Results

By type

          2022-05-08 01:50:45,951 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-05-08 01:50:50,362 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-05-08 01:50:53.655  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
May 08, 2022 1:51:04 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
May 08, 2022 1:51:04 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
May 08, 2022 1:51:04 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
May 08, 2022 1:51:04 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-05-08 01:51:06.461 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-05-08 01:51:07.673  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-05-08 01:51:08.355  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-05-08 01:51:11.754 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-05-08 01:51:11.757 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-05-08 01:51:11.758 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-05-08 01:51:11.761 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-05-08 01:51:11.959 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-05-08 01:51:11.963 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-05-08 01:51:12.759 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-05-08 01:51:18.444 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
May 08, 2022 1:51:21 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-05-08 01:51:23.356  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 41.205 seconds (JVM running for 49.502)
May 08, 2022 1:51:24 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-05-08 01:52:06.871  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-08 01:52:06.965 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-08 01:52:07.082 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-08 01:52:07.144 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-08 01:52:07.164  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-08 01:52:07.245  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-08 01:52:07.246  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-08 01:52:07.248 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-08 01:52:07.249 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-08 01:52:07.253 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-08 01:52:07.258 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-08 01:52:07.261 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-08 01:52:07.464 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-08 01:52:07.551 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-08 01:52:07.552 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-08 01:52:07.557 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-08 01:52:09.154  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-08 01:52:09.156  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-08 01:52:09.157 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-08 01:52:09.158 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-08 01:52:09.170  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-08 01:52:09.171  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-08 01:52:09.172 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-08 01:52:09.172 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-08 01:52:09.173 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-08 01:52:09.260 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-08 01:52:09.260 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-08 01:52:09.261 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-08 01:52:09.266 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-08 01:52:09.267 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-08 01:52:09.267 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-08 01:52:09.345 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-08 01:52:09.454 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 275469374728004569870687206726340640225030200706
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 08 01:46:45 UTC 2022
           Final Date: Fri May 07 01:46:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0d:4f:b2:65:57:06:02:da:2f:ab:13:45:6b:0e:8a:31:16:fa:fd:46]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 89b5f6a77d7c5673b06f5985d0f68ef128cf6c72
                       ab3a3b82bdccb03dcbde6292a0ec35cacb11bab5
                       fc19d960eb0ff215e5960da56c75ac31e5bce59e
                       1e71250215c5c04bd8483232262e5a9512d18ad6
                       754e950b78d203ea6672fdd520e457bc7136a850
                       c885998e650abaa1921c58fd569f88549deb816b
                       05e902095b20e9b03ca951660941e7122285734c
                       61df4984f22e96d8cbdcf5e78d5286fdc67db16b
                       7a754faa610d29cdbf36864ee582f18fc914650f
                       31b635118b0649a2f3781566ce936a0283d2f03e
                       5f4636a142e75cb193342fe0c8802325d30e08d2
                       384a5353714ff96c9a007670cb5525d5e1686a8d
                       35450bf6754fe2c1874eaf946424e9159b616465
                       63d28b6e5054996d1e57f574277370023ae555bb
                       019440cc466862685524f80e5e68f60b18590868
                       a50d2d8ae6448e5b443b2676d6c80a419bf615b6
                       691b43f217aa973c8d38f4e6377b6f66a319b5f6
                       67b8465f64822a0969055652aa381f0204b7a647
                       5c08fd6d3cbc05f972e113c024460e8ac73351e4
                       0f056e23
