Results

By type

          2022-11-28 08:59:56,038 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-11-28 08:59:57,491 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-11-28 08:59:58.244  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Nov 28, 2022 9:00:00 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Nov 28, 2022 9:00:00 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Nov 28, 2022 9:00:00 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Nov 28, 2022 9:00:00 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-11-28 09:00:00.840 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-11-28 09:00:01.132  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-11-28 09:00:01.321  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-11-28 09:00:02.175 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-11-28 09:00:02.177 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-11-28 09:00:02.179 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-11-28 09:00:02.183 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-11-28 09:00:02.225 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
2022-11-28 09:00:02.228 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-11-28 09:00:02.346 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-11-28 09:00:03.016 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Nov 28, 2022 9:00:03 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-11-28 09:00:03.961  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.945 seconds (JVM running for 10.678)
Nov 28, 2022 9:00:26 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-11-28 09:01:19.616  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-28 09:01:19.626 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-28 09:01:19.670 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-28 09:01:19.674 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-28 09:01:19.698  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-28 09:01:19.701  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-28 09:01:19.702  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-28 09:01:19.703 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-28 09:01:19.704 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 09:01:19.708 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-28 09:01:19.719 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-28 09:01:19.723 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-28 09:01:19.786 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-28 09:01:19.797 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 09:01:19.798 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 09:01:19.802 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 09:01:20.630  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-28 09:01:20.633  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-28 09:01:20.634 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-28 09:01:20.635 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 09:01:20.647  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-28 09:01:20.648  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-28 09:01:20.649 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 09:01:20.649 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 09:01:20.650 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 09:01:20.667 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 09:01:20.668 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 09:01:20.668 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 09:01:20.675 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 09:01:20.675 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 09:01:20.676 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 09:01:20.677 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-28 09:01:20.714 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 691674314065651339353378762912633257714507603471
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 28 08:57:33 UTC 2022
           Final Date: Sat Nov 27 08:57:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:cf:67:fe:49:b9:1d:0e:64:f1:ae:10:16:85:ae:07:0c:cc:0d:94],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0f60c4cf8981fa69ce277174c74ffa33bb42b695
                       efbbe35d95121b91efe3a9bc723b32af6926fdef
                       caa36b2fba85419f1e1857b3aadb50880d1d05cc
                       4eaf104f2e785245c1585705e153e5a2bbcfa5b9
                       30309c6d8f8851270ee5e1888d5c6a2295067ad0
                       d2a81713f63e4f8b1e79363f3f04664dd70b6e8b
                       4f3e27ab5b3f9e41672a6b786139daf99825569d
                       b4596b5c3da3279a9f2e2e7ecb61b753549f5095
                       62ace0221dcc9fd2007fb53c570d72753923515e
                       7bfcf8c69feeadded06b4fe561cd6197e4ef496a
                       6abd5e287fb10588ebc10393597899c2a4095932
                       eafe54735e17cf5e04d418340f935008f925a84a
                       cbf943d31c64ef0e59131cb4b3ba4a66195b3079
                       5fe574df0a63c977d8c21035ba35766e204d1059
                       39aa0cc62d452fed0fc3dd7d8b267ca3802b335b
                       c5260b3ae8883d14db98a1aa45c78118a4ca6a91
                       35dc36b0acbac89f066db08e4eeb6ad5751cf2c8
