 
2022-04-13 03:32:09.066  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-13 03:32:09.067 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-13 03:32:09.069 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-13 03:32:09.069 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-13 03:32:09.070  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-13 03:32:09.070  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-13 03:32:09.071  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-13 03:32:09.071 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-13 03:32:09.072 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-13 03:32:09.072 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-13 03:32:09.076 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-13 03:32:09.077 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-13 03:32:09.077 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-13 03:32:09.077 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-13 03:32:09.230  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-13 03:32:09.230  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-13 03:32:09.230 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-13 03:32:09.231 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-13 03:32:09.232  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-13 03:32:09.232  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-13 03:32:09.233 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-13 03:32:09.233 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-13 03:32:09.233 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-13 03:32:09.234 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-13 03:32:09.234 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-13 03:32:09.234 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-13 03:32:09.235 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-13 03:32:09.235 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-13 03:32:09.235 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-13 03:32:09.236 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-13 03:32:09.239 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 66114269842418920480124352074080615679360463241
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 13 01:41:59 UTC 2022
           Final Date: Mon Apr 12 01:41:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:f6:86:e7:2a:ab:bd:91:33:8a:bb:14:cf:7e:3c:44:6d:21:b4:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 04769576a654a42ad92ea03186c2bae7f1b43a24
                       d425db60981fcd11d091cc86aae444a1912620f5
                       4b0027783afd15d8efc8792602abeb68e8214c1f
                       c7a0824be6096e3d4728e4f1bc137de1b57b0ffd
                       c39d1797e5a8cbd5abf39c8b47e138c9cb657109
                       39123709b3858417aa5bbef772e92da209cc26c1
                       6fac991182004f6dcd5b6d349b5c00021e038f7b
                       56f52026a11f4f72c1dc48f3b38f5a46d713ee79
                       9554e220e60ed78531ee1f30e45e643ae1a72b93
                       5b9a3bcdfacb4bc118454112cfc080d9dec38437
                       290b84792b5805f8b2567a4ca9a1dc6f9d3b25b1
                       c8e8f86fd2be21d099eadc6931350dc895817b43
                       e66fefb6e6bb8814d88d034ccb568226128a00e8
                       e3b68efe7003638f008eb35f953a3198ad081ffa
                       4e9ddb2dd2b571690b5fcbcb27a482a7ecb2687a
                       422105230572981784ec2c14d04a6f7737e19236
                       64cae1c289fdd61b0ce1bf7823233e081b75e47d
                       810e3253d3f92b34b01fc4b1e8cd43bd95eab34d
                       d94f5bcc6a7fd028c90b991e5e3df4f9e0ee82c4
                       3ebd75ad
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3a:ca:c0:2b:0f:bd:25:b8:17:2c:c3:51:96:dd:cb:1a:28:18:aa:d4]
            modulus: 9461cd332663e9f8b4ee5d917d000d0ffcfe37478562bc7dad7c87d186dde6fae396b824ff288a961ed2b2ca26976f47b5c9b76a03732e56328aea0e91dcaea9112c87789c227f8acd53fc78622cbb549ae906a0469cb51d15cbe8442fda94c623ca4b6f32a4e42c46ae74a5f53386d74055c013bdfe67604f40b8d3cc352dea2874e63ab75c7e741899c660a6cb7f86b5324db83fb2b2f814f0f2c5f9dd837bd2a29b6cb91433f5785a78436ebe86e984806567a63f18c56342d5f2e4f19244f41d234214fdecf19b898c947c5565a59f3ddca6de6469ef649e2bef598c6b8fa7aa4059a65c2fb3fc8ec6cf408df76227f29358ee5b402083706f9f2f6cb4b5
    public exponent: 10001

] 
2022-04-13 03:36:08.621  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-13 03:36:08.622 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-13 03:36:08.623 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-04-13 03:36:08.624 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-13 03:36:08.624  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-04-13 03:36:08.625  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-13 03:36:08.626  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-13 03:36:08.626 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-13 03:36:08.626 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-13 03:36:08.627 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-13 03:36:08.632 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-13 03:36:08.632 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-13 03:36:08.633 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-13 03:36:08.633 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-13 03:36:08.823  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-13 03:36:08.823  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-13 03:36:08.823 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-13 03:36:08.824 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-13 03:36:08.825  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-13 03:36:08.825  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-13 03:36:08.825 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-13 03:36:08.826 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-13 03:36:08.826 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-13 03:36:08.827 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-13 03:36:08.827 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-13 03:36:08.828 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-13 03:36:08.829 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-13 03:36:08.829 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-13 03:36:08.829 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-13 03:36:08.830 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-13 03:36:08.833 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 66114269842418920480124352074080615679360463241
