Results

By type

          2022-06-22 02:30:27,181 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-06-22 02:30:30,890 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-06-22 02:30:33.593  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jun 22, 2022 2:30:42 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jun 22, 2022 2:30:42 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 22, 2022 2:30:42 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jun 22, 2022 2:30:42 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-06-22 02:30:44.382 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-06-22 02:30:45.587  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-06-22 02:30:46.184  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-06-22 02:30:48.890 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-06-22 02:30:48.893 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-06-22 02:30:48.972 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-06-22 02:30:48.975 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-06-22 02:30:49.178 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-06-22 02:30:49.181 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-06-22 02:30:49.591 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-06-22 02:30:54.180 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jun 22, 2022 2:30:57 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-06-22 02:30:58.092  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 34.114 seconds (JVM running for 41.131)
Jun 22, 2022 2:31:04 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-06-22 02:32:39.086  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-22 02:32:39.178 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-22 02:32:39.288 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-22 02:32:39.292 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-22 02:32:39.373  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-22 02:32:39.376  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-22 02:32:39.377  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-22 02:32:39.378 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-22 02:32:39.378 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 02:32:39.382 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-22 02:32:39.474 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-22 02:32:39.477 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-22 02:32:39.574 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-22 02:32:39.578 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 02:32:39.579 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 02:32:39.582 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 02:32:40.871  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-22 02:32:40.873  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-22 02:32:40.874 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-22 02:32:40.875 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 02:32:40.883  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-22 02:32:40.883  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-22 02:32:40.884 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 02:32:40.885 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 02:32:40.885 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 02:32:40.979 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 02:32:40.979 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 02:32:40.980 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 02:32:40.985 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 02:32:40.985 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 02:32:40.986 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 02:32:40.987 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-22 02:32:41.083 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 426256456938610623904980011414343062971668310798
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 22 02:27:08 UTC 2022
           Final Date: Mon Jun 21 02:27:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:2d:cd:a9:61:76:c9:79:52:df:40:74:84:e6:22:fa:d1:e0:47:c7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: af44d41b51b37764a83730278f3fe25902d45bb3
                       0df313aadbc9c04d774a874ff119d307b6774610
                       a1790cd27295502d9bbf63e1262bb0d2bfa02e5d
                       c49c7c964de11e274d7670f1299ad2bcd6d3306a
                       6c3c8e3b6d1ecd4aa0fdd99956d8f81981605dc9
                       6d0c4ebd754e8a288d1c5c5d93de66f1b89fe3e8
                       ff049efd5463cf128936cf3241cb6029ff935fb6
                       d774b9ff1ededc5a96789ecfe019119fb557ef4d
                       1d53d2a6955632b3622b55260f7527f32343524f
                       30963901444862c2e30804f41ede7be042023591
                       f4ba424954c5b5d7cf89727afa3d18ebc797d6f5
                       90f9d522f51478c1a4378a7d261c88e6d6fef13d
                       a393a20dc531d4f860dbbae0327020e811a8b5ea
                       faef44300d6f4227b117516fef23286919f44f4b
                       faaefb86e120cf14d0f9c2ff92cd700ede5f2051
                       b5ffc4fe9ffcbadc32861071e58c902b7a12b52c
                       ed4ca5d4e765bba1f49c8d32a7c42bd03ea67ac3
                       0990dc32eaa7f68ff97ad37f1bea919ec27bf067
                       3fb6a92c7d7f2b6cbd25a800065ffe121b86dd9d
                       dcadf648
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e5:1e:bf:1d:5c:6a:21:42:c7:2b:11:8c:12:9a:41:82:c2:6e:96:0c]
            modulus: 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
    public exponent: 10001

] 
2022-06-22 06:57:16.052  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-22 06:57:16.053 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-22 06:57:16.056 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 06:57:16.057 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-22 06:57:16.059  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 06:57:16.060  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-22 06:57:16.060  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-22 06:57:16.061 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-22 06:57:16.061 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-22 06:57:16.062 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-22 06:57:16.072 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-22 06:57:16.073 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 06:57:16.073 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 06:57:16.073 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 06:57:16.197  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-22 06:57:16.198  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-22 06:57:16.198 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-22 06:57:16.198 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 06:57:16.201  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-22 06:57:16.202  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-22 06:57:16.202 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 06:57:16.202 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 06:57:16.203 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 06:57:16.204 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 06:57:16.204 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 06:57:16.204 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 06:57:16.205 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 06:57:16.206 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 06:57:16.206 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 06:57:16.271 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-22 06:57:16.275 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 426256456938610623904980011414343062971668310798
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 22 02:27:08 UTC 2022
           Final Date: Mon Jun 21 02:27:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:2d:cd:a9:61:76:c9:79:52:df:40:74:84:e6:22:fa:d1:e0:47:c7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: af44d41b51b37764a83730278f3fe25902d45bb3
                       0df313aadbc9c04d774a874ff119d307b6774610
                       a1790cd27295502d9bbf63e1262bb0d2bfa02e5d
                       c49c7c964de11e274d7670f1299ad2bcd6d3306a
                       6c3c8e3b6d1ecd4aa0fdd99956d8f81981605dc9
                       6d0c4ebd754e8a288d1c5c5d93de66f1b89fe3e8
                       ff049efd5463cf128936cf3241cb6029ff935fb6
                       d774b9ff1ededc5a96789ecfe019119fb557ef4d
                       1d53d2a6955632b3622b55260f7527f32343524f
                       30963901444862c2e30804f41ede7be042023591
                       f4ba424954c5b5d7cf89727afa3d18ebc797d6f5
                       90f9d522f51478c1a4378a7d261c88e6d6fef13d
                       a393a20dc531d4f860dbbae0327020e811a8b5ea
                       faef44300d6f4227b117516fef23286919f44f4b
                       faaefb86e120cf14d0f9c2ff92cd700ede5f2051
                       b5ffc4fe9ffcbadc32861071e58c902b7a12b52c
                       ed4ca5d4e765bba1f49c8d32a7c42bd03ea67ac3
                       0990dc32eaa7f68ff97ad37f1bea919ec27bf067
                       3fb6a92c7d7f2b6cbd25a800065ffe121b86dd9d
                       dcadf648
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [70:1f:bc:b0:a2:da:0c:74:cc:ac:6c:e5:8c:e0:39:e1:16:bc:ef:08]
            modulus: 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
    public exponent: 10001