                       4ecc7b5c2abc254a77602684faf27bb239e037be
                       5328e58d6c953e816f60c8948756e79552659d56
                       a277f364
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a4:71:f3:6a:b8:d8:7d:dc:91:7d:8e:d1:48:b0:a8:29:51:1a:5c:08],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-28 14:50:10.325  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-28 14:50:10.335 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-28 14:50:10.339 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-28 14:50:10.341 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-28 14:50:10.342  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-28 14:50:10.343  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-28 14:50:10.344  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-28 14:50:10.345 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-28 14:50:10.346 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-28 14:50:10.346 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-28 14:50:10.353 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-28 14:50:10.354 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 14:50:10.355 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 14:50:10.355 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 14:50:10.598  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-28 14:50:10.599  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-28 14:50:10.600 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-28 14:50:10.600 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 14:50:10.603  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-28 14:50:10.604  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-28 14:50:10.605 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 14:50:10.605 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 14:50:10.606 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 14:50:10.607 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 14:50:10.608 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 14:50:10.608 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 14:50:10.610 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 14:50:10.610 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 14:50:10.611 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 14:50:10.612 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-28 14:50:10.617 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 691674314065651339353378762912633257714507603471
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 28 08:57:33 UTC 2022
           Final Date: Sat Nov 27 08:57:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:cf:67:fe:49:b9:1d:0e:64:f1:ae:10:16:85:ae:07:0c:cc:0d:94],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0f60c4cf8981fa69ce277174c74ffa33bb42b695
                       efbbe35d95121b91efe3a9bc723b32af6926fdef
                       caa36b2fba85419f1e1857b3aadb50880d1d05cc
                       4eaf104f2e785245c1585705e153e5a2bbcfa5b9
                       30309c6d8f8851270ee5e1888d5c6a2295067ad0
                       d2a81713f63e4f8b1e79363f3f04664dd70b6e8b
                       4f3e27ab5b3f9e41672a6b786139daf99825569d
                       b4596b5c3da3279a9f2e2e7ecb61b753549f5095
                       62ace0221dcc9fd2007fb53c570d72753923515e
                       7bfcf8c69feeadded06b4fe561cd6197e4ef496a
                       6abd5e287fb10588ebc10393597899c2a4095932
                       eafe54735e17cf5e04d418340f935008f925a84a
                       cbf943d31c64ef0e59131cb4b3ba4a66195b3079
                       5fe574df0a63c977d8c21035ba35766e204d1059
                       39aa0cc62d452fed0fc3dd7d8b267ca3802b335b
                       c5260b3ae8883d14db98a1aa45c78118a4ca6a91
                       35dc36b0acbac89f066db08e4eeb6ad5751cf2c8
                       4ecc7b5c2abc254a77602684faf27bb239e037be
                       5328e58d6c953e816f60c8948756e79552659d56
                       a277f364
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [16:c4:0b:64:4b:ba:76:05:f9:c5:0e:68:e8:9f:20:c1:5c:c0:dd:f9],[56:66:d1:a4]
        modulus: e2fe44dcfca67bad7343401fa8cf855348b6e378a20ee297820ca2fb0977b48efab4ada831f33761335011e87cd347f3c04a465610fbafac105975a429e0c9b78ad9c3fcad9474b0daabe302f5135d696ae52993f3d2a9557fd2259ff062416c3648582a9ec22e648309af30108c3549d5475618c9b39f919bcd2f4f06d85cdf9e95df29fe1787f818b98100587e1c72c5747c1be04e7e2a7924e3fc25ba3cc5004661ef36744725b36751843ded8edde1f3d0d6d225c6304ec0d169becf2a83a7f83aba0864208e1244825254119a54c889db03e957863e3d382144e04cf15048b27d3dc4289880500bc61fe9e901e46768704c7ea54a953e340b5b51246fe7
public exponent: 10001

] 
