Results

By type

          2022-06-11 03:12:03,775 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-06-11 03:12:04,670 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-06-11 03:12:05.431  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jun 11, 2022 3:12:07 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jun 11, 2022 3:12:07 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 11, 2022 3:12:07 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jun 11, 2022 3:12:07 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-06-11 03:12:07.928 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-06-11 03:12:08.241  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-06-11 03:12:08.397  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-06-11 03:12:09.057 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-06-11 03:12:09.060 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-06-11 03:12:09.061 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-06-11 03:12:09.065 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-06-11 03:12:09.105 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-06-11 03:12:09.109 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-06-11 03:12:09.238 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-06-11 03:12:09.878 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jun 11, 2022 3:12:10 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-06-11 03:12:10.729  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.743 seconds (JVM running for 9.511)
Jun 11, 2022 3:12:34 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-06-11 03:12:49.722  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-11 03:12:49.730 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-11 03:12:49.768 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-11 03:12:49.772 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-11 03:12:49.789  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-11 03:12:49.792  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-11 03:12:49.793  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-11 03:12:49.794 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-11 03:12:49.795 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 03:12:49.799 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-11 03:12:49.806 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-11 03:12:49.809 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-11 03:12:49.849 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-11 03:12:49.854 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 03:12:49.855 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 03:12:49.859 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 03:12:50.470  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-11 03:12:50.472  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-11 03:12:50.473 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-11 03:12:50.474 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 03:12:50.485  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-11 03:12:50.486  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-11 03:12:50.487 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 03:12:50.487 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 03:12:50.488 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 03:12:50.500 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 03:12:50.500 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 03:12:50.501 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 03:12:50.508 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 03:12:50.509 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 03:12:50.509 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 03:12:50.511 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-11 03:12:50.569 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 34672119982458945247204711992345332681083974102
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 11 03:10:09 UTC 2022
           Final Date: Thu Jun 10 03:10:08 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:af:75:f9:e4:b5:11:8a:f4:09:13:7d:79:72:fd:9d:5c:9f:b4:dc]
            modulus: 9edab82b9a35f99fdcc434914c0131cede0db957e7434a6e71c15b21958c6f3f860a554413b50ffd55a3be84be8558e50b99cb08aa22f3400c06908182e04d63ea2bb944304dac3dbd434e6c8a483861d7acad42d83794ea0ce8870135897ab52c9808d2ec970bcedf6ed49646b7ec1b9f406b77287fe4f71191027650ce9a074e6dce374612f2f89f09e9b7fda1410929fb8ae9604f1f338a057cba8e87871046a4e6edf38eeb4d55296df7dcf02902371b35e7d67a6df78339c5e7c03799bf08af66104289cc63f4279aa06764838cb6169d592f34fbddfe3f0771f7b1c83fc6c015ad4505c37cddf4d6f91aa6e44d432207db1d1e761e858eb9157e4dd50ccb24cba74ecf5465d7cdd45b909679710a5afec0d20489d305553c7a9272c914431a1da2f4aa6f5736ffcab4c5727335f43939dbdf6d92d52e9a9f7965e42bd890666736f1c72633047cac603274bf387e5a8405694a186d6a8f8c6be2f03fdc27fb81369bf501b8ab4be87fbbd3798a59e7dacd516121ed1ba184909624b291
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 97fd0ec6d5a6f0461e7251e26ec36270142f781c
                       25750957aaaff48c00833da5f23d2d52a88eba68
                       929b1a1ba1f0db79f3fe4969466936d4ccbeb82e
                       85bb752a8f007ff0cac7a440cdbbf4c72c0f6416
                       8110707f890b45096682b31a538410b7f8bf8abd
                       6b35b2bae8ed82784990aaa7f500f865cbb4cb15
                       b30e964bb3fcc3cef3a3b0a874cff6f000f89af2
                       0e321e9a7f81db7d3c9bc784457a974375c7cb90
                       5d7226bf882ae7c3bcc32bdbed03bec8ee03c9c7
                       ca5d56849a5c5d48d63120dd98c8a71689fbeb1e
                       b25cb580f364d48a69e7f7c6f56739303dd95dfd
                       18ebcd06dc05a5865d089ca584c80f8b04e88eda
                       d8bb2bbf4009e7e059618caea538a8165ad96b6e
                       ded11a542dd1e62d28ffdeebe2d9190456a2d021
                       bee91a5b6ec651cd5064cf4c443c0c2099a3a561
                       bd58031691426d6eed94a633782c0b962b642e24
                       0dce70e9aa5a0c3e24a8105e35b1d7adabe02a08
                       ad0c304a645c4776b29e0af3d94bab705ebe3da0
                       2e4a6bce5840e34b487898f147d186dd8a2cfe95
                       c8c34294
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [99:c0:92:01:4e:9f:97:66:e9:a4:da:74:b5:88:00:1f:12:94:1c:d3]
            modulus: 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
    public exponent: 10001