] 
2022-06-22 07:01:32.967  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-22 07:01:32.968 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-22 07:01:32.970 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 07:01:32.970 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-22 07:01:32.971  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 07:01:32.971  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-22 07:01:32.971  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-22 07:01:32.972 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-22 07:01:32.972 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-22 07:01:32.972 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-22 07:01:32.977 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-22 07:01:32.978 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 07:01:32.978 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 07:01:32.978 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 07:01:33.069  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-22 07:01:33.070  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-22 07:01:33.071 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-22 07:01:33.071 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 07:01:33.074  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-22 07:01:33.074  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-22 07:01:33.075 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:01:33.075 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:01:33.075 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:01:33.076 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:01:33.077 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:01:33.077 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:01:33.078 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:01:33.078 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:01:33.079 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:01:33.080 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-22 07:01:33.084 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 426256456938610623904980011414343062971668310798
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 22 02:27:08 UTC 2022
           Final Date: Mon Jun 21 02:27:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:2d:cd:a9:61:76:c9:79:52:df:40:74:84:e6:22:fa:d1:e0:47:c7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: af44d41b51b37764a83730278f3fe25902d45bb3
                       0df313aadbc9c04d774a874ff119d307b6774610
                       a1790cd27295502d9bbf63e1262bb0d2bfa02e5d
                       c49c7c964de11e274d7670f1299ad2bcd6d3306a
                       6c3c8e3b6d1ecd4aa0fdd99956d8f81981605dc9
                       6d0c4ebd754e8a288d1c5c5d93de66f1b89fe3e8
                       ff049efd5463cf128936cf3241cb6029ff935fb6
                       d774b9ff1ededc5a96789ecfe019119fb557ef4d
                       1d53d2a6955632b3622b55260f7527f32343524f
                       30963901444862c2e30804f41ede7be042023591
                       f4ba424954c5b5d7cf89727afa3d18ebc797d6f5
                       90f9d522f51478c1a4378a7d261c88e6d6fef13d
                       a393a20dc531d4f860dbbae0327020e811a8b5ea
                       faef44300d6f4227b117516fef23286919f44f4b
                       faaefb86e120cf14d0f9c2ff92cd700ede5f2051
                       b5ffc4fe9ffcbadc32861071e58c902b7a12b52c
                       ed4ca5d4e765bba1f49c8d32a7c42bd03ea67ac3
                       0990dc32eaa7f68ff97ad37f1bea919ec27bf067
                       3fb6a92c7d7f2b6cbd25a800065ffe121b86dd9d
                       dcadf648
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [da:0c:fb:32:ff:06:25:6f:3c:06:f7:52:98:fc:fa:66:13:72:55:d6]
            modulus: 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
    public exponent: 10001

] 
2022-06-22 07:04:59.382  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-22 07:04:59.383 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-22 07:04:59.384 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 07:04:59.385 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-22 07:04:59.385  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 07:04:59.386  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-22 07:04:59.386  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-22 07:04:59.386 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-22 07:04:59.387 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-22 07:04:59.387 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-22 07:04:59.391 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-22 07:04:59.392 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 07:04:59.392 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 07:04:59.392 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 07:04:59.476  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-22 07:04:59.477  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-22 07:04:59.477 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-22 07:04:59.478 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 07:04:59.479  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-22 07:04:59.479  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-22 07:04:59.480 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:04:59.480 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:04:59.480 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:04:59.481 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:04:59.481 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:04:59.481 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:04:59.482 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:04:59.482 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:04:59.483 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:04:59.483 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-22 07:04:59.486 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 426256456938610623904980011414343062971668310798
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 22 02:27:08 UTC 2022
           Final Date: Mon Jun 21 02:27:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:2d:cd:a9:61:76:c9:79:52:df:40:74:84:e6:22:fa:d1:e0:47:c7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: af44d41b51b37764a83730278f3fe25902d45bb3
                       0df313aadbc9c04d774a874ff119d307b6774610
                       a1790cd27295502d9bbf63e1262bb0d2bfa02e5d
                       c49c7c964de11e274d7670f1299ad2bcd6d3306a
                       6c3c8e3b6d1ecd4aa0fdd99956d8f81981605dc9
                       6d0c4ebd754e8a288d1c5c5d93de66f1b89fe3e8
                       ff049efd5463cf128936cf3241cb6029ff935fb6
                       d774b9ff1ededc5a96789ecfe019119fb557ef4d
                       1d53d2a6955632b3622b55260f7527f32343524f
                       30963901444862c2e30804f41ede7be042023591
                       f4ba424954c5b5d7cf89727afa3d18ebc797d6f5
                       90f9d522f51478c1a4378a7d261c88e6d6fef13d
                       a393a20dc531d4f860dbbae0327020e811a8b5ea
                       faef44300d6f4227b117516fef23286919f44f4b
                       faaefb86e120cf14d0f9c2ff92cd700ede5f2051
                       b5ffc4fe9ffcbadc32861071e58c902b7a12b52c
                       ed4ca5d4e765bba1f49c8d32a7c42bd03ea67ac3
                       0990dc32eaa7f68ff97ad37f1bea919ec27bf067
                       3fb6a92c7d7f2b6cbd25a800065ffe121b86dd9d
                       dcadf648
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1f:b9:29:a3:89:0e:dc:ff:0b:7c:23:5e:a8:0e:06:1d:08:e5:3d:3c]
            modulus: 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
    public exponent: 10001