2022-11-28 14:51:58.621  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-28 14:51:58.622 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-28 14:51:58.624 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-28 14:51:58.625 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-28 14:51:58.626  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-28 14:51:58.627  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-28 14:51:58.627  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-28 14:51:58.628 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-28 14:51:58.628 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-28 14:51:58.629 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-28 14:51:58.634 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-28 14:51:58.635 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 14:51:58.636 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 14:51:58.636 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 14:51:58.769  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-28 14:51:58.769  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-28 14:51:58.770 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-28 14:51:58.770 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 14:51:58.773  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-28 14:51:58.773  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-28 14:51:58.774 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 14:51:58.774 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 14:51:58.774 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 14:51:58.775 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 14:51:58.776 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 14:51:58.776 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 14:51:58.777 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 14:51:58.777 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 14:51:58.777 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 14:51:58.778 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-28 14:51:58.781 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 691674314065651339353378762912633257714507603471
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 28 08:57:33 UTC 2022
           Final Date: Sat Nov 27 08:57:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:cf:67:fe:49:b9:1d:0e:64:f1:ae:10:16:85:ae:07:0c:cc:0d:94],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0f60c4cf8981fa69ce277174c74ffa33bb42b695
                       efbbe35d95121b91efe3a9bc723b32af6926fdef
                       caa36b2fba85419f1e1857b3aadb50880d1d05cc
                       4eaf104f2e785245c1585705e153e5a2bbcfa5b9
                       30309c6d8f8851270ee5e1888d5c6a2295067ad0
                       d2a81713f63e4f8b1e79363f3f04664dd70b6e8b
                       4f3e27ab5b3f9e41672a6b786139daf99825569d
                       b4596b5c3da3279a9f2e2e7ecb61b753549f5095
                       62ace0221dcc9fd2007fb53c570d72753923515e
                       7bfcf8c69feeadded06b4fe561cd6197e4ef496a
                       6abd5e287fb10588ebc10393597899c2a4095932
                       eafe54735e17cf5e04d418340f935008f925a84a
                       cbf943d31c64ef0e59131cb4b3ba4a66195b3079
                       5fe574df0a63c977d8c21035ba35766e204d1059
                       39aa0cc62d452fed0fc3dd7d8b267ca3802b335b
                       c5260b3ae8883d14db98a1aa45c78118a4ca6a91
                       35dc36b0acbac89f066db08e4eeb6ad5751cf2c8
                       4ecc7b5c2abc254a77602684faf27bb239e037be
                       5328e58d6c953e816f60c8948756e79552659d56
                       a277f364
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e2:1d:e2:54:f2:6b:ed:71:ec:c5:33:6f:3b:aa:ec:5d:b2:68:e2:67],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-28 14:53:48.851  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-28 14:53:48.855 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-28 14:53:48.858 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-28 14:53:48.859 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-28 14:53:48.860  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-28 14:53:48.861  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-28 14:53:48.862  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-28 14:53:48.862 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-28 14:53:48.862 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-28 14:53:48.863 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-28 14:53:48.867 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-28 14:53:48.868 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 14:53:48.868 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 14:53:48.869 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 14:53:49.010  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-28 14:53:49.010  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-28 14:53:49.011 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-28 14:53:49.011 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 14:53:49.013  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-28 14:53:49.013  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-28 14:53:49.014 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 14:53:49.014 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 14:53:49.015 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 14:53:49.016 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 14:53:49.016 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 14:53:49.016 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 14:53:49.017 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 14:53:49.018 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 14:53:49.018 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 14:53:49.019 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-28 14:53:49.025 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 691674314065651339353378762912633257714507603471