] 
2022-06-11 04:37:59.102  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-11 04:37:59.105 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-11 04:37:59.108 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-11 04:37:59.109 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-11 04:37:59.110  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-11 04:37:59.111  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-11 04:37:59.112  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-11 04:37:59.113 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-11 04:37:59.113 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-11 04:37:59.114 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-11 04:37:59.121 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-11 04:37:59.123 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 04:37:59.124 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 04:37:59.124 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 04:37:59.347  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-11 04:37:59.349  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-11 04:37:59.349 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-11 04:37:59.350 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 04:37:59.354  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-11 04:37:59.355  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-11 04:37:59.356 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 04:37:59.357 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 04:37:59.358 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 04:37:59.360 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 04:37:59.361 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 04:37:59.361 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 04:37:59.363 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 04:37:59.364 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 04:37:59.365 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 04:37:59.367 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-11 04:37:59.374 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 34672119982458945247204711992345332681083974102
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 11 03:10:09 UTC 2022
           Final Date: Thu Jun 10 03:10:08 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:af:75:f9:e4:b5:11:8a:f4:09:13:7d:79:72:fd:9d:5c:9f:b4:dc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 97fd0ec6d5a6f0461e7251e26ec36270142f781c
                       25750957aaaff48c00833da5f23d2d52a88eba68
                       929b1a1ba1f0db79f3fe4969466936d4ccbeb82e
                       85bb752a8f007ff0cac7a440cdbbf4c72c0f6416
                       8110707f890b45096682b31a538410b7f8bf8abd
                       6b35b2bae8ed82784990aaa7f500f865cbb4cb15
                       b30e964bb3fcc3cef3a3b0a874cff6f000f89af2
                       0e321e9a7f81db7d3c9bc784457a974375c7cb90
                       5d7226bf882ae7c3bcc32bdbed03bec8ee03c9c7
                       ca5d56849a5c5d48d63120dd98c8a71689fbeb1e
                       b25cb580f364d48a69e7f7c6f56739303dd95dfd
                       18ebcd06dc05a5865d089ca584c80f8b04e88eda
                       d8bb2bbf4009e7e059618caea538a8165ad96b6e
                       ded11a542dd1e62d28ffdeebe2d9190456a2d021
                       bee91a5b6ec651cd5064cf4c443c0c2099a3a561
                       bd58031691426d6eed94a633782c0b962b642e24
                       0dce70e9aa5a0c3e24a8105e35b1d7adabe02a08
                       ad0c304a645c4776b29e0af3d94bab705ebe3da0
                       2e4a6bce5840e34b487898f147d186dd8a2cfe95
                       c8c34294
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [12:76:2f:c5:c5:3d:e1:39:67:b5:f4:f4:5e:de:5b:2c:0a:2f:33:f4]
            modulus: a5850b935e3fa91acde55d40ef855bf74cb55641a2bed47d88d2f10f95a63d0751f4ca4eb62e36b614c6ea05a49654f2a14029a3417b777c001cd732075bd9f8f294f9a11eb7e5d17858c59b4ac9cd2b48cf4bd8ff2efb4805c07db6e49670878e78363367376dcfa6fdb27a4344fc8becdba6bce65553db10cee8546977d1f6a447c5c429ee41813e406e640d4310418d04f2d56382e7bdcb5949e867811633fa9da6a04b0d7b577f64c099538b3de9ce4d61421e9d92f4d2a90007a0f25a42c182c4111dd48f8d17fd3a02eb8e371ef418dcb1a869844f3d8e19d9c8086f1be2fcf6f34fd59f95b29bd455de3bdd5e5068bfe852e59191bddfec6304e1f92b
    public exponent: 10001

] 
2022-06-11 04:39:46.561  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-11 04:39:46.563 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-11 04:39:46.564 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-11 04:39:46.565 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-11 04:39:46.566  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-11 04:39:46.567  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-11 04:39:46.568  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-11 04:39:46.568 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-11 04:39:46.569 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-11 04:39:46.569 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-11 04:39:46.581 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-11 04:39:46.582 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 04:39:46.583 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 04:39:46.583 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 04:39:46.762  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-11 04:39:46.763  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-11 04:39:46.763 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-11 04:39:46.763 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 04:39:46.766  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-11 04:39:46.766  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-11 04:39:46.767 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 04:39:46.767 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 04:39:46.768 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 04:39:46.769 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 04:39:46.769 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 04:39:46.769 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 04:39:46.770 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 04:39:46.771 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 04:39:46.771 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 04:39:46.772 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-11 04:39:46.776 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 34672119982458945247204711992345332681083974102
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 11 03:10:09 UTC 2022
           Final Date: Thu Jun 10 03:10:08 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:af:75:f9:e4:b5:11:8a:f4:09:13:7d:79:72:fd:9d:5c:9f:b4:dc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 97fd0ec6d5a6f0461e7251e26ec36270142f781c
                       25750957aaaff48c00833da5f23d2d52a88eba68
                       929b1a1ba1f0db79f3fe4969466936d4ccbeb82e
                       85bb752a8f007ff0cac7a440cdbbf4c72c0f6416
                       8110707f890b45096682b31a538410b7f8bf8abd
                       6b35b2bae8ed82784990aaa7f500f865cbb4cb15
                       b30e964bb3fcc3cef3a3b0a874cff6f000f89af2
                       0e321e9a7f81db7d3c9bc784457a974375c7cb90
                       5d7226bf882ae7c3bcc32bdbed03bec8ee03c9c7
                       ca5d56849a5c5d48d63120dd98c8a71689fbeb1e
                       b25cb580f364d48a69e7f7c6f56739303dd95dfd
                       18ebcd06dc05a5865d089ca584c80f8b04e88eda
                       d8bb2bbf4009e7e059618caea538a8165ad96b6e
                       ded11a542dd1e62d28ffdeebe2d9190456a2d021
                       bee91a5b6ec651cd5064cf4c443c0c2099a3a561
                       bd58031691426d6eed94a633782c0b962b642e24
                       0dce70e9aa5a0c3e24a8105e35b1d7adabe02a08
                       ad0c304a645c4776b29e0af3d94bab705ebe3da0
                       2e4a6bce5840e34b487898f147d186dd8a2cfe95
                       c8c34294
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [84:f3:67:87:b5:70:79:8d:4f:6b:94:e8:bc:61:cf:7b:31:70:e9:73]
            modulus: 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
    public exponent: 10001