] 
2022-06-22 07:09:19.797  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-22 07:09:19.798 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-22 07:09:19.800 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 07:09:19.800 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-22 07:09:19.800  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 07:09:19.801  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-22 07:09:19.801  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-22 07:09:19.802 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-22 07:09:19.802 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-22 07:09:19.802 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-22 07:09:19.806 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-22 07:09:19.807 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 07:09:19.807 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 07:09:19.807 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 07:09:19.898  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-22 07:09:19.898  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-22 07:09:19.898 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-22 07:09:19.899 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 07:09:19.900  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-22 07:09:19.900  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-22 07:09:19.901 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:09:19.901 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:09:19.901 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:09:19.902 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:09:19.902 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:09:19.902 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:09:19.903 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:09:19.903 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:09:19.903 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:09:19.904 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-22 07:09:19.973 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 426256456938610623904980011414343062971668310798
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 22 02:27:08 UTC 2022
           Final Date: Mon Jun 21 02:27:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:2d:cd:a9:61:76:c9:79:52:df:40:74:84:e6:22:fa:d1:e0:47:c7]
            modulus: ee5c174a252fb8dccdbcbc0f8dd45c123b0ac982f8095ed5ed2dfacb7fe13b59484eb4eea7043197c97f2b0396b8a3a68d938820c62f674c5bfe75883d0e6019c901afed8cd147276e73aa3822a0857cedfcb09e7dd61e73ae808848c699e0ba4fcde0606fe7bb6ae589cd7b6e30e330a10ec69586bcce7f8427b75fdc3c996c5e9e2d02a2a6e397fe0d47c541908a9e9f615091e716ead4694948107f442534a177abec933d92ce6f7415c6713ce4517c969e3d5b35e097529e5ae36b12b652cc1f4f3db801f77978e09149d40aa749d8c7a875516ff713b7837033f19371e44bd1d9ee21613a3a0f154effb2b43718cd1a255f79707e85e79bab944a97f39fda6bbac55cf303dbc60d19218bf4b0b1c9057e5f1af132e10368c9625d2753ba9c4e349f80ed4bf6defa7bd480be353cd6c3522bf04daa1bcd6c24c01637d46320552ca619685062003d76baf467c58681d25c660f90670ca16a96558a619a218ae15264913161574a3aba2464cce7085a7cd362216caccedc3b1f3b1b0849d5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: af44d41b51b37764a83730278f3fe25902d45bb3
                       0df313aadbc9c04d774a874ff119d307b6774610
                       a1790cd27295502d9bbf63e1262bb0d2bfa02e5d
                       c49c7c964de11e274d7670f1299ad2bcd6d3306a
                       6c3c8e3b6d1ecd4aa0fdd99956d8f81981605dc9
                       6d0c4ebd754e8a288d1c5c5d93de66f1b89fe3e8
                       ff049efd5463cf128936cf3241cb6029ff935fb6
                       d774b9ff1ededc5a96789ecfe019119fb557ef4d
                       1d53d2a6955632b3622b55260f7527f32343524f
                       30963901444862c2e30804f41ede7be042023591
                       f4ba424954c5b5d7cf89727afa3d18ebc797d6f5
                       90f9d522f51478c1a4378a7d261c88e6d6fef13d
                       a393a20dc531d4f860dbbae0327020e811a8b5ea
                       faef44300d6f4227b117516fef23286919f44f4b
                       faaefb86e120cf14d0f9c2ff92cd700ede5f2051
                       b5ffc4fe9ffcbadc32861071e58c902b7a12b52c
                       ed4ca5d4e765bba1f49c8d32a7c42bd03ea67ac3
                       0990dc32eaa7f68ff97ad37f1bea919ec27bf067
                       3fb6a92c7d7f2b6cbd25a800065ffe121b86dd9d
                       dcadf648
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4c:59:e4:df:5f:9b:3d:4a:11:be:30:76:86:e6:48:ba:46:33:b4:53]
            modulus: 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
    public exponent: 10001

] 
2022-06-22 07:11:31.478  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-22 07:11:31.479 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-22 07:11:31.480 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-22 07:11:31.481 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-22 07:11:31.481  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-22 07:11:31.482  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-22 07:11:31.482  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-22 07:11:31.482 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-22 07:11:31.482 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-22 07:11:31.483 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-22 07:11:31.487 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-22 07:11:31.487 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 07:11:31.488 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 07:11:31.488 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 07:11:31.571  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-22 07:11:31.571  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-22 07:11:31.571 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-22 07:11:31.571 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 07:11:31.573  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-22 07:11:31.573  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-22 07:11:31.573 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:11:31.573 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:11:31.574 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:11:31.574 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:11:31.574 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:11:31.574 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:11:31.575 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:11:31.575 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:11:31.575 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:11:31.576 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-22 07:11:31.579 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 426256456938610623904980011414343062971668310798
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 22 02:27:08 UTC 2022
           Final Date: Mon Jun 21 02:27:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:2d:cd:a9:61:76:c9:79:52:df:40:74:84:e6:22:fa:d1:e0:47:c7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: af44d41b51b37764a83730278f3fe25902d45bb3
                       0df313aadbc9c04d774a874ff119d307b6774610
                       a1790cd27295502d9bbf63e1262bb0d2bfa02e5d
                       c49c7c964de11e274d7670f1299ad2bcd6d3306a
                       6c3c8e3b6d1ecd4aa0fdd99956d8f81981605dc9
                       6d0c4ebd754e8a288d1c5c5d93de66f1b89fe3e8
                       ff049efd5463cf128936cf3241cb6029ff935fb6
                       d774b9ff1ededc5a96789ecfe019119fb557ef4d
                       1d53d2a6955632b3622b55260f7527f32343524f
                       30963901444862c2e30804f41ede7be042023591
                       f4ba424954c5b5d7cf89727afa3d18ebc797d6f5
                       90f9d522f51478c1a4378a7d261c88e6d6fef13d
                       a393a20dc531d4f860dbbae0327020e811a8b5ea
                       faef44300d6f4227b117516fef23286919f44f4b
                       faaefb86e120cf14d0f9c2ff92cd700ede5f2051
                       b5ffc4fe9ffcbadc32861071e58c902b7a12b52c
                       ed4ca5d4e765bba1f49c8d32a7c42bd03ea67ac3
                       0990dc32eaa7f68ff97ad37f1bea919ec27bf067
                       3fb6a92c7d7f2b6cbd25a800065ffe121b86dd9d
                       dcadf648
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c7:41:70:24:7c:90:68:49:34:19:10:82:93:b1:bc:82:fd:9d:1b:28]
            modulus: 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
    public exponent: 10001