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1a:b8:ac:d6:00:98:42:6e:4d:5a:d6:40:53:d3:b7:3c:57:ae:c0:fe]
            modulus: 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
    public exponent: 10001

] 
2022-05-08 03:12:59.345  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-08 03:12:59.347 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-08 03:12:59.349 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-08 03:12:59.350 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-08 03:12:59.352  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-08 03:12:59.353  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-08 03:12:59.354  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-08 03:12:59.354 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-08 03:12:59.355 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-08 03:12:59.355 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-08 03:12:59.365 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-08 03:12:59.366 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-08 03:12:59.366 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-08 03:12:59.366 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-08 03:12:59.600  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-08 03:12:59.600  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-08 03:12:59.601 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-08 03:12:59.601 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-08 03:12:59.647  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-08 03:12:59.647  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-08 03:12:59.648 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-08 03:12:59.648 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-08 03:12:59.649 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-08 03:12:59.650 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-08 03:12:59.651 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-08 03:12:59.651 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-08 03:12:59.652 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-08 03:12:59.652 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-08 03:12:59.653 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-08 03:12:59.654 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-08 03:12:59.658 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 275469374728004569870687206726340640225030200706
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 08 01:46:45 UTC 2022
           Final Date: Fri May 07 01:46:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0d:4f:b2:65:57:06:02:da:2f:ab:13:45:6b:0e:8a:31:16:fa:fd:46]
            modulus: c7cf03283c58f47acab0fc89496b8ab2e523a8d1459f5e7fb97db7ff191d5f019b0ef2ccc6b00caeb2563903b42f2fc6471fc39aabc2663a820f3294a13a2423a4515fa2bf1858212391d07c5bf4111391e128fe4524338a25f136c4a89538b97ac5acbeb017ef685086b388416669b2b02d22f9606c3b742ffafd9da6377fd39e927163a8517be734daf93bdd0bdbeaf45e29d98c13bc5fc1a8931b2593d4c4ddbdac1927ac31c75429c81f8f1e5fde5c50c1d685c93761b3555ccbf83fcd7a8bf102ceea9d3939e3fd289d1716e67429461a027b61ddc429b4e8387cb42659f243cc4b285f0b503a2749f5774633cbf91b2de61728405b8554edfe6b0437500e580c1e192d1c5e4788ef547c7849975caa2f154fb8d84794fa112acc8b578e1887be5adb97f7a3ad06e7e19602cc364f383256ea5cbf25c20b2c9cc4740fb439e88f5036e1bd693af33479ce6b1dd2ff81a87451318ef9e7b9ce317bd0e08aec682157075230de7615e81f87c1bd088449bc2b972e775596128f662c7e2ed5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 89b5f6a77d7c5673b06f5985d0f68ef128cf6c72
                       ab3a3b82bdccb03dcbde6292a0ec35cacb11bab5
                       fc19d960eb0ff215e5960da56c75ac31e5bce59e
                       1e71250215c5c04bd8483232262e5a9512d18ad6
                       754e950b78d203ea6672fdd520e457bc7136a850
                       c885998e650abaa1921c58fd569f88549deb816b
                       05e902095b20e9b03ca951660941e7122285734c
                       61df4984f22e96d8cbdcf5e78d5286fdc67db16b
                       7a754faa610d29cdbf36864ee582f18fc914650f
                       31b635118b0649a2f3781566ce936a0283d2f03e
                       5f4636a142e75cb193342fe0c8802325d30e08d2
                       384a5353714ff96c9a007670cb5525d5e1686a8d
                       35450bf6754fe2c1874eaf946424e9159b616465
                       63d28b6e5054996d1e57f574277370023ae555bb
                       019440cc466862685524f80e5e68f60b18590868
                       a50d2d8ae6448e5b443b2676d6c80a419bf615b6
                       691b43f217aa973c8d38f4e6377b6f66a319b5f6
                       67b8465f64822a0969055652aa381f0204b7a647
                       5c08fd6d3cbc05f972e113c024460e8ac73351e4
                       0f056e23
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3d:83:b8:d2:96:6e:fe:50:b9:e6:08:b7:ee:03:99:6b:ea:60:21:3a]
            modulus: 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
    public exponent: 10001

] 