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 13 01:41:59 UTC 2022
           Final Date: Mon Apr 12 01:41:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:f6:86:e7:2a:ab:bd:91:33:8a:bb:14:cf:7e:3c:44:6d:21:b4:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 04769576a654a42ad92ea03186c2bae7f1b43a24
                       d425db60981fcd11d091cc86aae444a1912620f5
                       4b0027783afd15d8efc8792602abeb68e8214c1f
                       c7a0824be6096e3d4728e4f1bc137de1b57b0ffd
                       c39d1797e5a8cbd5abf39c8b47e138c9cb657109
                       39123709b3858417aa5bbef772e92da209cc26c1
                       6fac991182004f6dcd5b6d349b5c00021e038f7b
                       56f52026a11f4f72c1dc48f3b38f5a46d713ee79
                       9554e220e60ed78531ee1f30e45e643ae1a72b93
                       5b9a3bcdfacb4bc118454112cfc080d9dec38437
                       290b84792b5805f8b2567a4ca9a1dc6f9d3b25b1
                       c8e8f86fd2be21d099eadc6931350dc895817b43
                       e66fefb6e6bb8814d88d034ccb568226128a00e8
                       e3b68efe7003638f008eb35f953a3198ad081ffa
                       4e9ddb2dd2b571690b5fcbcb27a482a7ecb2687a
                       422105230572981784ec2c14d04a6f7737e19236
                       64cae1c289fdd61b0ce1bf7823233e081b75e47d
                       810e3253d3f92b34b01fc4b1e8cd43bd95eab34d
                       d94f5bcc6a7fd028c90b991e5e3df4f9e0ee82c4
                       3ebd75ad
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5e:4a:06:49:44:6c:51:d3:66:19:38:ab:ff:21:fb:2f:08:6e:bb:bf]
            modulus: 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
    public exponent: 10001

] 
2022-04-13 03:39:53.169  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-13 03:39:53.170 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-13 03:39:53.172 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-13 03:39:53.172 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-13 03:39:53.173  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-13 03:39:53.173  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-13 03:39:53.173  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-13 03:39:53.174 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-13 03:39:53.174 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-13 03:39:53.174 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-13 03:39:53.179 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-13 03:39:53.179 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-13 03:39:53.179 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-13 03:39:53.179 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-13 03:39:53.278  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-13 03:39:53.278  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-13 03:39:53.279 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-13 03:39:53.279 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-13 03:39:53.280  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-13 03:39:53.280  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-13 03:39:53.281 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-13 03:39:53.281 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-13 03:39:53.281 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-13 03:39:53.281 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-13 03:39:53.282 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-13 03:39:53.282 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-13 03:39:53.282 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-13 03:39:53.283 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-13 03:39:53.283 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-13 03:39:53.283 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-13 03:39:53.286 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 66114269842418920480124352074080615679360463241
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 13 01:41:59 UTC 2022
           Final Date: Mon Apr 12 01:41:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:f6:86:e7:2a:ab:bd:91:33:8a:bb:14:cf:7e:3c:44:6d:21:b4:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 04769576a654a42ad92ea03186c2bae7f1b43a24
                       d425db60981fcd11d091cc86aae444a1912620f5
                       4b0027783afd15d8efc8792602abeb68e8214c1f
                       c7a0824be6096e3d4728e4f1bc137de1b57b0ffd
                       c39d1797e5a8cbd5abf39c8b47e138c9cb657109
                       39123709b3858417aa5bbef772e92da209cc26c1
                       6fac991182004f6dcd5b6d349b5c00021e038f7b
                       56f52026a11f4f72c1dc48f3b38f5a46d713ee79
                       9554e220e60ed78531ee1f30e45e643ae1a72b93
                       5b9a3bcdfacb4bc118454112cfc080d9dec38437
                       290b84792b5805f8b2567a4ca9a1dc6f9d3b25b1
                       c8e8f86fd2be21d099eadc6931350dc895817b43
                       e66fefb6e6bb8814d88d034ccb568226128a00e8
                       e3b68efe7003638f008eb35f953a3198ad081ffa
                       4e9ddb2dd2b571690b5fcbcb27a482a7ecb2687a
                       422105230572981784ec2c14d04a6f7737e19236
                       64cae1c289fdd61b0ce1bf7823233e081b75e47d
                       810e3253d3f92b34b01fc4b1e8cd43bd95eab34d
                       d94f5bcc6a7fd028c90b991e5e3df4f9e0ee82c4
                       3ebd75ad
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [41:27:b0:9a:4e:98:68:13:18:80:2c:48:d1:55:c9:02:8f:a6:06:f4]
            modulus: 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
    public exponent: 10001