] 
2022-06-11 04:41:48.380  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-11 04:41:48.381 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-11 04:41:48.383 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-11 04:41:48.384 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-11 04:41:48.384  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-11 04:41:48.385  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-11 04:41:48.386  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-11 04:41:48.386 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-11 04:41:48.387 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-11 04:41:48.387 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-11 04:41:48.392 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-11 04:41:48.393 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 04:41:48.393 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 04:41:48.394 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 04:41:48.518  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-11 04:41:48.519  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-11 04:41:48.519 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-11 04:41:48.520 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 04:41:48.521  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-11 04:41:48.522  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-11 04:41:48.523 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 04:41:48.523 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 04:41:48.523 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 04:41:48.524 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 04:41:48.524 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 04:41:48.525 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 04:41:48.526 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 04:41:48.526 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 04:41:48.526 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 04:41:48.527 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-11 04:41:48.532 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 34672119982458945247204711992345332681083974102
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 11 03:10:09 UTC 2022
           Final Date: Thu Jun 10 03:10:08 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:af:75:f9:e4:b5:11:8a:f4:09:13:7d:79:72:fd:9d:5c:9f:b4:dc]
            modulus: 9edab82b9a35f99fdcc434914c0131cede0db957e7434a6e71c15b21958c6f3f860a554413b50ffd55a3be84be8558e50b99cb08aa22f3400c06908182e04d63ea2bb944304dac3dbd434e6c8a483861d7acad42d83794ea0ce8870135897ab52c9808d2ec970bcedf6ed49646b7ec1b9f406b77287fe4f71191027650ce9a074e6dce374612f2f89f09e9b7fda1410929fb8ae9604f1f338a057cba8e87871046a4e6edf38eeb4d55296df7dcf02902371b35e7d67a6df78339c5e7c03799bf08af66104289cc63f4279aa06764838cb6169d592f34fbddfe3f0771f7b1c83fc6c015ad4505c37cddf4d6f91aa6e44d432207db1d1e761e858eb9157e4dd50ccb24cba74ecf5465d7cdd45b909679710a5afec0d20489d305553c7a9272c914431a1da2f4aa6f5736ffcab4c5727335f43939dbdf6d92d52e9a9f7965e42bd890666736f1c72633047cac603274bf387e5a8405694a186d6a8f8c6be2f03fdc27fb81369bf501b8ab4be87fbbd3798a59e7dacd516121ed1ba184909624b291
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 97fd0ec6d5a6f0461e7251e26ec36270142f781c
                       25750957aaaff48c00833da5f23d2d52a88eba68
                       929b1a1ba1f0db79f3fe4969466936d4ccbeb82e
                       85bb752a8f007ff0cac7a440cdbbf4c72c0f6416
                       8110707f890b45096682b31a538410b7f8bf8abd
                       6b35b2bae8ed82784990aaa7f500f865cbb4cb15
                       b30e964bb3fcc3cef3a3b0a874cff6f000f89af2
                       0e321e9a7f81db7d3c9bc784457a974375c7cb90
                       5d7226bf882ae7c3bcc32bdbed03bec8ee03c9c7
                       ca5d56849a5c5d48d63120dd98c8a71689fbeb1e
                       b25cb580f364d48a69e7f7c6f56739303dd95dfd
                       18ebcd06dc05a5865d089ca584c80f8b04e88eda
                       d8bb2bbf4009e7e059618caea538a8165ad96b6e
                       ded11a542dd1e62d28ffdeebe2d9190456a2d021
                       bee91a5b6ec651cd5064cf4c443c0c2099a3a561
                       bd58031691426d6eed94a633782c0b962b642e24
                       0dce70e9aa5a0c3e24a8105e35b1d7adabe02a08
                       ad0c304a645c4776b29e0af3d94bab705ebe3da0
                       2e4a6bce5840e34b487898f147d186dd8a2cfe95
                       c8c34294
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [81:5d:c6:cd:c7:9b:4e:f1:53:6e:59:07:8f:5b:61:37:57:19:1b:f9]
            modulus: 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
    public exponent: 10001

] 
2022-06-11 04:44:10.360  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-11 04:44:10.363 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-11 04:44:10.366 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-11 04:44:10.367 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-11 04:44:10.368  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-11 04:44:10.369  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-11 04:44:10.370  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-11 04:44:10.371 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-11 04:44:10.371 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-11 04:44:10.372 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-11 04:44:10.377 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-11 04:44:10.378 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 04:44:10.378 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 04:44:10.379 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 04:44:10.524  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-11 04:44:10.525  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-11 04:44:10.525 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-11 04:44:10.526 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 04:44:10.527  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-11 04:44:10.528  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-11 04:44:10.528 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 04:44:10.528 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 04:44:10.529 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 04:44:10.529 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 04:44:10.530 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 04:44:10.533 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 04:44:10.539 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 04:44:10.540 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 04:44:10.540 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 04:44:10.542 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-11 04:44:10.548 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 34672119982458945247204711992345332681083974102
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 11 03:10:09 UTC 2022
           Final Date: Thu Jun 10 03:10:08 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:af:75:f9:e4:b5:11:8a:f4:09:13:7d:79:72:fd:9d:5c:9f:b4:dc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 97fd0ec6d5a6f0461e7251e26ec36270142f781c
                       25750957aaaff48c00833da5f23d2d52a88eba68
                       929b1a1ba1f0db79f3fe4969466936d4ccbeb82e
                       85bb752a8f007ff0cac7a440cdbbf4c72c0f6416
                       8110707f890b45096682b31a538410b7f8bf8abd
                       6b35b2bae8ed82784990aaa7f500f865cbb4cb15
                       b30e964bb3fcc3cef3a3b0a874cff6f000f89af2
                       0e321e9a7f81db7d3c9bc784457a974375c7cb90
                       5d7226bf882ae7c3bcc32bdbed03bec8ee03c9c7
                       ca5d56849a5c5d48d63120dd98c8a71689fbeb1e
                       b25cb580f364d48a69e7f7c6f56739303dd95dfd
                       18ebcd06dc05a5865d089ca584c80f8b04e88eda
                       d8bb2bbf4009e7e059618caea538a8165ad96b6e
                       ded11a542dd1e62d28ffdeebe2d9190456a2d021
                       bee91a5b6ec651cd5064cf4c443c0c2099a3a561
                       bd58031691426d6eed94a633782c0b962b642e24
                       0dce70e9aa5a0c3e24a8105e35b1d7adabe02a08
                       ad0c304a645c4776b29e0af3d94bab705ebe3da0
                       2e4a6bce5840e34b487898f147d186dd8a2cfe95
                       c8c34294
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [da:cd:c7:09:2f:29:37:3b:af:5b:ce:13:07:71:ea:55:d7:e3:d0:47]
            modulus: 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
    public exponent: 10001

