Results

By type

          2022-08-16 03:37:09,875 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-08-16 03:37:14,449 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-08-16 03:37:17.156  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Aug 16, 2022 3:37:24 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Aug 16, 2022 3:37:24 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Aug 16, 2022 3:37:24 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Aug 16, 2022 3:37:24 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-08-16 03:37:26.291 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-08-16 03:37:27.134  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-08-16 03:37:27.705  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-08-16 03:37:29.953 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-08-16 03:37:29.959 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-08-16 03:37:29.963 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-08-16 03:37:29.972 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-08-16 03:37:30.041 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-08-16 03:37:30.049 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-08-16 03:37:30.412 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-08-16 03:37:33.254 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Aug 16, 2022 3:37:35 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-08-16 03:37:36.166  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 29.464 seconds (JVM running for 35.694)
Aug 16, 2022 3:37:41 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-08-16 04:29:33.163  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-16 04:29:33.196 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-16 04:29:33.314 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-16 04:29:33.327 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-16 04:29:33.367  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-16 04:29:33.374  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-16 04:29:33.377  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-16 04:29:33.380 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-16 04:29:33.381 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-16 04:29:33.396 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-16 04:29:33.413 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-16 04:29:33.422 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-16 04:29:33.521 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-16 04:29:33.531 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-16 04:29:33.533 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-16 04:29:33.540 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-16 04:29:34.765  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-16 04:29:34.771  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-16 04:29:34.772 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-16 04:29:34.777 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-16 04:29:34.804  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-16 04:29:34.807  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-16 04:29:34.809 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 04:29:34.809 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 04:29:34.810 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 04:29:34.860 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 04:29:34.862 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 04:29:34.862 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 04:29:34.874 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 04:29:34.876 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 04:29:34.876 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 04:29:34.880 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-16 04:29:34.944 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 508995842759824130373074345084967789775120005572
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Aug 16 03:08:41 UTC 2022
           Final Date: Sun Aug 15 03:08:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2e:92:4f:1d:f1:4c:26:fc:65:12:0a:2c:31:56:58:6f:c8:32:b5:e1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 22a66986b90a81c88e96c56a6efba27015006035
                       e3bfb79b6f4bf0dbcb782fdf71b52674404c1ac2
                       e142df43ec03465275abb7ef6bf59ff88b456c4a
                       99d00ec9ed409f1f7a3d38fcc89d3dfdbc1fae40
                       5dba8387c7cf6bcbe7a3e527b413257b6c9fdc9c
                       836f287c453e8660873a16465260841ef53e334a
                       f3bc3a4700a43332fc91f45928696b0d187f27ef
                       ea1adbcf54cad204e2474f742e5815bd83436125
                       ad557bdc36edd9939f3eb7d4113b71a7fde73c1c
                       e65e0f4aa435a2418af6e3ebd02c0de36ac7d01d
                       cfdf0f0ae928b56a7e8cb84fb4fd793685d33178
                       cd5e815aed18acc06448ac75f396cd0ae7a00cc4
                       2e9b9db15a63a0af4ac1f9dfbf9fd8394b4a3546
                       b87d1d167d858a547e887ed09a70ba97b8433d7a
                       c1b72131e41bbf289903fce5165b3b7e57fe53ce
                       2b5dcb317cbbe22a0c4ddb7c1912535362450849
                       6e1c1fb7eab23c5d93e9174e7c1bec34d231d327
                       9d64e298175bbf0c880ad7a894a3af19fd4149b9
                       40450b511427909665df976d1e236a88596f6d60
                       691e38ed
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7c:52:bd:f6:86:34:0c:d6:0f:70:bb:f2:7d:b5:48:99:6d:41:20:ee]
            modulus: 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
    public exponent: 10001