2022-05-08 03:16:45.031  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-08 03:16:45.032 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-08 03:16:45.034 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-08 03:16:45.035 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-08 03:16:45.035  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-08 03:16:45.036  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-08 03:16:45.037  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-08 03:16:45.037 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-08 03:16:45.038 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-08 03:16:45.038 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-08 03:16:45.043 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-08 03:16:45.044 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-08 03:16:45.044 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-08 03:16:45.044 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-08 03:16:45.156  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-08 03:16:45.156  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-08 03:16:45.157 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-08 03:16:45.157 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-08 03:16:45.158  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-08 03:16:45.159  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-08 03:16:45.159 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-08 03:16:45.159 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-08 03:16:45.160 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-08 03:16:45.160 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-08 03:16:45.161 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-08 03:16:45.161 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-08 03:16:45.162 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-08 03:16:45.162 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-08 03:16:45.162 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-08 03:16:45.163 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-08 03:16:45.166 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 275469374728004569870687206726340640225030200706
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 08 01:46:45 UTC 2022
           Final Date: Fri May 07 01:46:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0d:4f:b2:65:57:06:02:da:2f:ab:13:45:6b:0e:8a:31:16:fa:fd:46]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 89b5f6a77d7c5673b06f5985d0f68ef128cf6c72
                       ab3a3b82bdccb03dcbde6292a0ec35cacb11bab5
                       fc19d960eb0ff215e5960da56c75ac31e5bce59e
                       1e71250215c5c04bd8483232262e5a9512d18ad6
                       754e950b78d203ea6672fdd520e457bc7136a850
                       c885998e650abaa1921c58fd569f88549deb816b
                       05e902095b20e9b03ca951660941e7122285734c
                       61df4984f22e96d8cbdcf5e78d5286fdc67db16b
                       7a754faa610d29cdbf36864ee582f18fc914650f
                       31b635118b0649a2f3781566ce936a0283d2f03e
                       5f4636a142e75cb193342fe0c8802325d30e08d2
                       384a5353714ff96c9a007670cb5525d5e1686a8d
                       35450bf6754fe2c1874eaf946424e9159b616465
                       63d28b6e5054996d1e57f574277370023ae555bb
                       019440cc466862685524f80e5e68f60b18590868
                       a50d2d8ae6448e5b443b2676d6c80a419bf615b6
                       691b43f217aa973c8d38f4e6377b6f66a319b5f6
                       67b8465f64822a0969055652aa381f0204b7a647
                       5c08fd6d3cbc05f972e113c024460e8ac73351e4
                       0f056e23
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [dd:70:55:8b:2f:82:71:9a:28:2e:7f:16:83:f1:e3:37:1e:82:74:53]
            modulus: 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
    public exponent: 10001

] 
2022-05-08 03:18:12.365  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-08 03:18:12.368 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-08 03:18:12.370 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-08 03:18:12.371 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-08 03:18:12.371  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-08 03:18:12.372  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-08 03:18:12.373  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-08 03:18:12.373 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-08 03:18:12.373 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-08 03:18:12.374 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-08 03:18:12.378 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-08 03:18:12.378 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-08 03:18:12.378 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-08 03:18:12.379 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-08 03:18:12.544  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-08 03:18:12.545  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-08 03:18:12.546 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-08 03:18:12.546 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-08 03:18:12.548  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-08 03:18:12.549  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-08 03:18:12.550 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-08 03:18:12.550 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-08 03:18:12.551 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-08 03:18:12.551 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-08 03:18:12.552 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-08 03:18:12.552 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-08 03:18:12.552 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-08 03:18:12.552 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-08 03:18:12.553 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-08 03:18:12.553 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-08 03:18:12.650 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 275469374728004569870687206726340640225030200706