] 
2022-06-22 07:13:50.863  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-22 07:13:50.864 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-22 07:13:50.865 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-22 07:13:50.865 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-22 07:13:50.866  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-22 07:13:50.866  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-22 07:13:50.867  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-22 07:13:50.867 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-22 07:13:50.867 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-22 07:13:50.868 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-22 07:13:50.872 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-22 07:13:50.872 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 07:13:50.873 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 07:13:50.873 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 07:13:50.955  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-22 07:13:50.955  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-22 07:13:50.956 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-22 07:13:50.956 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 07:13:50.957  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-22 07:13:50.971  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-22 07:13:50.971 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:13:50.971 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:13:50.971 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:13:50.972 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:13:50.972 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:13:50.972 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:13:50.973 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:13:50.973 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:13:50.973 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:13:50.974 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-22 07:13:50.976 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 426256456938610623904980011414343062971668310798
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 22 02:27:08 UTC 2022
           Final Date: Mon Jun 21 02:27:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:2d:cd:a9:61:76:c9:79:52:df:40:74:84:e6:22:fa:d1:e0:47:c7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: af44d41b51b37764a83730278f3fe25902d45bb3
                       0df313aadbc9c04d774a874ff119d307b6774610
                       a1790cd27295502d9bbf63e1262bb0d2bfa02e5d
                       c49c7c964de11e274d7670f1299ad2bcd6d3306a
                       6c3c8e3b6d1ecd4aa0fdd99956d8f81981605dc9
                       6d0c4ebd754e8a288d1c5c5d93de66f1b89fe3e8
                       ff049efd5463cf128936cf3241cb6029ff935fb6
                       d774b9ff1ededc5a96789ecfe019119fb557ef4d
                       1d53d2a6955632b3622b55260f7527f32343524f
                       30963901444862c2e30804f41ede7be042023591
                       f4ba424954c5b5d7cf89727afa3d18ebc797d6f5
                       90f9d522f51478c1a4378a7d261c88e6d6fef13d
                       a393a20dc531d4f860dbbae0327020e811a8b5ea
                       faef44300d6f4227b117516fef23286919f44f4b
                       faaefb86e120cf14d0f9c2ff92cd700ede5f2051
                       b5ffc4fe9ffcbadc32861071e58c902b7a12b52c
                       ed4ca5d4e765bba1f49c8d32a7c42bd03ea67ac3
                       0990dc32eaa7f68ff97ad37f1bea919ec27bf067
                       3fb6a92c7d7f2b6cbd25a800065ffe121b86dd9d
                       dcadf648
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bf:a3:46:f6:1e:ef:b9:ad:57:23:0b:d0:00:32:2c:b5:54:22:4f:bc]
            modulus: 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
    public exponent: 10001

] 
2022-06-22 07:17:49.467  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-22 07:17:49.468 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-22 07:17:49.469 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-22 07:17:49.470 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-22 07:17:49.470  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-22 07:17:49.470  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-22 07:17:49.470  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-22 07:17:49.471 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-22 07:17:49.471 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-22 07:17:49.471 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-22 07:17:49.476 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-22 07:17:49.476 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 07:17:49.477 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 07:17:49.477 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 07:17:49.576  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-22 07:17:49.576  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-22 07:17:49.576 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-22 07:17:49.577 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 07:17:49.578  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-22 07:17:49.578  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-22 07:17:49.578 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:17:49.578 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:17:49.579 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:17:49.579 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:17:49.579 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:17:49.580 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:17:49.580 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:17:49.580 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:17:49.580 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:17:49.581 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-22 07:17:49.583 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 426256456938610623904980011414343062971668310798
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 22 02:27:08 UTC 2022
           Final Date: Mon Jun 21 02:27:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:2d:cd:a9:61:76:c9:79:52:df:40:74:84:e6:22:fa:d1:e0:47:c7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: af44d41b51b37764a83730278f3fe25902d45bb3
                       0df313aadbc9c04d774a874ff119d307b6774610
                       a1790cd27295502d9bbf63e1262bb0d2bfa02e5d
                       c49c7c964de11e274d7670f1299ad2bcd6d3306a
                       6c3c8e3b6d1ecd4aa0fdd99956d8f81981605dc9
                       6d0c4ebd754e8a288d1c5c5d93de66f1b89fe3e8
                       ff049efd5463cf128936cf3241cb6029ff935fb6
                       d774b9ff1ededc5a96789ecfe019119fb557ef4d
                       1d53d2a6955632b3622b55260f7527f32343524f
                       30963901444862c2e30804f41ede7be042023591
                       f4ba424954c5b5d7cf89727afa3d18ebc797d6f5
                       90f9d522f51478c1a4378a7d261c88e6d6fef13d
                       a393a20dc531d4f860dbbae0327020e811a8b5ea
                       faef44300d6f4227b117516fef23286919f44f4b
                       faaefb86e120cf14d0f9c2ff92cd700ede5f2051
                       b5ffc4fe9ffcbadc32861071e58c902b7a12b52c
                       ed4ca5d4e765bba1f49c8d32a7c42bd03ea67ac3
                       0990dc32eaa7f68ff97ad37f1bea919ec27bf067
                       3fb6a92c7d7f2b6cbd25a800065ffe121b86dd9d
                       dcadf648
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [23:65:b3:16:ef:c2:fa:83:50:47:1c:74:0a:b2:79:9f:cd:d1:8d:dd]
            modulus: a8b36cb2597e49dc3aad9c593d3f54bb613a38ee907246d96e6b97ea8dc249ed0749c36f1b2cdbf7e6c8fcfcb5e95a04e4c3d289c8163f7df43fe9cce32bac8939c219f22bede2c44071ca2c2bbd78e6d650cdb96cbd975998e4f9ffa091b084020cf925594beca9eb39b5387fb5012e226f7991221162b27bd8e896f22f2e3c90ceec35a8aa46ca42acd2b77a36923942851794d3c38f9319327e3b0e7d0181a7945017ec5ccd626f185baec0baf2c7d3799b966e3c392903cd8f26e2f6c3e2ec0e0154a82771f49ae143a894e7b9593769ba38302c109a27767c3e964cde1943dc7299347749410429f29169b6c99209cae3e324ed7ed5c9d03daf736fe1cd
    public exponent: 10001