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 28 08:57:33 UTC 2022
           Final Date: Sat Nov 27 08:57:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:cf:67:fe:49:b9:1d:0e:64:f1:ae:10:16:85:ae:07:0c:cc:0d:94],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0f60c4cf8981fa69ce277174c74ffa33bb42b695
                       efbbe35d95121b91efe3a9bc723b32af6926fdef
                       caa36b2fba85419f1e1857b3aadb50880d1d05cc
                       4eaf104f2e785245c1585705e153e5a2bbcfa5b9
                       30309c6d8f8851270ee5e1888d5c6a2295067ad0
                       d2a81713f63e4f8b1e79363f3f04664dd70b6e8b
                       4f3e27ab5b3f9e41672a6b786139daf99825569d
                       b4596b5c3da3279a9f2e2e7ecb61b753549f5095
                       62ace0221dcc9fd2007fb53c570d72753923515e
                       7bfcf8c69feeadded06b4fe561cd6197e4ef496a
                       6abd5e287fb10588ebc10393597899c2a4095932
                       eafe54735e17cf5e04d418340f935008f925a84a
                       cbf943d31c64ef0e59131cb4b3ba4a66195b3079
                       5fe574df0a63c977d8c21035ba35766e204d1059
                       39aa0cc62d452fed0fc3dd7d8b267ca3802b335b
                       c5260b3ae8883d14db98a1aa45c78118a4ca6a91
                       35dc36b0acbac89f066db08e4eeb6ad5751cf2c8
                       4ecc7b5c2abc254a77602684faf27bb239e037be
                       5328e58d6c953e816f60c8948756e79552659d56
                       a277f364
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a3:64:bf:13:59:0d:a8:00:e6:d9:f7:e4:c9:de:c1:f3:6d:c0:bf:4a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-28 14:57:16.962  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-28 14:57:16.964 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-28 14:57:16.965 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-28 14:57:16.966 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-28 14:57:16.967  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-28 14:57:16.967  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-28 14:57:16.968  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-28 14:57:16.968 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-28 14:57:16.969 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-28 14:57:16.969 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-28 14:57:16.973 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-28 14:57:16.974 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 14:57:16.974 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 14:57:16.975 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 14:57:17.150  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-28 14:57:17.151  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-28 14:57:17.151 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-28 14:57:17.152 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 14:57:17.153  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-28 14:57:17.154  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-28 14:57:17.154 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 14:57:17.155 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 14:57:17.155 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 14:57:17.156 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 14:57:17.156 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 14:57:17.156 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 14:57:17.157 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 14:57:17.157 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 14:57:17.158 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 14:57:17.159 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-28 14:57:17.162 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 691674314065651339353378762912633257714507603471
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 28 08:57:33 UTC 2022
           Final Date: Sat Nov 27 08:57:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:cf:67:fe:49:b9:1d:0e:64:f1:ae:10:16:85:ae:07:0c:cc:0d:94],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0f60c4cf8981fa69ce277174c74ffa33bb42b695
                       efbbe35d95121b91efe3a9bc723b32af6926fdef
                       caa36b2fba85419f1e1857b3aadb50880d1d05cc
                       4eaf104f2e785245c1585705e153e5a2bbcfa5b9
                       30309c6d8f8851270ee5e1888d5c6a2295067ad0
                       d2a81713f63e4f8b1e79363f3f04664dd70b6e8b
                       4f3e27ab5b3f9e41672a6b786139daf99825569d
                       b4596b5c3da3279a9f2e2e7ecb61b753549f5095
                       62ace0221dcc9fd2007fb53c570d72753923515e
                       7bfcf8c69feeadded06b4fe561cd6197e4ef496a
                       6abd5e287fb10588ebc10393597899c2a4095932
                       eafe54735e17cf5e04d418340f935008f925a84a
                       cbf943d31c64ef0e59131cb4b3ba4a66195b3079
                       5fe574df0a63c977d8c21035ba35766e204d1059
                       39aa0cc62d452fed0fc3dd7d8b267ca3802b335b
                       c5260b3ae8883d14db98a1aa45c78118a4ca6a91
                       35dc36b0acbac89f066db08e4eeb6ad5751cf2c8