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 08 01:46:45 UTC 2022
           Final Date: Fri May 07 01:46:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0d:4f:b2:65:57:06:02:da:2f:ab:13:45:6b:0e:8a:31:16:fa:fd:46]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 89b5f6a77d7c5673b06f5985d0f68ef128cf6c72
                       ab3a3b82bdccb03dcbde6292a0ec35cacb11bab5
                       fc19d960eb0ff215e5960da56c75ac31e5bce59e
                       1e71250215c5c04bd8483232262e5a9512d18ad6
                       754e950b78d203ea6672fdd520e457bc7136a850
                       c885998e650abaa1921c58fd569f88549deb816b
                       05e902095b20e9b03ca951660941e7122285734c
                       61df4984f22e96d8cbdcf5e78d5286fdc67db16b
                       7a754faa610d29cdbf36864ee582f18fc914650f
                       31b635118b0649a2f3781566ce936a0283d2f03e
                       5f4636a142e75cb193342fe0c8802325d30e08d2
                       384a5353714ff96c9a007670cb5525d5e1686a8d
                       35450bf6754fe2c1874eaf946424e9159b616465
                       63d28b6e5054996d1e57f574277370023ae555bb
                       019440cc466862685524f80e5e68f60b18590868
                       a50d2d8ae6448e5b443b2676d6c80a419bf615b6
                       691b43f217aa973c8d38f4e6377b6f66a319b5f6
                       67b8465f64822a0969055652aa381f0204b7a647
                       5c08fd6d3cbc05f972e113c024460e8ac73351e4
                       0f056e23
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b4:83:d7:ac:cf:ee:36:94:cf:db:e4:4c:8d:63:4d:a7:48:51:34:80]
            modulus: cfd0f6d7dc659d24a3aca31cb48a3620f40c51ee075db22219e091ec75fd29bcf88b233cc685a9bb8d17e55b440fd374e6b8ed1eb6e56aa8b842aacd5eaf6a38e69e42d06948cfde2ed4890c0ad6f96261f72c5a4349476a5e8c1196dab02a586edfface989823c9ff47701e8e5c815d1ffc0b5240fee5eca02830feded9e9deeb159cc7ce7c504207558a6419e3b85f30040b471a1e00b170dbb8fdd971a5e68215942fea46e3f3bdcb8671ca8d599c0f27f6b0d7ee4e91f1bff8142c5accd67e8d5a4d6562becbd5312b1e7d0a8993bda683e23a3cfe828a5ffefbb3db1b547382ff263bdd976512a7f2d91edd2339dde030e108f53e1780da7a2ab5a3eb0f
    public exponent: 10001

] 
2022-05-08 03:21:38.302  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-08 03:21:38.303 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-08 03:21:38.305 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-08 03:21:38.305 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-08 03:21:38.306  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-08 03:21:38.306  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-08 03:21:38.307  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-08 03:21:38.307 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-08 03:21:38.307 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-08 03:21:38.308 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-08 03:21:38.314 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-08 03:21:38.314 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-08 03:21:38.315 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-08 03:21:38.315 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-08 03:21:38.433  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-08 03:21:38.434  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-08 03:21:38.434 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-08 03:21:38.434 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-08 03:21:38.436  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-08 03:21:38.436  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-08 03:21:38.437 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-08 03:21:38.437 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-08 03:21:38.437 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-08 03:21:38.438 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-08 03:21:38.438 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-08 03:21:38.439 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-08 03:21:38.439 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-08 03:21:38.440 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-08 03:21:38.440 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-08 03:21:38.440 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-08 03:21:38.446 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 275469374728004569870687206726340640225030200706
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 08 01:46:45 UTC 2022
           Final Date: Fri May 07 01:46:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0d:4f:b2:65:57:06:02:da:2f:ab:13:45:6b:0e:8a:31:16:fa:fd:46]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 89b5f6a77d7c5673b06f5985d0f68ef128cf6c72
                       ab3a3b82bdccb03dcbde6292a0ec35cacb11bab5
                       fc19d960eb0ff215e5960da56c75ac31e5bce59e
                       1e71250215c5c04bd8483232262e5a9512d18ad6
                       754e950b78d203ea6672fdd520e457bc7136a850
                       c885998e650abaa1921c58fd569f88549deb816b
                       05e902095b20e9b03ca951660941e7122285734c
                       61df4984f22e96d8cbdcf5e78d5286fdc67db16b
                       7a754faa610d29cdbf36864ee582f18fc914650f