] 
2022-04-13 03:43:18.559  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-13 03:43:18.561 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-13 03:43:18.562 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-13 03:43:18.563 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-13 03:43:18.563  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-13 03:43:18.563  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-13 03:43:18.564  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-13 03:43:18.564 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-13 03:43:18.564 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-13 03:43:18.565 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-13 03:43:18.569 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-13 03:43:18.569 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-13 03:43:18.569 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-13 03:43:18.570 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-13 03:43:18.667  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-13 03:43:18.668  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-13 03:43:18.668 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-13 03:43:18.668 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-13 03:43:18.669  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-13 03:43:18.669  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-13 03:43:18.670 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-13 03:43:18.670 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-13 03:43:18.670 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-13 03:43:18.671 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-13 03:43:18.671 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-13 03:43:18.671 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-13 03:43:18.672 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-13 03:43:18.672 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-13 03:43:18.672 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-13 03:43:18.673 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-13 03:43:18.675 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 66114269842418920480124352074080615679360463241
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 13 01:41:59 UTC 2022
           Final Date: Mon Apr 12 01:41:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:f6:86:e7:2a:ab:bd:91:33:8a:bb:14:cf:7e:3c:44:6d:21:b4:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 04769576a654a42ad92ea03186c2bae7f1b43a24
                       d425db60981fcd11d091cc86aae444a1912620f5
                       4b0027783afd15d8efc8792602abeb68e8214c1f
                       c7a0824be6096e3d4728e4f1bc137de1b57b0ffd
                       c39d1797e5a8cbd5abf39c8b47e138c9cb657109
                       39123709b3858417aa5bbef772e92da209cc26c1
                       6fac991182004f6dcd5b6d349b5c00021e038f7b
                       56f52026a11f4f72c1dc48f3b38f5a46d713ee79
                       9554e220e60ed78531ee1f30e45e643ae1a72b93
                       5b9a3bcdfacb4bc118454112cfc080d9dec38437
                       290b84792b5805f8b2567a4ca9a1dc6f9d3b25b1
                       c8e8f86fd2be21d099eadc6931350dc895817b43
                       e66fefb6e6bb8814d88d034ccb568226128a00e8
                       e3b68efe7003638f008eb35f953a3198ad081ffa
                       4e9ddb2dd2b571690b5fcbcb27a482a7ecb2687a
                       422105230572981784ec2c14d04a6f7737e19236
                       64cae1c289fdd61b0ce1bf7823233e081b75e47d
                       810e3253d3f92b34b01fc4b1e8cd43bd95eab34d
                       d94f5bcc6a7fd028c90b991e5e3df4f9e0ee82c4
                       3ebd75ad
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a3:61:05:19:4b:a5:ab:7d:85:4d:bc:d1:99:7d:ce:fb:8e:47:0b:0a]
            modulus: f082059d5c31f22d13be882c74d23eee62c731da8a5a37d86f05339be9e5e6e54fa6c74b81705ecd59b29ef617a2e8e1d4f85f965b3ef0c193a685d910996687c9f770a1deea289bc0a3f2f53e1197770e8778143bb1c857daf691de311666043928fc2ed0c8a8e1f3893da32bc41ad5239c43642cea2d4665d486caab961ad5975b6e88dcd79247f2930118751bedf4438538991ccb764d440b3d3c2bf7b5605e7d27f693a515d55c660a865e3cab15f5c9753675ef4542f70d360d6d5fe60dd30ccae16f81fb57a1ad3134ae5fa48c4cc902a001f3ad7f79bf4e27c5ae73039de74a7f25c1310d632934d4d44fd67861d0c5cdd6acbcbf10af24c34c421277
    public exponent: 10001

] 
2022-04-13 03:49:48.572  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-13 03:49:48.573 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-13 03:49:48.574 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-13 03:49:48.575 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-13 03:49:48.575  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-13 03:49:48.575  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-13 03:49:48.576  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-13 03:49:48.576 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-13 03:49:48.576 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-13 03:49:48.577 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-13 03:49:48.581 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-13 03:49:48.581 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-13 03:49:48.581 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-13 03:49:48.582 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-13 03:49:48.692  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-13 03:49:48.693  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-13 03:49:48.693 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-13 03:49:48.693 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-13 03:49:48.695  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-13 03:49:48.695  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-13 03:49:48.695 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-13 03:49:48.695 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-13 03:49:48.696 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-13 03:49:48.696 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-13 03:49:48.696 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-13 03:49:48.697 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-13 03:49:48.697 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-13 03:49:48.697 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-13 03:49:48.698 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-13 03:49:48.698 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-13 03:49:48.701 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 66114269842418920480124352074080615679360463241