                       4ecc7b5c2abc254a77602684faf27bb239e037be
                       5328e58d6c953e816f60c8948756e79552659d56
                       a277f364
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c3:94:ba:4c:b6:dd:65:9e:10:93:39:35:70:cd:07:ad:5a:40:67:19],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-28 15:08:02.102  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-28 15:08:02.105 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-28 15:08:02.108 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-28 15:08:02.109 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-28 15:08:02.109  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-28 15:08:02.110  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-28 15:08:02.111  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-28 15:08:02.111 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-28 15:08:02.111 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-28 15:08:02.112 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-28 15:08:02.118 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-28 15:08:02.119 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 15:08:02.119 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 15:08:02.120 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 15:08:02.292  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-28 15:08:02.294  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-28 15:08:02.294 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-28 15:08:02.295 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 15:08:02.296  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-28 15:08:02.296  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-28 15:08:02.297 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 15:08:02.297 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 15:08:02.298 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 15:08:02.299 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 15:08:02.299 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 15:08:02.299 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 15:08:02.300 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 15:08:02.300 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 15:08:02.301 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 15:08:02.302 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-28 15:08:02.305 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 691674314065651339353378762912633257714507603471
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 28 08:57:33 UTC 2022
           Final Date: Sat Nov 27 08:57:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:cf:67:fe:49:b9:1d:0e:64:f1:ae:10:16:85:ae:07:0c:cc:0d:94],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0f60c4cf8981fa69ce277174c74ffa33bb42b695
                       efbbe35d95121b91efe3a9bc723b32af6926fdef
                       caa36b2fba85419f1e1857b3aadb50880d1d05cc
                       4eaf104f2e785245c1585705e153e5a2bbcfa5b9
                       30309c6d8f8851270ee5e1888d5c6a2295067ad0
                       d2a81713f63e4f8b1e79363f3f04664dd70b6e8b
                       4f3e27ab5b3f9e41672a6b786139daf99825569d
                       b4596b5c3da3279a9f2e2e7ecb61b753549f5095
                       62ace0221dcc9fd2007fb53c570d72753923515e
                       7bfcf8c69feeadded06b4fe561cd6197e4ef496a
                       6abd5e287fb10588ebc10393597899c2a4095932
                       eafe54735e17cf5e04d418340f935008f925a84a
                       cbf943d31c64ef0e59131cb4b3ba4a66195b3079
                       5fe574df0a63c977d8c21035ba35766e204d1059
                       39aa0cc62d452fed0fc3dd7d8b267ca3802b335b
                       c5260b3ae8883d14db98a1aa45c78118a4ca6a91
                       35dc36b0acbac89f066db08e4eeb6ad5751cf2c8
                       4ecc7b5c2abc254a77602684faf27bb239e037be
                       5328e58d6c953e816f60c8948756e79552659d56
                       a277f364
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2b:14:87:bd:b2:db:d6:f6:3e:9c:a1:c5:32:14:b8:64:f0:48:20:14],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-28 15:15:02.923  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-28 15:15:02.927 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-28 15:15:02.930 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-28 15:15:02.931 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-28 15:15:02.931  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-28 15:15:02.932  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-28 15:15:02.933  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-28 15:15:02.933 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-28 15:15:02.934 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-28 15:15:02.935 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-28 15:15:02.939 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-28 15:15:02.940 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 15:15:02.941 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 15:15:02.941 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 15:15:03.128  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-28 15:15:03.129  