] 
2022-06-22 07:18:36.622  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-22 07:18:36.623 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-22 07:18:36.624 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 07:18:36.624 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-22 07:18:36.625  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 07:18:36.625  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-22 07:18:36.626  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-22 07:18:36.626 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-22 07:18:36.626 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-22 07:18:36.627 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-22 07:18:36.631 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-22 07:18:36.631 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 07:18:36.631 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 07:18:36.632 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 07:18:36.703  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-22 07:18:36.703  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-22 07:18:36.703 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-22 07:18:36.704 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 07:18:36.705  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-22 07:18:36.705  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-22 07:18:36.706 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:18:36.706 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:18:36.706 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:18:36.707 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:18:36.707 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:18:36.707 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:18:36.708 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:18:36.708 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:18:36.708 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:18:36.709 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-22 07:18:36.711 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 426256456938610623904980011414343062971668310798
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 22 02:27:08 UTC 2022
           Final Date: Mon Jun 21 02:27:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:2d:cd:a9:61:76:c9:79:52:df:40:74:84:e6:22:fa:d1:e0:47:c7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: af44d41b51b37764a83730278f3fe25902d45bb3
                       0df313aadbc9c04d774a874ff119d307b6774610
                       a1790cd27295502d9bbf63e1262bb0d2bfa02e5d
                       c49c7c964de11e274d7670f1299ad2bcd6d3306a
                       6c3c8e3b6d1ecd4aa0fdd99956d8f81981605dc9
                       6d0c4ebd754e8a288d1c5c5d93de66f1b89fe3e8
                       ff049efd5463cf128936cf3241cb6029ff935fb6
                       d774b9ff1ededc5a96789ecfe019119fb557ef4d
                       1d53d2a6955632b3622b55260f7527f32343524f
                       30963901444862c2e30804f41ede7be042023591
                       f4ba424954c5b5d7cf89727afa3d18ebc797d6f5
                       90f9d522f51478c1a4378a7d261c88e6d6fef13d
                       a393a20dc531d4f860dbbae0327020e811a8b5ea
                       faef44300d6f4227b117516fef23286919f44f4b
                       faaefb86e120cf14d0f9c2ff92cd700ede5f2051
                       b5ffc4fe9ffcbadc32861071e58c902b7a12b52c
                       ed4ca5d4e765bba1f49c8d32a7c42bd03ea67ac3
                       0990dc32eaa7f68ff97ad37f1bea919ec27bf067
                       3fb6a92c7d7f2b6cbd25a800065ffe121b86dd9d
                       dcadf648
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [70:59:df:07:b4:85:55:19:cc:61:02:4c:e0:46:4b:4d:4e:39:34:27]
            modulus: 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
    public exponent: 10001