] 
2022-06-11 04:47:31.941  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-11 04:47:31.943 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-11 04:47:31.944 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-11 04:47:31.945 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-11 04:47:31.945  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-11 04:47:31.945  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-11 04:47:31.946  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-11 04:47:31.946 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-11 04:47:31.946 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-11 04:47:31.947 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-11 04:47:31.953 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-11 04:47:31.953 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 04:47:31.953 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 04:47:31.954 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 04:47:32.117  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-11 04:47:32.118  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-11 04:47:32.118 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-11 04:47:32.119 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 04:47:32.120  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-11 04:47:32.121  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-11 04:47:32.121 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 04:47:32.122 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 04:47:32.122 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 04:47:32.123 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 04:47:32.123 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 04:47:32.123 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 04:47:32.124 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 04:47:32.124 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 04:47:32.125 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 04:47:32.125 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-11 04:47:32.129 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 34672119982458945247204711992345332681083974102
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 11 03:10:09 UTC 2022
           Final Date: Thu Jun 10 03:10:08 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:af:75:f9:e4:b5:11:8a:f4:09:13:7d:79:72:fd:9d:5c:9f:b4:dc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 97fd0ec6d5a6f0461e7251e26ec36270142f781c
                       25750957aaaff48c00833da5f23d2d52a88eba68
                       929b1a1ba1f0db79f3fe4969466936d4ccbeb82e
                       85bb752a8f007ff0cac7a440cdbbf4c72c0f6416
                       8110707f890b45096682b31a538410b7f8bf8abd
                       6b35b2bae8ed82784990aaa7f500f865cbb4cb15
                       b30e964bb3fcc3cef3a3b0a874cff6f000f89af2
                       0e321e9a7f81db7d3c9bc784457a974375c7cb90
                       5d7226bf882ae7c3bcc32bdbed03bec8ee03c9c7
                       ca5d56849a5c5d48d63120dd98c8a71689fbeb1e
                       b25cb580f364d48a69e7f7c6f56739303dd95dfd
                       18ebcd06dc05a5865d089ca584c80f8b04e88eda
                       d8bb2bbf4009e7e059618caea538a8165ad96b6e
                       ded11a542dd1e62d28ffdeebe2d9190456a2d021
                       bee91a5b6ec651cd5064cf4c443c0c2099a3a561
                       bd58031691426d6eed94a633782c0b962b642e24
                       0dce70e9aa5a0c3e24a8105e35b1d7adabe02a08
                       ad0c304a645c4776b29e0af3d94bab705ebe3da0
                       2e4a6bce5840e34b487898f147d186dd8a2cfe95
                       c8c34294
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6c:2d:f5:52:09:bf:61:3a:5d:aa:11:a3:d2:cb:a0:50:f8:c1:a9:44]
            modulus: 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
    public exponent: 10001

] 
2022-06-11 04:52:28.536  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-11 04:52:28.537 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-11 04:52:28.538 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-11 04:52:28.539 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-11 04:52:28.539  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-11 04:52:28.540  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-11 04:52:28.540  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-11 04:52:28.541 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-11 04:52:28.541 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-11 04:52:28.541 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-11 04:52:28.546 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-11 04:52:28.546 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 04:52:28.547 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 04:52:28.547 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 04:52:28.708  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-11 04:52:28.709  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-11 04:52:28.709 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-11 04:52:28.709 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 04:52:28.711  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-11 04:52:28.711  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-11 04:52:28.712 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 04:52:28.712 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 04:52:28.712 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 04:52:28.713 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 04:52:28.713 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 04:52:28.714 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 04:52:28.714 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 04:52:28.715 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 04:52:28.715 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 04:52:28.716 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-11 04:52:28.720 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 34672119982458945247204711992345332681083974102
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 11 03:10:09 UTC 2022
           Final Date: Thu Jun 10 03:10:08 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:af:75:f9:e4:b5:11:8a:f4:09:13:7d:79:72:fd:9d:5c:9f:b4:dc]
            modulus: 9edab82b9a35f99fdcc434914c0131cede0db957e7434a6e71c15b21958c6f3f860a554413b50ffd55a3be84be8558e50b99cb08aa22f3400c06908182e04d63ea2bb944304dac3dbd434e6c8a483861d7acad42d83794ea0ce8870135897ab52c9808d2ec970bcedf6ed49646b7ec1b9f406b77287fe4f71191027650ce9a074e6dce374612f2f89f09e9b7fda1410929fb8ae9604f1f338a057cba8e87871046a4e6edf38eeb4d55296df7dcf02902371b35e7d67a6df78339c5e7c03799bf08af66104289cc63f4279aa06764838cb6169d592f34fbddfe3f0771f7b1c83fc6c015ad4505c37cddf4d6f91aa6e44d432207db1d1e761e858eb9157e4dd50ccb24cba74ecf5465d7cdd45b909679710a5afec0d20489d305553c7a9272c914431a1da2f4aa6f5736ffcab4c5727335f43939dbdf6d92d52e9a9f7965e42bd890666736f1c72633047cac603274bf387e5a8405694a186d6a8f8c6be2f03fdc27fb81369bf501b8ab4be87fbbd3798a59e7dacd516121ed1ba184909624b291
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 97fd0ec6d5a6f0461e7251e26ec36270142f781c
                       25750957aaaff48c00833da5f23d2d52a88eba68
                       929b1a1ba1f0db79f3fe4969466936d4ccbeb82e
                       85bb752a8f007ff0cac7a440cdbbf4c72c0f6416
                       8110707f890b45096682b31a538410b7f8bf8abd
                       6b35b2bae8ed82784990aaa7f500f865cbb4cb15
                       b30e964bb3fcc3cef3a3b0a874cff6f000f89af2
                       0e321e9a7f81db7d3c9bc784457a974375c7cb90
                       5d7226bf882ae7c3bcc32bdbed03bec8ee03c9c7
                       ca5d56849a5c5d48d63120dd98c8a71689fbeb1e
                       b25cb580f364d48a69e7f7c6f56739303dd95dfd
                       18ebcd06dc05a5865d089ca584c80f8b04e88eda
                       d8bb2bbf4009e7e059618caea538a8165ad96b6e
                       ded11a542dd1e62d28ffdeebe2d9190456a2d021
                       bee91a5b6ec651cd5064cf4c443c0c2099a3a561
                       bd58031691426d6eed94a633782c0b962b642e24
                       0dce70e9aa5a0c3e24a8105e35b1d7adabe02a08
                       ad0c304a645c4776b29e0af3d94bab705ebe3da0
                       2e4a6bce5840e34b487898f147d186dd8a2cfe95
                       c8c34294
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [08:18:08:2d:50:24:74:e9:5d:4a:69:67:3a:61:b2:ab:6d:bc:b6:70]
            modulus: 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
    public exponent: 10001