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-28 15:15:03.130 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-28 15:15:03.130 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 15:15:03.132  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-28 15:15:03.132  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-28 15:15:03.133 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 15:15:03.133 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 15:15:03.133 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 15:15:03.134 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 15:15:03.135 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 15:15:03.135 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 15:15:03.136 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 15:15:03.136 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 15:15:03.137 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 15:15:03.138 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-28 15:15:03.141 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 691674314065651339353378762912633257714507603471
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 28 08:57:33 UTC 2022
           Final Date: Sat Nov 27 08:57:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:cf:67:fe:49:b9:1d:0e:64:f1:ae:10:16:85:ae:07:0c:cc:0d:94],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0f60c4cf8981fa69ce277174c74ffa33bb42b695
                       efbbe35d95121b91efe3a9bc723b32af6926fdef
                       caa36b2fba85419f1e1857b3aadb50880d1d05cc
                       4eaf104f2e785245c1585705e153e5a2bbcfa5b9
                       30309c6d8f8851270ee5e1888d5c6a2295067ad0
                       d2a81713f63e4f8b1e79363f3f04664dd70b6e8b
                       4f3e27ab5b3f9e41672a6b786139daf99825569d
                       b4596b5c3da3279a9f2e2e7ecb61b753549f5095
                       62ace0221dcc9fd2007fb53c570d72753923515e
                       7bfcf8c69feeadded06b4fe561cd6197e4ef496a
                       6abd5e287fb10588ebc10393597899c2a4095932
                       eafe54735e17cf5e04d418340f935008f925a84a
                       cbf943d31c64ef0e59131cb4b3ba4a66195b3079
                       5fe574df0a63c977d8c21035ba35766e204d1059
                       39aa0cc62d452fed0fc3dd7d8b267ca3802b335b
                       c5260b3ae8883d14db98a1aa45c78118a4ca6a91
                       35dc36b0acbac89f066db08e4eeb6ad5751cf2c8
                       4ecc7b5c2abc254a77602684faf27bb239e037be
                       5328e58d6c953e816f60c8948756e79552659d56
                       a277f364
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2c:e6:60:0f:94:73:e7:b1:98:6d:4f:75:44:05:6c:cd:5d:40:79:cc],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-28 15:15:22.218  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-28 15:15:22.220 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-28 15:15:22.221 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-28 15:15:22.221 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-28 15:15:22.222  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-28 15:15:22.222  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-28 15:15:22.222  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-28 15:15:22.223 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-28 15:15:22.223 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-28 15:15:22.226 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-28 15:15:22.229 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-28 15:15:22.230 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 15:15:22.230 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 15:15:22.230 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 15:15:22.362  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-28 15:15:22.363  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-28 15:15:22.363 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-28 15:15:22.364 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 15:15:22.365  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-28 15:15:22.365  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-28 15:15:22.366 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 15:15:22.366 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 15:15:22.366 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 15:15:22.367 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 15:15:22.367 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 15:15:22.367 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 15:15:22.368 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 15:15:22.368 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 15:15:22.368 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 15:15:22.369 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-28 15:15:22.372 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 691674314065651339353378762912633257714507603471
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 28 08:57:33 UTC 2022
           Final Date: Sat Nov 27 08:57:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:cf:67:fe:49:b9:1d:0e:64:f1:ae:10:16:85:ae:07:0c:cc:0d:94],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0f60c4cf8981fa69ce277174c74ffa33bb42b695