] 
2022-06-22 07:25:33.825  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-22 07:25:33.826 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-22 07:25:33.827 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 07:25:33.827 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-22 07:25:33.828  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 07:25:33.828  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-22 07:25:33.828  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-22 07:25:33.828 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-22 07:25:33.829 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-22 07:25:33.829 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-22 07:25:33.833 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-22 07:25:33.834 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 07:25:33.834 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 07:25:33.834 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 07:25:33.912  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-22 07:25:33.913  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-22 07:25:33.913 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-22 07:25:33.913 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 07:25:33.915  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-22 07:25:33.915  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-22 07:25:33.915 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:25:33.916 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:25:33.916 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:25:33.916 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:25:33.917 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:25:33.917 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:25:33.918 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:25:33.918 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:25:33.918 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:25:33.919 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-22 07:25:33.921 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 426256456938610623904980011414343062971668310798
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 22 02:27:08 UTC 2022
           Final Date: Mon Jun 21 02:27:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:2d:cd:a9:61:76:c9:79:52:df:40:74:84:e6:22:fa:d1:e0:47:c7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: af44d41b51b37764a83730278f3fe25902d45bb3
                       0df313aadbc9c04d774a874ff119d307b6774610
                       a1790cd27295502d9bbf63e1262bb0d2bfa02e5d
                       c49c7c964de11e274d7670f1299ad2bcd6d3306a
                       6c3c8e3b6d1ecd4aa0fdd99956d8f81981605dc9
                       6d0c4ebd754e8a288d1c5c5d93de66f1b89fe3e8
                       ff049efd5463cf128936cf3241cb6029ff935fb6
                       d774b9ff1ededc5a96789ecfe019119fb557ef4d
                       1d53d2a6955632b3622b55260f7527f32343524f
                       30963901444862c2e30804f41ede7be042023591
                       f4ba424954c5b5d7cf89727afa3d18ebc797d6f5
                       90f9d522f51478c1a4378a7d261c88e6d6fef13d
                       a393a20dc531d4f860dbbae0327020e811a8b5ea
                       faef44300d6f4227b117516fef23286919f44f4b
                       faaefb86e120cf14d0f9c2ff92cd700ede5f2051
                       b5ffc4fe9ffcbadc32861071e58c902b7a12b52c
                       ed4ca5d4e765bba1f49c8d32a7c42bd03ea67ac3
                       0990dc32eaa7f68ff97ad37f1bea919ec27bf067
                       3fb6a92c7d7f2b6cbd25a800065ffe121b86dd9d
                       dcadf648
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2b:53:04:63:09:0d:6e:ea:68:0f:7e:8e:63:ed:0a:57:23:6f:38:00]
            modulus: d68d0d8d097c7e22302232964f0c59d326130b065a47c0341edf3982267965af8cd351914b65670be63735e55cea7657352c5607c594b28db4065163488b3d7e9d8827b06539dd32737b3451d5d6778d9a8bbf3d5c696f0da0a5608dcae98cf5c9eed3cd319ff1049b5411261a11ca905bc90015e285b50c62bceeb6c1f0e9dae23349bee720466c21448bcfbaf20c0aa0bbf63380d3f1325c22d30d74f04704851e146cce026ef898160161364c41acacd0bf2e9cf6c438df3d028c0d6e8c0688ab6cb620b9a650350ef6bc46e5372ac6938cc5ed1299ce289f157d6cc2c3303b5e2a0c8719fcaffff3c8ff55f9df0c6cb676e39d8a5cc57ffed68dc7da316f
    public exponent: 10001

] 
2022-06-22 07:25:49.388  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-22 07:25:49.389 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-22 07:25:49.390 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-22 07:25:49.391 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-22 07:25:49.391  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-22 07:25:49.391  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-22 07:25:49.391  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-22 07:25:49.392 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-22 07:25:49.392 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-22 07:25:49.392 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-22 07:25:49.396 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-22 07:25:49.396 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 07:25:49.396 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 07:25:49.396 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 07:25:49.472  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-22 07:25:49.473  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-22 07:25:49.473 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-22 07:25:49.473 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 07:25:49.474  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-22 07:25:49.474  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-22 07:25:49.475 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:25:49.475 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:25:49.475 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:25:49.475 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:25:49.476 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:25:49.476 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:25:49.476 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:25:49.477 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:25:49.477 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:25:49.477 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-22 07:25:49.480 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 426256456938610623904980011414343062971668310798
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 22 02:27:08 UTC 2022
           Final Date: Mon Jun 21 02:27:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:2d:cd:a9:61:76:c9:79:52:df:40:74:84:e6:22:fa:d1:e0:47:c7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: af44d41b51b37764a83730278f3fe25902d45bb3
                       0df313aadbc9c04d774a874ff119d307b6774610
                       a1790cd27295502d9bbf63e1262bb0d2bfa02e5d
                       c49c7c964de11e274d7670f1299ad2bcd6d3306a
                       6c3c8e3b6d1ecd4aa0fdd99956d8f81981605dc9
                       6d0c4ebd754e8a288d1c5c5d93de66f1b89fe3e8
                       ff049efd5463cf128936cf3241cb6029ff935fb6
                       d774b9ff1ededc5a96789ecfe019119fb557ef4d
                       1d53d2a6955632b3622b55260f7527f32343524f
                       30963901444862c2e30804f41ede7be042023591
                       f4ba424954c5b5d7cf89727afa3d18ebc797d6f5
                       90f9d522f51478c1a4378a7d261c88e6d6fef13d
                       a393a20dc531d4f860dbbae0327020e811a8b5ea
                       faef44300d6f4227b117516fef23286919f44f4b
                       faaefb86e120cf14d0f9c2ff92cd700ede5f2051
                       b5ffc4fe9ffcbadc32861071e58c902b7a12b52c
                       ed4ca5d4e765bba1f49c8d32a7c42bd03ea67ac3
                       0990dc32eaa7f68ff97ad37f1bea919ec27bf067
                       3fb6a92c7d7f2b6cbd25a800065ffe121b86dd9d
                       dcadf648
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c8:db:e4:01:e8:a2:09:4e:2a:86:4b:8d:ee:6c:cf:1d:14:be:58:1a]
            modulus: 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
    public exponent: 10001