                       31b635118b0649a2f3781566ce936a0283d2f03e
                       5f4636a142e75cb193342fe0c8802325d30e08d2
                       384a5353714ff96c9a007670cb5525d5e1686a8d
                       35450bf6754fe2c1874eaf946424e9159b616465
                       63d28b6e5054996d1e57f574277370023ae555bb
                       019440cc466862685524f80e5e68f60b18590868
                       a50d2d8ae6448e5b443b2676d6c80a419bf615b6
                       691b43f217aa973c8d38f4e6377b6f66a319b5f6
                       67b8465f64822a0969055652aa381f0204b7a647
                       5c08fd6d3cbc05f972e113c024460e8ac73351e4
                       0f056e23
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4a:3f:05:ec:df:1c:e9:96:84:af:71:51:11:05:48:1a:22:94:e0:69]
            modulus: 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
    public exponent: 10001

] 
2022-05-08 03:26:05.570  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-08 03:26:05.571 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-08 03:26:05.573 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-08 03:26:05.574 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-08 03:26:05.574  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-08 03:26:05.575  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-08 03:26:05.575  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-08 03:26:05.575 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-08 03:26:05.576 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-08 03:26:05.576 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-08 03:26:05.581 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-08 03:26:05.582 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-08 03:26:05.582 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-08 03:26:05.582 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-08 03:26:05.676  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-08 03:26:05.677  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-08 03:26:05.678 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-08 03:26:05.678 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-08 03:26:05.679  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-08 03:26:05.680  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-08 03:26:05.680 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-08 03:26:05.681 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-08 03:26:05.681 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-08 03:26:05.681 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-08 03:26:05.682 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-08 03:26:05.682 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-08 03:26:05.683 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-08 03:26:05.683 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-08 03:26:05.683 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-08 03:26:05.684 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-08 03:26:05.687 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 275469374728004569870687206726340640225030200706
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 08 01:46:45 UTC 2022
           Final Date: Fri May 07 01:46:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0d:4f:b2:65:57:06:02:da:2f:ab:13:45:6b:0e:8a:31:16:fa:fd:46]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 89b5f6a77d7c5673b06f5985d0f68ef128cf6c72
                       ab3a3b82bdccb03dcbde6292a0ec35cacb11bab5
                       fc19d960eb0ff215e5960da56c75ac31e5bce59e
                       1e71250215c5c04bd8483232262e5a9512d18ad6
                       754e950b78d203ea6672fdd520e457bc7136a850
                       c885998e650abaa1921c58fd569f88549deb816b
                       05e902095b20e9b03ca951660941e7122285734c
                       61df4984f22e96d8cbdcf5e78d5286fdc67db16b
                       7a754faa610d29cdbf36864ee582f18fc914650f
                       31b635118b0649a2f3781566ce936a0283d2f03e
                       5f4636a142e75cb193342fe0c8802325d30e08d2
                       384a5353714ff96c9a007670cb5525d5e1686a8d
                       35450bf6754fe2c1874eaf946424e9159b616465
                       63d28b6e5054996d1e57f574277370023ae555bb
                       019440cc466862685524f80e5e68f60b18590868
                       a50d2d8ae6448e5b443b2676d6c80a419bf615b6
                       691b43f217aa973c8d38f4e6377b6f66a319b5f6
                       67b8465f64822a0969055652aa381f0204b7a647
                       5c08fd6d3cbc05f972e113c024460e8ac73351e4
                       0f056e23
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [21:6d:4d:b6:43:70:fe:a6:86:fa:5c:47:1a:4c:2c:e7:15:66:d7:a8]
            modulus: 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
    public exponent: 10001

] 