] 
2022-06-11 04:55:44.344  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-11 04:55:44.345 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-11 04:55:44.347 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-11 04:55:44.348 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-11 04:55:44.349  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-11 04:55:44.349  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-11 04:55:44.350  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-11 04:55:44.350 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-11 04:55:44.350 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-11 04:55:44.351 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-11 04:55:44.357 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-11 04:55:44.358 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 04:55:44.358 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 04:55:44.358 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 04:55:44.511  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-11 04:55:44.512  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-11 04:55:44.512 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-11 04:55:44.512 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 04:55:44.514  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-11 04:55:44.514  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-11 04:55:44.514 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 04:55:44.515 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 04:55:44.515 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 04:55:44.516 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 04:55:44.516 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 04:55:44.517 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 04:55:44.517 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 04:55:44.517 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 04:55:44.518 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 04:55:44.518 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-11 04:55:44.523 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 34672119982458945247204711992345332681083974102
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 11 03:10:09 UTC 2022
           Final Date: Thu Jun 10 03:10:08 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:af:75:f9:e4:b5:11:8a:f4:09:13:7d:79:72:fd:9d:5c:9f:b4:dc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 97fd0ec6d5a6f0461e7251e26ec36270142f781c
                       25750957aaaff48c00833da5f23d2d52a88eba68
                       929b1a1ba1f0db79f3fe4969466936d4ccbeb82e
                       85bb752a8f007ff0cac7a440cdbbf4c72c0f6416
                       8110707f890b45096682b31a538410b7f8bf8abd
                       6b35b2bae8ed82784990aaa7f500f865cbb4cb15
                       b30e964bb3fcc3cef3a3b0a874cff6f000f89af2
                       0e321e9a7f81db7d3c9bc784457a974375c7cb90
                       5d7226bf882ae7c3bcc32bdbed03bec8ee03c9c7
                       ca5d56849a5c5d48d63120dd98c8a71689fbeb1e
                       b25cb580f364d48a69e7f7c6f56739303dd95dfd
                       18ebcd06dc05a5865d089ca584c80f8b04e88eda
                       d8bb2bbf4009e7e059618caea538a8165ad96b6e
                       ded11a542dd1e62d28ffdeebe2d9190456a2d021
                       bee91a5b6ec651cd5064cf4c443c0c2099a3a561
                       bd58031691426d6eed94a633782c0b962b642e24
                       0dce70e9aa5a0c3e24a8105e35b1d7adabe02a08
                       ad0c304a645c4776b29e0af3d94bab705ebe3da0
                       2e4a6bce5840e34b487898f147d186dd8a2cfe95
                       c8c34294
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e0:4b:40:88:be:cf:8e:ab:2f:fb:a3:3e:49:cd:f9:7b:1c:f7:91:50]
            modulus: b3e382e8e27a74b39b907f920abc2d9cb58546fd6b29bc71bcf34b01a6c91ab77338db4e60225877821eb6295552cc72640fbb448fb6f6987a09802c9607b29f90c6c0216469b10a9fe7a251cf166b0a8a9e584f9cdb3094d867f3ebc529959e6caca3e9f2e40bd0d5de4920cbe21b2d44df8d15837e3f591cee80b40e94406a2466c994aa5dc7086363b0eae55d89d37ec0a35b455f015f15a00636af1967c25ee38944a0dcd6651e8721d23a63b269a4c23265f617087887d1ee7591939098d72f52e998654abaf9a9be19489f7339a25fede1bb5c34dfa52f9c1cfbd8bc4c761e216106c1b359d865e9ec1d005720d0186b07b25d8100122ca6f6df512b2d
    public exponent: 10001

] 
2022-06-11 04:57:09.739  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-11 04:57:09.742 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-11 04:57:09.746 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-11 04:57:09.748 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-11 04:57:09.748  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-11 04:57:09.749  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-11 04:57:09.750  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-11 04:57:09.750 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-11 04:57:09.751 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-11 04:57:09.751 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-11 04:57:09.757 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-11 04:57:09.759 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 04:57:09.759 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 04:57:09.760 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 04:57:09.965  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-11 04:57:09.966  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-11 04:57:09.966 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-11 04:57:09.967 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 04:57:09.968  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-11 04:57:09.969  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-11 04:57:09.970 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 04:57:09.970 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 04:57:09.970 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 04:57:09.971 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 04:57:09.972 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 04:57:09.972 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 04:57:09.973 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 04:57:09.973 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 04:57:09.973 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 04:57:09.975 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-11 04:57:09.979 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 34672119982458945247204711992345332681083974102
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 11 03:10:09 UTC 2022
           Final Date: Thu Jun 10 03:10:08 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:af:75:f9:e4:b5:11:8a:f4:09:13:7d:79:72:fd:9d:5c:9f:b4:dc]
            modulus: 9edab82b9a35f99fdcc434914c0131cede0db957e7434a6e71c15b21958c6f3f860a554413b50ffd55a3be84be8558e50b99cb08aa22f3400c06908182e04d63ea2bb944304dac3dbd434e6c8a483861d7acad42d83794ea0ce8870135897ab52c9808d2ec970bcedf6ed49646b7ec1b9f406b77287fe4f71191027650ce9a074e6dce374612f2f89f09e9b7fda1410929fb8ae9604f1f338a057cba8e87871046a4e6edf38eeb4d55296df7dcf02902371b35e7d67a6df78339c5e7c03799bf08af66104289cc63f4279aa06764838cb6169d592f34fbddfe3f0771f7b1c83fc6c015ad4505c37cddf4d6f91aa6e44d432207db1d1e761e858eb9157e4dd50ccb24cba74ecf5465d7cdd45b909679710a5afec0d20489d305553c7a9272c914431a1da2f4aa6f5736ffcab4c5727335f43939dbdf6d92d52e9a9f7965e42bd890666736f1c72633047cac603274bf387e5a8405694a186d6a8f8c6be2f03fdc27fb81369bf501b8ab4be87fbbd3798a59e7dacd516121ed1ba184909624b291
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 97fd0ec6d5a6f0461e7251e26ec36270142f781c
                       25750957aaaff48c00833da5f23d2d52a88eba68
                       929b1a1ba1f0db79f3fe4969466936d4ccbeb82e
                       85bb752a8f007ff0cac7a440cdbbf4c72c0f6416
                       8110707f890b45096682b31a538410b7f8bf8abd
                       6b35b2bae8ed82784990aaa7f500f865cbb4cb15
                       b30e964bb3fcc3cef3a3b0a874cff6f000f89af2
                       0e321e9a7f81db7d3c9bc784457a974375c7cb90
                       5d7226bf882ae7c3bcc32bdbed03bec8ee03c9c7
                       ca5d56849a5c5d48d63120dd98c8a71689fbeb1e
                       b25cb580f364d48a69e7f7c6f56739303dd95dfd
                       18ebcd06dc05a5865d089ca584c80f8b04e88eda
                       d8bb2bbf4009e7e059618caea538a8165ad96b6e
                       ded11a542dd1e62d28ffdeebe2d9190456a2d021
                       bee91a5b6ec651cd5064cf4c443c0c2099a3a561
                       bd58031691426d6eed94a633782c0b962b642e24
                       0dce70e9aa5a0c3e24a8105e35b1d7adabe02a08
                       ad0c304a645c4776b29e0af3d94bab705ebe3da0
                       2e4a6bce5840e34b487898f147d186dd8a2cfe95
                       c8c34294
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [db:49:62:5c:a2:e4:37:dd:2f:ca:f0:cf:19:0a:2f:8f:1f:00:7c:1e]
            modulus: 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
    public exponent: 10001