] 
2022-06-22 07:27:09.066  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-22 07:27:09.067 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-22 07:27:09.068 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-22 07:27:09.068 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-22 07:27:09.069  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-22 07:27:09.069  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-22 07:27:09.069  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-22 07:27:09.070 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-22 07:27:09.070 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-22 07:27:09.070 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-22 07:27:09.074 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-22 07:27:09.075 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 07:27:09.075 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 07:27:09.075 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 07:27:09.149  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-22 07:27:09.149  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-22 07:27:09.149 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-22 07:27:09.150 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 07:27:09.151  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-22 07:27:09.151  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-22 07:27:09.151 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:27:09.151 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:27:09.151 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:27:09.152 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:27:09.152 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:27:09.152 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:27:09.153 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:27:09.153 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:27:09.153 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:27:09.153 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-22 07:27:09.156 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 426256456938610623904980011414343062971668310798
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 22 02:27:08 UTC 2022
           Final Date: Mon Jun 21 02:27:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:2d:cd:a9:61:76:c9:79:52:df:40:74:84:e6:22:fa:d1:e0:47:c7]
            modulus: ee5c174a252fb8dccdbcbc0f8dd45c123b0ac982f8095ed5ed2dfacb7fe13b59484eb4eea7043197c97f2b0396b8a3a68d938820c62f674c5bfe75883d0e6019c901afed8cd147276e73aa3822a0857cedfcb09e7dd61e73ae808848c699e0ba4fcde0606fe7bb6ae589cd7b6e30e330a10ec69586bcce7f8427b75fdc3c996c5e9e2d02a2a6e397fe0d47c541908a9e9f615091e716ead4694948107f442534a177abec933d92ce6f7415c6713ce4517c969e3d5b35e097529e5ae36b12b652cc1f4f3db801f77978e09149d40aa749d8c7a875516ff713b7837033f19371e44bd1d9ee21613a3a0f154effb2b43718cd1a255f79707e85e79bab944a97f39fda6bbac55cf303dbc60d19218bf4b0b1c9057e5f1af132e10368c9625d2753ba9c4e349f80ed4bf6defa7bd480be353cd6c3522bf04daa1bcd6c24c01637d46320552ca619685062003d76baf467c58681d25c660f90670ca16a96558a619a218ae15264913161574a3aba2464cce7085a7cd362216caccedc3b1f3b1b0849d5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: af44d41b51b37764a83730278f3fe25902d45bb3
                       0df313aadbc9c04d774a874ff119d307b6774610
                       a1790cd27295502d9bbf63e1262bb0d2bfa02e5d
                       c49c7c964de11e274d7670f1299ad2bcd6d3306a
                       6c3c8e3b6d1ecd4aa0fdd99956d8f81981605dc9
                       6d0c4ebd754e8a288d1c5c5d93de66f1b89fe3e8
                       ff049efd5463cf128936cf3241cb6029ff935fb6
                       d774b9ff1ededc5a96789ecfe019119fb557ef4d
                       1d53d2a6955632b3622b55260f7527f32343524f
                       30963901444862c2e30804f41ede7be042023591
                       f4ba424954c5b5d7cf89727afa3d18ebc797d6f5
                       90f9d522f51478c1a4378a7d261c88e6d6fef13d
                       a393a20dc531d4f860dbbae0327020e811a8b5ea
                       faef44300d6f4227b117516fef23286919f44f4b
                       faaefb86e120cf14d0f9c2ff92cd700ede5f2051
                       b5ffc4fe9ffcbadc32861071e58c902b7a12b52c
                       ed4ca5d4e765bba1f49c8d32a7c42bd03ea67ac3
                       0990dc32eaa7f68ff97ad37f1bea919ec27bf067
                       3fb6a92c7d7f2b6cbd25a800065ffe121b86dd9d
                       dcadf648
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0e:59:f8:ee:17:91:bd:bd:42:b9:a8:41:ce:5d:42:35:d6:b2:48:33]
            modulus: 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
    public exponent: 10001

] 
2022-06-22 07:33:36.965  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-22 07:33:36.966 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-22 07:33:36.967 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 07:33:36.968 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-22 07:33:36.968  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 07:33:36.969  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-22 07:33:36.969  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-22 07:33:36.969 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-22 07:33:36.970 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-22 07:33:36.970 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-22 07:33:36.974 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-22 07:33:36.975 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 07:33:36.975 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 07:33:36.975 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 07:33:37.050  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-22 07:33:37.070  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-22 07:33:37.071 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-22 07:33:37.071 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 07:33:37.072  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-22 07:33:37.073  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-22 07:33:37.073 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:33:37.073 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:33:37.074 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:33:37.074 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:33:37.074 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:33:37.075 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:33:37.075 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:33:37.075 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:33:37.076 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:33:37.076 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-22 07:33:37.079 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 426256456938610623904980011414343062971668310798
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 22 02:27:08 UTC 2022
           Final Date: Mon Jun 21 02:27:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:2d:cd:a9:61:76:c9:79:52:df:40:74:84:e6:22:fa:d1:e0:47:c7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: af44d41b51b37764a83730278f3fe25902d45bb3
                       0df313aadbc9c04d774a874ff119d307b6774610
                       a1790cd27295502d9bbf63e1262bb0d2bfa02e5d
                       c49c7c964de11e274d7670f1299ad2bcd6d3306a
                       6c3c8e3b6d1ecd4aa0fdd99956d8f81981605dc9
                       6d0c4ebd754e8a288d1c5c5d93de66f1b89fe3e8
                       ff049efd5463cf128936cf3241cb6029ff935fb6
                       d774b9ff1ededc5a96789ecfe019119fb557ef4d
                       1d53d2a6955632b3622b55260f7527f32343524f
                       30963901444862c2e30804f41ede7be042023591
                       f4ba424954c5b5d7cf89727afa3d18ebc797d6f5
                       90f9d522f51478c1a4378a7d261c88e6d6fef13d
                       a393a20dc531d4f860dbbae0327020e811a8b5ea
                       faef44300d6f4227b117516fef23286919f44f4b
                       faaefb86e120cf14d0f9c2ff92cd700ede5f2051
                       b5ffc4fe9ffcbadc32861071e58c902b7a12b52c
                       ed4ca5d4e765bba1f49c8d32a7c42bd03ea67ac3
                       0990dc32eaa7f68ff97ad37f1bea919ec27bf067
                       3fb6a92c7d7f2b6cbd25a800065ffe121b86dd9d
                       dcadf648
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e1:bc:fd:5a:49:01:4f:cd:8d:d9:a0:b5:ca:f8:5c:fe:8c:a7:46:15]
            modulus: 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
    public exponent: 10001