2022-05-08 03:29:39.627  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-08 03:29:39.629 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-08 03:29:39.631 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-08 03:29:39.632 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-08 03:29:39.633  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-08 03:29:39.634  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-08 03:29:39.634  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-08 03:29:39.634 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-08 03:29:39.635 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-08 03:29:39.635 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-08 03:29:39.638 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-08 03:29:39.639 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-08 03:29:39.639 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-08 03:29:39.639 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-08 03:29:39.741  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-08 03:29:39.742  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-08 03:29:39.742 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-08 03:29:39.742 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-08 03:29:39.744  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-08 03:29:39.745  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-08 03:29:39.745 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-08 03:29:39.745 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-08 03:29:39.745 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-08 03:29:39.746 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-08 03:29:39.747 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-08 03:29:39.747 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-08 03:29:39.748 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-08 03:29:39.748 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-08 03:29:39.749 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-08 03:29:39.750 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-08 03:29:39.754 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 275469374728004569870687206726340640225030200706
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 08 01:46:45 UTC 2022
           Final Date: Fri May 07 01:46:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0d:4f:b2:65:57:06:02:da:2f:ab:13:45:6b:0e:8a:31:16:fa:fd:46]
            modulus: c7cf03283c58f47acab0fc89496b8ab2e523a8d1459f5e7fb97db7ff191d5f019b0ef2ccc6b00caeb2563903b42f2fc6471fc39aabc2663a820f3294a13a2423a4515fa2bf1858212391d07c5bf4111391e128fe4524338a25f136c4a89538b97ac5acbeb017ef685086b388416669b2b02d22f9606c3b742ffafd9da6377fd39e927163a8517be734daf93bdd0bdbeaf45e29d98c13bc5fc1a8931b2593d4c4ddbdac1927ac31c75429c81f8f1e5fde5c50c1d685c93761b3555ccbf83fcd7a8bf102ceea9d3939e3fd289d1716e67429461a027b61ddc429b4e8387cb42659f243cc4b285f0b503a2749f5774633cbf91b2de61728405b8554edfe6b0437500e580c1e192d1c5e4788ef547c7849975caa2f154fb8d84794fa112acc8b578e1887be5adb97f7a3ad06e7e19602cc364f383256ea5cbf25c20b2c9cc4740fb439e88f5036e1bd693af33479ce6b1dd2ff81a87451318ef9e7b9ce317bd0e08aec682157075230de7615e81f87c1bd088449bc2b972e775596128f662c7e2ed5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 89b5f6a77d7c5673b06f5985d0f68ef128cf6c72
                       ab3a3b82bdccb03dcbde6292a0ec35cacb11bab5
                       fc19d960eb0ff215e5960da56c75ac31e5bce59e
                       1e71250215c5c04bd8483232262e5a9512d18ad6
                       754e950b78d203ea6672fdd520e457bc7136a850
                       c885998e650abaa1921c58fd569f88549deb816b
                       05e902095b20e9b03ca951660941e7122285734c
                       61df4984f22e96d8cbdcf5e78d5286fdc67db16b
                       7a754faa610d29cdbf36864ee582f18fc914650f
                       31b635118b0649a2f3781566ce936a0283d2f03e
                       5f4636a142e75cb193342fe0c8802325d30e08d2
                       384a5353714ff96c9a007670cb5525d5e1686a8d
                       35450bf6754fe2c1874eaf946424e9159b616465
                       63d28b6e5054996d1e57f574277370023ae555bb
                       019440cc466862685524f80e5e68f60b18590868
                       a50d2d8ae6448e5b443b2676d6c80a419bf615b6
                       691b43f217aa973c8d38f4e6377b6f66a319b5f6
                       67b8465f64822a0969055652aa381f0204b7a647
                       5c08fd6d3cbc05f972e113c024460e8ac73351e4
                       0f056e23
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1f:17:71:84:e9:60:89:bc:85:8d:63:f2:b9:a9:47:b1:de:b8:38:38]
            modulus: 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
    public exponent: 10001

] 
2022-05-08 03:35:09.193  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-08 03:35:09.195 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-08 03:35:09.197 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-08 03:35:09.198 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-08 03:35:09.198  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-08 03:35:09.199  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-08 03:35:09.199  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-08 03:35:09.200 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-08 03:35:09.200 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-08 03:35:09.200 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-08 03:35:09.206 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-08 03:35:09.207 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-08 03:35:09.207 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-08 03:35:09.207 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-08 03:35:09.299  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-08 03:35:09.344  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-08 03:35:09.344 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-08 03:35:09.345 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-08 03:35:09.347  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-08 03:35:09.348  