] 
2022-06-11 05:00:45.565  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-11 05:00:45.568 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-11 05:00:45.570 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-11 05:00:45.570 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-11 05:00:45.571  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-11 05:00:45.571  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-11 05:00:45.573  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-11 05:00:45.573 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-11 05:00:45.573 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-11 05:00:45.574 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-11 05:00:45.578 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-11 05:00:45.579 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 05:00:45.579 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 05:00:45.580 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 05:00:45.736  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-11 05:00:45.737  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-11 05:00:45.737 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-11 05:00:45.737 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 05:00:45.739  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-11 05:00:45.739  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-11 05:00:45.740 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 05:00:45.740 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 05:00:45.740 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 05:00:45.741 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 05:00:45.741 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 05:00:45.741 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 05:00:45.742 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 05:00:45.742 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 05:00:45.743 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 05:00:45.744 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-11 05:00:45.747 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 34672119982458945247204711992345332681083974102
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 11 03:10:09 UTC 2022
           Final Date: Thu Jun 10 03:10:08 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:af:75:f9:e4:b5:11:8a:f4:09:13:7d:79:72:fd:9d:5c:9f:b4:dc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 97fd0ec6d5a6f0461e7251e26ec36270142f781c
                       25750957aaaff48c00833da5f23d2d52a88eba68
                       929b1a1ba1f0db79f3fe4969466936d4ccbeb82e
                       85bb752a8f007ff0cac7a440cdbbf4c72c0f6416
                       8110707f890b45096682b31a538410b7f8bf8abd
                       6b35b2bae8ed82784990aaa7f500f865cbb4cb15
                       b30e964bb3fcc3cef3a3b0a874cff6f000f89af2
                       0e321e9a7f81db7d3c9bc784457a974375c7cb90
                       5d7226bf882ae7c3bcc32bdbed03bec8ee03c9c7
                       ca5d56849a5c5d48d63120dd98c8a71689fbeb1e
                       b25cb580f364d48a69e7f7c6f56739303dd95dfd
                       18ebcd06dc05a5865d089ca584c80f8b04e88eda
                       d8bb2bbf4009e7e059618caea538a8165ad96b6e
                       ded11a542dd1e62d28ffdeebe2d9190456a2d021
                       bee91a5b6ec651cd5064cf4c443c0c2099a3a561
                       bd58031691426d6eed94a633782c0b962b642e24
                       0dce70e9aa5a0c3e24a8105e35b1d7adabe02a08
                       ad0c304a645c4776b29e0af3d94bab705ebe3da0
                       2e4a6bce5840e34b487898f147d186dd8a2cfe95
                       c8c34294
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [04:d6:86:3d:69:95:43:4b:45:d3:60:35:7e:fe:30:a9:9c:ac:2a:54]
            modulus: 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
    public exponent: 10001

] 
2022-06-11 05:01:42.604  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-11 05:01:42.606 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-11 05:01:42.607 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-11 05:01:42.608 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-11 05:01:42.609  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-11 05:01:42.610  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-11 05:01:42.610  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-11 05:01:42.611 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-11 05:01:42.611 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-11 05:01:42.612 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-11 05:01:42.619 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-11 05:01:42.620 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 05:01:42.620 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 05:01:42.621 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 05:01:42.795  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-11 05:01:42.796  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-11 05:01:42.796 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-11 05:01:42.796 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 05:01:42.822  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-11 05:01:42.823  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-11 05:01:42.824 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 05:01:42.824 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 05:01:42.824 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 05:01:42.825 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 05:01:42.825 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 05:01:42.826 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 05:01:42.826 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 05:01:42.827 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 05:01:42.827 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 05:01:42.828 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-11 05:01:42.831 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 34672119982458945247204711992345332681083974102
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 11 03:10:09 UTC 2022
           Final Date: Thu Jun 10 03:10:08 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:af:75:f9:e4:b5:11:8a:f4:09:13:7d:79:72:fd:9d:5c:9f:b4:dc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 97fd0ec6d5a6f0461e7251e26ec36270142f781c
                       25750957aaaff48c00833da5f23d2d52a88eba68
                       929b1a1ba1f0db79f3fe4969466936d4ccbeb82e
                       85bb752a8f007ff0cac7a440cdbbf4c72c0f6416
                       8110707f890b45096682b31a538410b7f8bf8abd
                       6b35b2bae8ed82784990aaa7f500f865cbb4cb15
                       b30e964bb3fcc3cef3a3b0a874cff6f000f89af2
                       0e321e9a7f81db7d3c9bc784457a974375c7cb90
                       5d7226bf882ae7c3bcc32bdbed03bec8ee03c9c7
                       ca5d56849a5c5d48d63120dd98c8a71689fbeb1e
                       b25cb580f364d48a69e7f7c6f56739303dd95dfd
                       18ebcd06dc05a5865d089ca584c80f8b04e88eda
                       d8bb2bbf4009e7e059618caea538a8165ad96b6e
                       ded11a542dd1e62d28ffdeebe2d9190456a2d021
                       bee91a5b6ec651cd5064cf4c443c0c2099a3a561
                       bd58031691426d6eed94a633782c0b962b642e24
                       0dce70e9aa5a0c3e24a8105e35b1d7adabe02a08
                       ad0c304a645c4776b29e0af3d94bab705ebe3da0
                       2e4a6bce5840e34b487898f147d186dd8a2cfe95
                       c8c34294
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ec:56:6e:bd:fe:60:c8:e0:6f:fc:2b:69:9e:b0:7f:a4:8b:24:a0:2a]
            modulus: b297f6615852c7506aa65139d0b593fe317e52660c209ac914468b2ce6805323bec1d072745c53bd86811e1e3c9b19040927c4d5ab8c1b9e8b1568c26bf321b6c036c0665cb9dad128f5a0910e4a342a40eb87de64b1fcb46cd2f135eb73c4a4d1ab43bd2d16a1cfe58efe236946773d31da5b98fa3538d1c2a5e76e29218b9b2cb842c553cbdb7e7c2ac68ba61a242b7139116c021399f4e92955abb49b63b1b743dbff696087c1d1def439a7d3ca6a4d5657a44fb6e9033e48d362b2aa480e6499c91e8f38e0236e374743edfbf5520eed89c66a216932663d824d45e83ee7a1c4f79e0b07bda9b9fac929bbf8393d8053f7287dc575d1c362b30202955071
    public exponent: 10001