                       efbbe35d95121b91efe3a9bc723b32af6926fdef
                       caa36b2fba85419f1e1857b3aadb50880d1d05cc
                       4eaf104f2e785245c1585705e153e5a2bbcfa5b9
                       30309c6d8f8851270ee5e1888d5c6a2295067ad0
                       d2a81713f63e4f8b1e79363f3f04664dd70b6e8b
                       4f3e27ab5b3f9e41672a6b786139daf99825569d
                       b4596b5c3da3279a9f2e2e7ecb61b753549f5095
                       62ace0221dcc9fd2007fb53c570d72753923515e
                       7bfcf8c69feeadded06b4fe561cd6197e4ef496a
                       6abd5e287fb10588ebc10393597899c2a4095932
                       eafe54735e17cf5e04d418340f935008f925a84a
                       cbf943d31c64ef0e59131cb4b3ba4a66195b3079
                       5fe574df0a63c977d8c21035ba35766e204d1059
                       39aa0cc62d452fed0fc3dd7d8b267ca3802b335b
                       c5260b3ae8883d14db98a1aa45c78118a4ca6a91
                       35dc36b0acbac89f066db08e4eeb6ad5751cf2c8
                       4ecc7b5c2abc254a77602684faf27bb239e037be
                       5328e58d6c953e816f60c8948756e79552659d56
                       a277f364
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6d:28:1b:ba:7c:b7:5c:fc:24:bb:fc:04:5c:53:2d:8f:05:71:50:07],[56:66:d1:a4]
        modulus: d9f2dfd56f5ba2abcdeeb540448d7c69c5d3ac37b7188ec4bd0029dee7d1ed0d29cad7eab9722767b1cfc82c28f95d4911cff1ca467c18560a2a8a7919a4d68597c02b72647aa4cfa7726c331ffaaf6c7f886a75638a48e30ccbb708c588393ea1a1da4821579f98d729426d851c37bcc941712ac6f65ed3bd0a5bb04d92d19ac116cd37414078a65c63d18959cf3bbd93e859864b37cbc74cc7b5f34ece16431088cf034ea57aceadbe6659942dd4918e629725389a5fbdd3823afc43d1ef261ae73e7e5c1cbbc6e1975ab975c99e4cb663d4cc3fae02dec718685ad33092e936b1ed4b2eb605433578d4eb0e326d737e573196df174fc2c8a51972c96bc9a9
public exponent: 10001

] 
2022-11-28 15:39:57.288  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-28 15:39:57.291 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-28 15:39:57.293 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-28 15:39:57.294 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-28 15:39:57.294  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-28 15:39:57.295  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-28 15:39:57.296  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-28 15:39:57.296 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-28 15:39:57.296 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-28 15:39:57.297 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-28 15:39:57.301 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-28 15:39:57.302 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 15:39:57.302 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 15:39:57.303 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 15:39:57.436  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-28 15:39:57.436  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-28 15:39:57.437 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-28 15:39:57.437 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 15:39:57.440  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-28 15:39:57.440  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-28 15:39:57.441 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 15:39:57.441 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 15:39:57.441 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 15:39:57.442 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 15:39:57.443 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 15:39:57.443 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 15:39:57.444 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 15:39:57.444 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 15:39:57.444 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 15:39:57.445 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-28 15:39:57.449 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 691674314065651339353378762912633257714507603471
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 28 08:57:33 UTC 2022
           Final Date: Sat Nov 27 08:57:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:cf:67:fe:49:b9:1d:0e:64:f1:ae:10:16:85:ae:07:0c:cc:0d:94],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0f60c4cf8981fa69ce277174c74ffa33bb42b695
                       efbbe35d95121b91efe3a9bc723b32af6926fdef
                       caa36b2fba85419f1e1857b3aadb50880d1d05cc
                       4eaf104f2e785245c1585705e153e5a2bbcfa5b9
                       30309c6d8f8851270ee5e1888d5c6a2295067ad0
                       d2a81713f63e4f8b1e79363f3f04664dd70b6e8b
                       4f3e27ab5b3f9e41672a6b786139daf99825569d
                       b4596b5c3da3279a9f2e2e7ecb61b753549f5095
                       62ace0221dcc9fd2007fb53c570d72753923515e
                       7bfcf8c69feeadded06b4fe561cd6197e4ef496a
                       6abd5e287fb10588ebc10393597899c2a4095932
                       eafe54735e17cf5e04d418340f935008f925a84a
                       cbf943d31c64ef0e59131cb4b3ba4a66195b3079
                       5fe574df0a63c977d8c21035ba35766e204d1059
                       39aa0cc62d452fed0fc3dd7d8b267ca3802b335b
                       c5260b3ae8883d14db98a1aa45c78118a4ca6a91