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-08 03:35:09.348 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-08 03:35:09.349 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-08 03:35:09.349 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-08 03:35:09.350 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-08 03:35:09.350 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-08 03:35:09.350 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-08 03:35:09.351 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-08 03:35:09.351 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-08 03:35:09.351 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-08 03:35:09.352 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-08 03:35:09.354 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 275469374728004569870687206726340640225030200706
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 08 01:46:45 UTC 2022
           Final Date: Fri May 07 01:46:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0d:4f:b2:65:57:06:02:da:2f:ab:13:45:6b:0e:8a:31:16:fa:fd:46]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 89b5f6a77d7c5673b06f5985d0f68ef128cf6c72
                       ab3a3b82bdccb03dcbde6292a0ec35cacb11bab5
                       fc19d960eb0ff215e5960da56c75ac31e5bce59e
                       1e71250215c5c04bd8483232262e5a9512d18ad6
                       754e950b78d203ea6672fdd520e457bc7136a850
                       c885998e650abaa1921c58fd569f88549deb816b
                       05e902095b20e9b03ca951660941e7122285734c
                       61df4984f22e96d8cbdcf5e78d5286fdc67db16b
                       7a754faa610d29cdbf36864ee582f18fc914650f
                       31b635118b0649a2f3781566ce936a0283d2f03e
                       5f4636a142e75cb193342fe0c8802325d30e08d2
                       384a5353714ff96c9a007670cb5525d5e1686a8d
                       35450bf6754fe2c1874eaf946424e9159b616465
                       63d28b6e5054996d1e57f574277370023ae555bb
                       019440cc466862685524f80e5e68f60b18590868
                       a50d2d8ae6448e5b443b2676d6c80a419bf615b6
                       691b43f217aa973c8d38f4e6377b6f66a319b5f6
                       67b8465f64822a0969055652aa381f0204b7a647
                       5c08fd6d3cbc05f972e113c024460e8ac73351e4
                       0f056e23
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ac:95:f0:80:a3:af:ed:b3:44:d3:7a:90:7f:e7:c0:fb:c5:8b:a7:7e]
            modulus: 991f06e2d018814f195461fbaad74d1309f93df6f367925133505522d91a2fbb97b0b766e6598efa739b251970ff94af43a265f88fbde55c9a11cf8674d18434882bb10e97c3ce9aaf1ddc9dcef426769fca720f4a88d44dfc4be661b106ee3d76d7f1e9eced1f0e91f4c6151016434618ea9388deb94f1843a01f690f887b25eae62c4a543ef11343b8892a6eeb2e6cd8d034ad1bf3d94d221eb61e22cf30d76fcb6e064d2048516f2cb0a1f1b598afbf405672809974fbb1f922aa906700fe8018aea0587ae5018db5bdc99c7f0631228a1cfa3da90eeab7b0d4f984dae6f4166641959eb2372254e727edb538dc43b602bacca5b8dc02c4f8d31f87bb0c5b
    public exponent: 10001

] 
2022-05-08 03:39:15.597  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-08 03:39:15.599 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-08 03:39:15.601 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-08 03:39:15.601 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-08 03:39:15.602  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-08 03:39:15.603  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-08 03:39:15.603  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-08 03:39:15.603 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-08 03:39:15.603 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-08 03:39:15.604 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-08 03:39:15.608 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-08 03:39:15.609 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-08 03:39:15.609 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-08 03:39:15.609 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-08 03:39:15.726  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-08 03:39:15.727  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-08 03:39:15.727 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-08 03:39:15.727 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-08 03:39:15.729  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-08 03:39:15.730  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-08 03:39:15.730 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-08 03:39:15.730 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-08 03:39:15.731 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-08 03:39:15.731 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-08 03:39:15.732 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-08 03:39:15.732 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-08 03:39:15.733 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-08 03:39:15.733 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-08 03:39:15.733 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-08 03:39:15.744 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-08 03:39:15.746 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 275469374728004569870687206726340640225030200706
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 08 01:46:45 UTC 2022
           Final Date: Fri May 07 01:46:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0d:4f:b2:65:57:06:02:da:2f:ab:13:45:6b:0e:8a:31:16:fa:fd:46]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 89b5f6a77d7c5673b06f5985d0f68ef128cf6c72