] 
2022-06-11 05:02:01.466  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-11 05:02:01.467 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-11 05:02:01.468 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-11 05:02:01.468 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-11 05:02:01.469  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-11 05:02:01.469  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-11 05:02:01.470  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-11 05:02:01.470 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-11 05:02:01.470 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-11 05:02:01.471 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-11 05:02:01.475 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-11 05:02:01.476 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 05:02:01.476 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 05:02:01.477 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 05:02:01.653  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-11 05:02:01.654  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-11 05:02:01.654 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-11 05:02:01.654 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 05:02:01.656  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-11 05:02:01.656  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-11 05:02:01.656 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 05:02:01.657 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 05:02:01.657 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 05:02:01.657 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 05:02:01.658 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 05:02:01.658 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 05:02:01.659 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 05:02:01.659 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 05:02:01.659 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 05:02:01.660 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-11 05:02:01.663 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 34672119982458945247204711992345332681083974102
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 11 03:10:09 UTC 2022
           Final Date: Thu Jun 10 03:10:08 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:af:75:f9:e4:b5:11:8a:f4:09:13:7d:79:72:fd:9d:5c:9f:b4:dc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 97fd0ec6d5a6f0461e7251e26ec36270142f781c
                       25750957aaaff48c00833da5f23d2d52a88eba68
                       929b1a1ba1f0db79f3fe4969466936d4ccbeb82e
                       85bb752a8f007ff0cac7a440cdbbf4c72c0f6416
                       8110707f890b45096682b31a538410b7f8bf8abd
                       6b35b2bae8ed82784990aaa7f500f865cbb4cb15
                       b30e964bb3fcc3cef3a3b0a874cff6f000f89af2
                       0e321e9a7f81db7d3c9bc784457a974375c7cb90
                       5d7226bf882ae7c3bcc32bdbed03bec8ee03c9c7
                       ca5d56849a5c5d48d63120dd98c8a71689fbeb1e
                       b25cb580f364d48a69e7f7c6f56739303dd95dfd
                       18ebcd06dc05a5865d089ca584c80f8b04e88eda
                       d8bb2bbf4009e7e059618caea538a8165ad96b6e
                       ded11a542dd1e62d28ffdeebe2d9190456a2d021
                       bee91a5b6ec651cd5064cf4c443c0c2099a3a561
                       bd58031691426d6eed94a633782c0b962b642e24
                       0dce70e9aa5a0c3e24a8105e35b1d7adabe02a08
                       ad0c304a645c4776b29e0af3d94bab705ebe3da0
                       2e4a6bce5840e34b487898f147d186dd8a2cfe95
                       c8c34294
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a4:98:f3:0d:f8:23:a9:75:44:8d:48:9a:41:73:4a:f9:f7:37:0c:42]
            modulus: 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
    public exponent: 10001

] 
2022-06-11 05:05:51.155  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-11 05:05:51.156 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-11 05:05:51.158 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-11 05:05:51.159 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-11 05:05:51.159  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-11 05:05:51.160  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-11 05:05:51.160  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-11 05:05:51.161 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-11 05:05:51.161 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-11 05:05:51.162 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-11 05:05:51.166 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-11 05:05:51.168 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 05:05:51.168 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 05:05:51.168 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 05:05:51.288  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-11 05:05:51.289  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-11 05:05:51.289 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-11 05:05:51.289 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 05:05:51.291  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-11 05:05:51.291  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-11 05:05:51.292 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 05:05:51.292 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 05:05:51.293 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 05:05:51.293 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 05:05:51.294 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 05:05:51.294 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 05:05:51.295 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 05:05:51.295 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 05:05:51.295 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 05:05:51.296 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-11 05:05:51.299 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 34672119982458945247204711992345332681083974102
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 11 03:10:09 UTC 2022
           Final Date: Thu Jun 10 03:10:08 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:af:75:f9:e4:b5:11:8a:f4:09:13:7d:79:72:fd:9d:5c:9f:b4:dc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 97fd0ec6d5a6f0461e7251e26ec36270142f781c
                       25750957aaaff48c00833da5f23d2d52a88eba68
                       929b1a1ba1f0db79f3fe4969466936d4ccbeb82e
                       85bb752a8f007ff0cac7a440cdbbf4c72c0f6416
                       8110707f890b45096682b31a538410b7f8bf8abd
                       6b35b2bae8ed82784990aaa7f500f865cbb4cb15
                       b30e964bb3fcc3cef3a3b0a874cff6f000f89af2
                       0e321e9a7f81db7d3c9bc784457a974375c7cb90
                       5d7226bf882ae7c3bcc32bdbed03bec8ee03c9c7
                       ca5d56849a5c5d48d63120dd98c8a71689fbeb1e
                       b25cb580f364d48a69e7f7c6f56739303dd95dfd
                       18ebcd06dc05a5865d089ca584c80f8b04e88eda
                       d8bb2bbf4009e7e059618caea538a8165ad96b6e
                       ded11a542dd1e62d28ffdeebe2d9190456a2d021
                       bee91a5b6ec651cd5064cf4c443c0c2099a3a561
                       bd58031691426d6eed94a633782c0b962b642e24
                       0dce70e9aa5a0c3e24a8105e35b1d7adabe02a08
                       ad0c304a645c4776b29e0af3d94bab705ebe3da0
                       2e4a6bce5840e34b487898f147d186dd8a2cfe95
                       c8c34294
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [26:3b:11:f0:53:da:44:42:cc:6e:2c:41:dd:8a:9b:03:a6:ea:90:56]
            modulus: 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
    public exponent: 10001