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 13 01:41:59 UTC 2022
           Final Date: Mon Apr 12 01:41:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:f6:86:e7:2a:ab:bd:91:33:8a:bb:14:cf:7e:3c:44:6d:21:b4:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 04769576a654a42ad92ea03186c2bae7f1b43a24
                       d425db60981fcd11d091cc86aae444a1912620f5
                       4b0027783afd15d8efc8792602abeb68e8214c1f
                       c7a0824be6096e3d4728e4f1bc137de1b57b0ffd
                       c39d1797e5a8cbd5abf39c8b47e138c9cb657109
                       39123709b3858417aa5bbef772e92da209cc26c1
                       6fac991182004f6dcd5b6d349b5c00021e038f7b
                       56f52026a11f4f72c1dc48f3b38f5a46d713ee79
                       9554e220e60ed78531ee1f30e45e643ae1a72b93
                       5b9a3bcdfacb4bc118454112cfc080d9dec38437
                       290b84792b5805f8b2567a4ca9a1dc6f9d3b25b1
                       c8e8f86fd2be21d099eadc6931350dc895817b43
                       e66fefb6e6bb8814d88d034ccb568226128a00e8
                       e3b68efe7003638f008eb35f953a3198ad081ffa
                       4e9ddb2dd2b571690b5fcbcb27a482a7ecb2687a
                       422105230572981784ec2c14d04a6f7737e19236
                       64cae1c289fdd61b0ce1bf7823233e081b75e47d
                       810e3253d3f92b34b01fc4b1e8cd43bd95eab34d
                       d94f5bcc6a7fd028c90b991e5e3df4f9e0ee82c4
                       3ebd75ad
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1d:be:d3:e4:bd:73:c5:b3:86:17:46:66:f9:a3:58:2e:cf:12:17:9a]
            modulus: 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
    public exponent: 10001

] 
2022-04-13 03:50:39.324  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-13 03:50:39.324 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-13 03:50:39.325 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-04-13 03:50:39.326 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-13 03:50:39.326  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-04-13 03:50:39.326  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-13 03:50:39.327  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-13 03:50:39.327 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-13 03:50:39.327 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-13 03:50:39.327 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-13 03:50:39.331 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-13 03:50:39.332 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-13 03:50:39.332 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-13 03:50:39.332 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-13 03:50:39.444  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-13 03:50:39.444  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-13 03:50:39.445 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-13 03:50:39.445 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-13 03:50:39.446  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-13 03:50:39.446  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-13 03:50:39.446 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-13 03:50:39.446 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-13 03:50:39.447 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-13 03:50:39.447 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-13 03:50:39.447 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-13 03:50:39.447 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-13 03:50:39.448 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-13 03:50:39.448 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-13 03:50:39.448 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-13 03:50:39.449 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-13 03:50:39.451 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 66114269842418920480124352074080615679360463241
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 13 01:41:59 UTC 2022
           Final Date: Mon Apr 12 01:41:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:f6:86:e7:2a:ab:bd:91:33:8a:bb:14:cf:7e:3c:44:6d:21:b4:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 04769576a654a42ad92ea03186c2bae7f1b43a24
                       d425db60981fcd11d091cc86aae444a1912620f5
                       4b0027783afd15d8efc8792602abeb68e8214c1f
                       c7a0824be6096e3d4728e4f1bc137de1b57b0ffd
                       c39d1797e5a8cbd5abf39c8b47e138c9cb657109
                       39123709b3858417aa5bbef772e92da209cc26c1
                       6fac991182004f6dcd5b6d349b5c00021e038f7b
                       56f52026a11f4f72c1dc48f3b38f5a46d713ee79
                       9554e220e60ed78531ee1f30e45e643ae1a72b93
                       5b9a3bcdfacb4bc118454112cfc080d9dec38437
                       290b84792b5805f8b2567a4ca9a1dc6f9d3b25b1
                       c8e8f86fd2be21d099eadc6931350dc895817b43
                       e66fefb6e6bb8814d88d034ccb568226128a00e8
                       e3b68efe7003638f008eb35f953a3198ad081ffa
                       4e9ddb2dd2b571690b5fcbcb27a482a7ecb2687a
                       422105230572981784ec2c14d04a6f7737e19236
                       64cae1c289fdd61b0ce1bf7823233e081b75e47d
                       810e3253d3f92b34b01fc4b1e8cd43bd95eab34d
                       d94f5bcc6a7fd028c90b991e5e3df4f9e0ee82c4
                       3ebd75ad
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5d:6d:a5:24:35:8f:20:a4:65:0c:af:b9:a6:61:a2:11:23:70:5e:17]
            modulus: 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
    public exponent: 10001

]