] 
2022-06-22 07:38:36.049  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-22 07:38:36.051 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-22 07:38:36.052 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 07:38:36.053 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-22 07:38:36.053  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 07:38:36.054  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-22 07:38:36.054  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-22 07:38:36.054 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-22 07:38:36.054 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-22 07:38:36.055 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-22 07:38:36.059 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-22 07:38:36.059 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 07:38:36.059 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 07:38:36.060 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 07:38:36.131  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-22 07:38:36.132  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-22 07:38:36.132 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-22 07:38:36.132 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 07:38:36.133  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-22 07:38:36.133  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-22 07:38:36.133 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:38:36.134 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:38:36.134 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:38:36.138 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:38:36.139 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:38:36.139 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:38:36.140 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:38:36.140 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:38:36.140 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:38:36.141 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-22 07:38:36.144 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 426256456938610623904980011414343062971668310798
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 22 02:27:08 UTC 2022
           Final Date: Mon Jun 21 02:27:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:2d:cd:a9:61:76:c9:79:52:df:40:74:84:e6:22:fa:d1:e0:47:c7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: af44d41b51b37764a83730278f3fe25902d45bb3
                       0df313aadbc9c04d774a874ff119d307b6774610
                       a1790cd27295502d9bbf63e1262bb0d2bfa02e5d
                       c49c7c964de11e274d7670f1299ad2bcd6d3306a
                       6c3c8e3b6d1ecd4aa0fdd99956d8f81981605dc9
                       6d0c4ebd754e8a288d1c5c5d93de66f1b89fe3e8
                       ff049efd5463cf128936cf3241cb6029ff935fb6
                       d774b9ff1ededc5a96789ecfe019119fb557ef4d
                       1d53d2a6955632b3622b55260f7527f32343524f
                       30963901444862c2e30804f41ede7be042023591
                       f4ba424954c5b5d7cf89727afa3d18ebc797d6f5
                       90f9d522f51478c1a4378a7d261c88e6d6fef13d
                       a393a20dc531d4f860dbbae0327020e811a8b5ea
                       faef44300d6f4227b117516fef23286919f44f4b
                       faaefb86e120cf14d0f9c2ff92cd700ede5f2051
                       b5ffc4fe9ffcbadc32861071e58c902b7a12b52c
                       ed4ca5d4e765bba1f49c8d32a7c42bd03ea67ac3
                       0990dc32eaa7f68ff97ad37f1bea919ec27bf067
                       3fb6a92c7d7f2b6cbd25a800065ffe121b86dd9d
                       dcadf648
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [40:9c:9a:f1:6a:d6:65:de:10:ae:a4:86:ab:75:c4:fe:62:31:48:ba]
            modulus: b943df4ad0985382ca605485d49a2723bb8022c6b0db895d5099a3034b1c66c58796d5275ff8fad545a5c8a4527578601365c762d35cb7e5ec7efcda122866a8b65169b7d93aae078ebd965184d08f1e638b26b51aa24bc140df0056a56ac27101e0dd8414feb3b65b86d4ae6eb4c8f51b8865669f515a96ad43921d4e592b08151da60e21843e199c76090c1095755dd33cd053f5e6558bd0a01ff0f035beea275f787546750731cfc06b45824e10c2fa16995a2050d2e9d90e5d38e3fca23ea84ad0081c595e8ffebc23b5b6e63a654d02ced3af7ceb76db3dc28c0b3f98542079e8743e44110d316d457a2573c028c0cbffbb6e40518961a1c6227ef7358f
    public exponent: 10001

] 
2022-06-22 07:45:41.008  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-22 07:45:41.009 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-22 07:45:41.010 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 07:45:41.010 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-22 07:45:41.011  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-22 07:45:41.011  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-22 07:45:41.011  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-22 07:45:41.011 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-22 07:45:41.011 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-22 07:45:41.012 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-22 07:45:41.015 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-22 07:45:41.016 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 07:45:41.016 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-22 07:45:41.016 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 07:45:41.103  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-22 07:45:41.103  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-22 07:45:41.103 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-22 07:45:41.103 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-22 07:45:41.104  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-22 07:45:41.104  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-22 07:45:41.104 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:45:41.105 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:45:41.105 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:45:41.105 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:45:41.105 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:45:41.105 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:45:41.106 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-22 07:45:41.106 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-22 07:45:41.106 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-22 07:45:41.106 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-22 07:45:41.109 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 426256456938610623904980011414343062971668310798
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jun 22 02:27:08 UTC 2022
           Final Date: Mon Jun 21 02:27:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:2d:cd:a9:61:76:c9:79:52:df:40:74:84:e6:22:fa:d1:e0:47:c7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: af44d41b51b37764a83730278f3fe25902d45bb3
                       0df313aadbc9c04d774a874ff119d307b6774610
                       a1790cd27295502d9bbf63e1262bb0d2bfa02e5d
                       c49c7c964de11e274d7670f1299ad2bcd6d3306a
                       6c3c8e3b6d1ecd4aa0fdd99956d8f81981605dc9
                       6d0c4ebd754e8a288d1c5c5d93de66f1b89fe3e8
                       ff049efd5463cf128936cf3241cb6029ff935fb6
                       d774b9ff1ededc5a96789ecfe019119fb557ef4d
                       1d53d2a6955632b3622b55260f7527f32343524f
                       30963901444862c2e30804f41ede7be042023591
                       f4ba424954c5b5d7cf89727afa3d18ebc797d6f5
                       90f9d522f51478c1a4378a7d261c88e6d6fef13d
                       a393a20dc531d4f860dbbae0327020e811a8b5ea
                       faef44300d6f4227b117516fef23286919f44f4b
                       faaefb86e120cf14d0f9c2ff92cd700ede5f2051
                       b5ffc4fe9ffcbadc32861071e58c902b7a12b52c
                       ed4ca5d4e765bba1f49c8d32a7c42bd03ea67ac3
                       0990dc32eaa7f68ff97ad37f1bea919ec27bf067
                       3fb6a92c7d7f2b6cbd25a800065ffe121b86dd9d
                       dcadf648
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b9:db:22:d2:50:dd:d5:ee:2f:59:15:c6:09:fd:a7:be:21:49:c6:8c]
            modulus: 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
    public exponent: 10001

]