] 
2022-06-11 05:09:39.664  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-11 05:09:39.668 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-11 05:09:39.672 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-11 05:09:39.673 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-11 05:09:39.676  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-11 05:09:39.676  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-11 05:09:39.677  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-11 05:09:39.677 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-11 05:09:39.678 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-11 05:09:39.678 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-11 05:09:39.684 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-11 05:09:39.685 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 05:09:39.685 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 05:09:39.685 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 05:09:39.848  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-11 05:09:39.848  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-11 05:09:39.849 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-11 05:09:39.849 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 05:09:39.850  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-11 05:09:39.851  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-11 05:09:39.851 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 05:09:39.852 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 05:09:39.852 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 05:09:39.852 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 05:09:39.853 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 05:09:39.853 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 05:09:39.854 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 05:09:39.854 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 05:09:39.854 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 05:09:39.855 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-11 05:09:39.859 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 34672119982458945247204711992345332681083974102
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 11 03:10:09 UTC 2022
           Final Date: Thu Jun 10 03:10:08 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:af:75:f9:e4:b5:11:8a:f4:09:13:7d:79:72:fd:9d:5c:9f:b4:dc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 97fd0ec6d5a6f0461e7251e26ec36270142f781c
                       25750957aaaff48c00833da5f23d2d52a88eba68
                       929b1a1ba1f0db79f3fe4969466936d4ccbeb82e
                       85bb752a8f007ff0cac7a440cdbbf4c72c0f6416
                       8110707f890b45096682b31a538410b7f8bf8abd
                       6b35b2bae8ed82784990aaa7f500f865cbb4cb15
                       b30e964bb3fcc3cef3a3b0a874cff6f000f89af2
                       0e321e9a7f81db7d3c9bc784457a974375c7cb90
                       5d7226bf882ae7c3bcc32bdbed03bec8ee03c9c7
                       ca5d56849a5c5d48d63120dd98c8a71689fbeb1e
                       b25cb580f364d48a69e7f7c6f56739303dd95dfd
                       18ebcd06dc05a5865d089ca584c80f8b04e88eda
                       d8bb2bbf4009e7e059618caea538a8165ad96b6e
                       ded11a542dd1e62d28ffdeebe2d9190456a2d021
                       bee91a5b6ec651cd5064cf4c443c0c2099a3a561
                       bd58031691426d6eed94a633782c0b962b642e24
                       0dce70e9aa5a0c3e24a8105e35b1d7adabe02a08
                       ad0c304a645c4776b29e0af3d94bab705ebe3da0
                       2e4a6bce5840e34b487898f147d186dd8a2cfe95
                       c8c34294
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e0:ec:79:de:26:47:ef:3c:11:07:b0:40:47:1a:24:37:65:cc:4b:1b]
            modulus: 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
    public exponent: 10001

] 
2022-06-11 05:13:51.922  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-11 05:13:51.925 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-11 05:13:51.928 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-11 05:13:51.930 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-11 05:13:51.932  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-11 05:13:51.933  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-11 05:13:51.933  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-11 05:13:51.933 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-11 05:13:51.934 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-11 05:13:51.934 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-11 05:13:51.939 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-11 05:13:51.940 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 05:13:51.940 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 05:13:51.941 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 05:13:52.103  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-11 05:13:52.104  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-11 05:13:52.104 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-11 05:13:52.104 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 05:13:52.108  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-11 05:13:52.108  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-11 05:13:52.109 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 05:13:52.109 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 05:13:52.109 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 05:13:52.110 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 05:13:52.110 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 05:13:52.110 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 05:13:52.111 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 05:13:52.111 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 05:13:52.111 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 05:13:52.112 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-11 05:13:52.115 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 34672119982458945247204711992345332681083974102
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 11 03:10:09 UTC 2022
           Final Date: Thu Jun 10 03:10:08 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1b:af:75:f9:e4:b5:11:8a:f4:09:13:7d:79:72:fd:9d:5c:9f:b4:dc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 97fd0ec6d5a6f0461e7251e26ec36270142f781c
                       25750957aaaff48c00833da5f23d2d52a88eba68
                       929b1a1ba1f0db79f3fe4969466936d4ccbeb82e
                       85bb752a8f007ff0cac7a440cdbbf4c72c0f6416
                       8110707f890b45096682b31a538410b7f8bf8abd
                       6b35b2bae8ed82784990aaa7f500f865cbb4cb15
                       b30e964bb3fcc3cef3a3b0a874cff6f000f89af2
                       0e321e9a7f81db7d3c9bc784457a974375c7cb90
                       5d7226bf882ae7c3bcc32bdbed03bec8ee03c9c7
                       ca5d56849a5c5d48d63120dd98c8a71689fbeb1e
                       b25cb580f364d48a69e7f7c6f56739303dd95dfd
                       18ebcd06dc05a5865d089ca584c80f8b04e88eda
                       d8bb2bbf4009e7e059618caea538a8165ad96b6e
                       ded11a542dd1e62d28ffdeebe2d9190456a2d021
                       bee91a5b6ec651cd5064cf4c443c0c2099a3a561
                       bd58031691426d6eed94a633782c0b962b642e24
                       0dce70e9aa5a0c3e24a8105e35b1d7adabe02a08
                       ad0c304a645c4776b29e0af3d94bab705ebe3da0
                       2e4a6bce5840e34b487898f147d186dd8a2cfe95
                       c8c34294
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a9:f7:78:31:3d:68:d7:10:db:f0:6e:19:7d:e7:a0:08:8d:bb:ac:53]
            modulus: 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
    public exponent: 10001

]