] 
2022-08-16 04:32:34.604  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-16 04:32:34.611 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-16 04:32:34.615 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-16 04:32:34.621 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-16 04:32:34.625  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-16 04:32:34.629  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-16 04:32:34.643  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-16 04:32:34.644 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-16 04:32:34.645 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-16 04:32:34.646 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-16 04:32:34.722 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-16 04:32:34.726 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-16 04:32:34.731 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-16 04:32:34.732 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-16 04:32:35.001  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-16 04:32:35.003  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-16 04:32:35.003 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-16 04:32:35.004 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-16 04:32:35.078  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-16 04:32:35.081  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-16 04:32:35.082 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 04:32:35.083 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 04:32:35.096 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 04:32:35.109 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 04:32:35.110 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 04:32:35.111 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 04:32:35.115 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 04:32:35.116 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 04:32:35.119 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 04:32:35.144 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-16 04:32:35.167 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 508995842759824130373074345084967789775120005572
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Aug 16 03:08:41 UTC 2022
           Final Date: Sun Aug 15 03:08:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2e:92:4f:1d:f1:4c:26:fc:65:12:0a:2c:31:56:58:6f:c8:32:b5:e1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 22a66986b90a81c88e96c56a6efba27015006035
                       e3bfb79b6f4bf0dbcb782fdf71b52674404c1ac2
                       e142df43ec03465275abb7ef6bf59ff88b456c4a
                       99d00ec9ed409f1f7a3d38fcc89d3dfdbc1fae40
                       5dba8387c7cf6bcbe7a3e527b413257b6c9fdc9c
                       836f287c453e8660873a16465260841ef53e334a
                       f3bc3a4700a43332fc91f45928696b0d187f27ef
                       ea1adbcf54cad204e2474f742e5815bd83436125
                       ad557bdc36edd9939f3eb7d4113b71a7fde73c1c
                       e65e0f4aa435a2418af6e3ebd02c0de36ac7d01d
                       cfdf0f0ae928b56a7e8cb84fb4fd793685d33178
                       cd5e815aed18acc06448ac75f396cd0ae7a00cc4
                       2e9b9db15a63a0af4ac1f9dfbf9fd8394b4a3546
                       b87d1d167d858a547e887ed09a70ba97b8433d7a
                       c1b72131e41bbf289903fce5165b3b7e57fe53ce
                       2b5dcb317cbbe22a0c4ddb7c1912535362450849
                       6e1c1fb7eab23c5d93e9174e7c1bec34d231d327
                       9d64e298175bbf0c880ad7a894a3af19fd4149b9
                       40450b511427909665df976d1e236a88596f6d60
                       691e38ed
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [58:5d:e3:3b:f8:c2:f0:23:25:f5:97:77:e1:f9:58:1e:58:12:51:23]
            modulus: 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
    public exponent: 10001