                       ab3a3b82bdccb03dcbde6292a0ec35cacb11bab5
                       fc19d960eb0ff215e5960da56c75ac31e5bce59e
                       1e71250215c5c04bd8483232262e5a9512d18ad6
                       754e950b78d203ea6672fdd520e457bc7136a850
                       c885998e650abaa1921c58fd569f88549deb816b
                       05e902095b20e9b03ca951660941e7122285734c
                       61df4984f22e96d8cbdcf5e78d5286fdc67db16b
                       7a754faa610d29cdbf36864ee582f18fc914650f
                       31b635118b0649a2f3781566ce936a0283d2f03e
                       5f4636a142e75cb193342fe0c8802325d30e08d2
                       384a5353714ff96c9a007670cb5525d5e1686a8d
                       35450bf6754fe2c1874eaf946424e9159b616465
                       63d28b6e5054996d1e57f574277370023ae555bb
                       019440cc466862685524f80e5e68f60b18590868
                       a50d2d8ae6448e5b443b2676d6c80a419bf615b6
                       691b43f217aa973c8d38f4e6377b6f66a319b5f6
                       67b8465f64822a0969055652aa381f0204b7a647
                       5c08fd6d3cbc05f972e113c024460e8ac73351e4
                       0f056e23
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4c:e9:3f:8f:81:fb:83:54:79:d4:c3:e5:40:ee:84:f7:97:fa:75:23]
            modulus: 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
    public exponent: 10001

] 
2022-05-08 03:44:38.822  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-08 03:44:38.824 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-08 03:44:38.826 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-08 03:44:38.826 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-08 03:44:38.826  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-08 03:44:38.827  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-08 03:44:38.827  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-08 03:44:38.827 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-08 03:44:38.828 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-08 03:44:38.828 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-08 03:44:38.832 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-08 03:44:38.832 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-08 03:44:38.832 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-08 03:44:38.832 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-08 03:44:38.935  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-08 03:44:38.936  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-08 03:44:38.936 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-08 03:44:38.937 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-08 03:44:38.939  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-08 03:44:38.939  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-08 03:44:38.940 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-08 03:44:38.940 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-08 03:44:38.940 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-08 03:44:38.940 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-08 03:44:38.941 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-08 03:44:38.941 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-08 03:44:38.941 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-08 03:44:38.942 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-08 03:44:38.942 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-08 03:44:38.942 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-08 03:44:38.945 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 275469374728004569870687206726340640225030200706
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 08 01:46:45 UTC 2022
           Final Date: Fri May 07 01:46:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [0d:4f:b2:65:57:06:02:da:2f:ab:13:45:6b:0e:8a:31:16:fa:fd:46]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 89b5f6a77d7c5673b06f5985d0f68ef128cf6c72
                       ab3a3b82bdccb03dcbde6292a0ec35cacb11bab5
                       fc19d960eb0ff215e5960da56c75ac31e5bce59e
                       1e71250215c5c04bd8483232262e5a9512d18ad6
                       754e950b78d203ea6672fdd520e457bc7136a850
                       c885998e650abaa1921c58fd569f88549deb816b
                       05e902095b20e9b03ca951660941e7122285734c
                       61df4984f22e96d8cbdcf5e78d5286fdc67db16b
                       7a754faa610d29cdbf36864ee582f18fc914650f
                       31b635118b0649a2f3781566ce936a0283d2f03e
                       5f4636a142e75cb193342fe0c8802325d30e08d2
                       384a5353714ff96c9a007670cb5525d5e1686a8d
                       35450bf6754fe2c1874eaf946424e9159b616465
                       63d28b6e5054996d1e57f574277370023ae555bb
                       019440cc466862685524f80e5e68f60b18590868
                       a50d2d8ae6448e5b443b2676d6c80a419bf615b6
                       691b43f217aa973c8d38f4e6377b6f66a319b5f6
                       67b8465f64822a0969055652aa381f0204b7a647
                       5c08fd6d3cbc05f972e113c024460e8ac73351e4
                       0f056e23
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [37:4f:00:23:21:41:dd:c9:e4:36:fc:5a:3c:4e:06:0b:70:a2:23:df]
            modulus: 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
    public exponent: 10001

]