                       35dc36b0acbac89f066db08e4eeb6ad5751cf2c8
                       4ecc7b5c2abc254a77602684faf27bb239e037be
                       5328e58d6c953e816f60c8948756e79552659d56
                       a277f364
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [99:ae:db:12:03:23:bb:81:eb:df:2d:5f:70:5a:ae:0d:eb:8e:11:3a],[56:66:d1:a4]
        modulus: b09d54e38e35ff2d6d516c153f1229568a56657b1c3037bb9994c8fdc6e8e21ea41b0035faf25d1f0f515814ed9eb89c24836353b3339dca02f9bd484641d123698ddf01f54fe397742a393877b0059a767dc6caba5ba45a479a03585f4810c657c2797058a6a747b0eff88f64017f63fb8a48941bc4e07a81e8ee1975c9ac4feecd2060de2c0bc70040c50b89a37c6112d412c6d1986be59a2ab6703c375622240c3d4ec10cb01ff27c7813044eba14a85d257557d2107889c53b3cbdd527df90f5efdf65bf1ac537e3bfd83d9c835beae7cd65559eea8f76c7d16dfa50ef6695a2af09dc534f153872b50d6f046a42846fd81060d4397e69b00b110ae38ccf
public exponent: 10001

] 
2022-11-28 15:40:02.460  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-28 15:40:02.460 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-28 15:40:02.462 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-28 15:40:02.462 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-28 15:40:02.462  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-28 15:40:02.463  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-28 15:40:02.463  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-28 15:40:02.464 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-28 15:40:02.464 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-28 15:40:02.464 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-28 15:40:02.468 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-28 15:40:02.468 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 15:40:02.468 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 15:40:02.468 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 15:40:02.569  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-28 15:40:02.570  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-28 15:40:02.570 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-28 15:40:02.570 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 15:40:02.571  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-28 15:40:02.572  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-28 15:40:02.572 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 15:40:02.572 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 15:40:02.572 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 15:40:02.573 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 15:40:02.573 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 15:40:02.573 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 15:40:02.574 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 15:40:02.574 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 15:40:02.574 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 15:40:02.575 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-28 15:40:02.577 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 691674314065651339353378762912633257714507603471
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 28 08:57:33 UTC 2022
           Final Date: Sat Nov 27 08:57:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2d:cf:67:fe:49:b9:1d:0e:64:f1:ae:10:16:85:ae:07:0c:cc:0d:94],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0f60c4cf8981fa69ce277174c74ffa33bb42b695
                       efbbe35d95121b91efe3a9bc723b32af6926fdef
                       caa36b2fba85419f1e1857b3aadb50880d1d05cc
                       4eaf104f2e785245c1585705e153e5a2bbcfa5b9
                       30309c6d8f8851270ee5e1888d5c6a2295067ad0
                       d2a81713f63e4f8b1e79363f3f04664dd70b6e8b
                       4f3e27ab5b3f9e41672a6b786139daf99825569d
                       b4596b5c3da3279a9f2e2e7ecb61b753549f5095
                       62ace0221dcc9fd2007fb53c570d72753923515e
                       7bfcf8c69feeadded06b4fe561cd6197e4ef496a
                       6abd5e287fb10588ebc10393597899c2a4095932
                       eafe54735e17cf5e04d418340f935008f925a84a
                       cbf943d31c64ef0e59131cb4b3ba4a66195b3079
                       5fe574df0a63c977d8c21035ba35766e204d1059
                       39aa0cc62d452fed0fc3dd7d8b267ca3802b335b
                       c5260b3ae8883d14db98a1aa45c78118a4ca6a91
                       35dc36b0acbac89f066db08e4eeb6ad5751cf2c8
                       4ecc7b5c2abc254a77602684faf27bb239e037be
                       5328e58d6c953e816f60c8948756e79552659d56
                       a277f364
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [dd:ab:d7:7c:88:66:7d:3f:75:d1:18:44:91:6a:f0:e2:ee:88:6e:3b],[56:66:d1:a4]
        modulus: dde615e6cbe3ed9a8ba7fff5eb39400532784c14f08a1841b86e46b6364295ae847409d1e1ebd17af1e4e4baec10f842946d11403f185e341dfa87a3d41e3bd6e6995ad280fca51526a4f7abbeb040b0033cabad09d95ff8eaedc5924801aeb1139b9ad3010b1519670ff549dbb3a5b5e6baf1c6a98b03392c23b393aa2ad7bb9996f54caf6324bf3c9e35a6caf0aaaea65bc734ce52a89f41dd004a8afc2f125c1237d14ed9c703390a101e363bad4fa027d2086f5c44e8597aec7e56a23271e1bb8fbccb446970a00ff188cf3b200a5663615a7badd9183e6e7f6d4727ee0d752067b1906e4daf7fc2d05969d610d70d426fb766cf0168a8fa0098f6e1cf1f
public exponent: 10001

]