] 
2022-08-16 04:33:53.458  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-16 04:33:53.461 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-16 04:33:53.466 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-08-16 04:33:53.469 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-16 04:33:53.471  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-08-16 04:33:53.485  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-16 04:33:53.486  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-16 04:33:53.487 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-16 04:33:53.488 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-16 04:33:53.502 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-16 04:33:53.521 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-16 04:33:53.531 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-16 04:33:53.532 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-16 04:33:53.533 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-16 04:33:53.729  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-16 04:33:53.730  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-16 04:33:53.731 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-16 04:33:53.731 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-16 04:33:53.734  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-16 04:33:53.735  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-16 04:33:53.737 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 04:33:53.738 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 04:33:53.738 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 04:33:53.740 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 04:33:53.741 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 04:33:53.742 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 04:33:53.744 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 04:33:53.745 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 04:33:53.746 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 04:33:53.748 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-16 04:33:53.761 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 508995842759824130373074345084967789775120005572
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Aug 16 03:08:41 UTC 2022
           Final Date: Sun Aug 15 03:08:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2e:92:4f:1d:f1:4c:26:fc:65:12:0a:2c:31:56:58:6f:c8:32:b5:e1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 22a66986b90a81c88e96c56a6efba27015006035
                       e3bfb79b6f4bf0dbcb782fdf71b52674404c1ac2
                       e142df43ec03465275abb7ef6bf59ff88b456c4a
                       99d00ec9ed409f1f7a3d38fcc89d3dfdbc1fae40
                       5dba8387c7cf6bcbe7a3e527b413257b6c9fdc9c
                       836f287c453e8660873a16465260841ef53e334a
                       f3bc3a4700a43332fc91f45928696b0d187f27ef
                       ea1adbcf54cad204e2474f742e5815bd83436125
                       ad557bdc36edd9939f3eb7d4113b71a7fde73c1c
                       e65e0f4aa435a2418af6e3ebd02c0de36ac7d01d
                       cfdf0f0ae928b56a7e8cb84fb4fd793685d33178
                       cd5e815aed18acc06448ac75f396cd0ae7a00cc4
                       2e9b9db15a63a0af4ac1f9dfbf9fd8394b4a3546
                       b87d1d167d858a547e887ed09a70ba97b8433d7a
                       c1b72131e41bbf289903fce5165b3b7e57fe53ce
                       2b5dcb317cbbe22a0c4ddb7c1912535362450849
                       6e1c1fb7eab23c5d93e9174e7c1bec34d231d327
                       9d64e298175bbf0c880ad7a894a3af19fd4149b9
                       40450b511427909665df976d1e236a88596f6d60
                       691e38ed
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d2:d9:72:e5:ce:2b:5d:34:27:39:54:8c:a3:73:ae:58:bd:c9:20:79]
            modulus: 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
    public exponent: 10001

] 
2022-08-16 04:35:44.409  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-16 04:35:44.411 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-16 04:35:44.413 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-16 04:35:44.414 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-16 04:35:44.415  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-16 04:35:44.418  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-16 04:35:44.419  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-16 04:35:44.420 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-16 04:35:44.439 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-16 04:35:44.440 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-16 04:35:44.452 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-16 04:35:44.454 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-16 04:35:44.458 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-16 04:35:44.459 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-16 04:35:44.699  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-16 04:35:44.700  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-16 04:35:44.701 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-16 04:35:44.701 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-16 04:35:44.705  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-16 04:35:44.705  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-16 04:35:44.706 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 04:35:44.707 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 04:35:44.707 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 04:35:44.708 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 04:35:44.709 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 04:35:44.709 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 04:35:44.710 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 04:35:44.711 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 04:35:44.711 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 04:35:44.713 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-16 04:35:44.723 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 508995842759824130373074345084967789775120005572
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Aug 16 03:08:41 UTC 2022
           Final Date: Sun Aug 15 03:08:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2e:92:4f:1d:f1:4c:26:fc:65:12:0a:2c:31:56:58:6f:c8:32:b5:e1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 22a66986b90a81c88e96c56a6efba27015006035
                       e3bfb79b6f4bf0dbcb782fdf71b52674404c1ac2
                       e142df43ec03465275abb7ef6bf59ff88b456c4a
                       99d00ec9ed409f1f7a3d38fcc89d3dfdbc1fae40
                       5dba8387c7cf6bcbe7a3e527b413257b6c9fdc9c
                       836f287c453e8660873a16465260841ef53e334a
                       f3bc3a4700a43332fc91f45928696b0d187f27ef
                       ea1adbcf54cad204e2474f742e5815bd83436125
                       ad557bdc36edd9939f3eb7d4113b71a7fde73c1c
                       e65e0f4aa435a2418af6e3ebd02c0de36ac7d01d
                       cfdf0f0ae928b56a7e8cb84fb4fd793685d33178
                       cd5e815aed18acc06448ac75f396cd0ae7a00cc4
                       2e9b9db15a63a0af4ac1f9dfbf9fd8394b4a3546
                       b87d1d167d858a547e887ed09a70ba97b8433d7a
                       c1b72131e41bbf289903fce5165b3b7e57fe53ce
                       2b5dcb317cbbe22a0c4ddb7c1912535362450849
                       6e1c1fb7eab23c5d93e9174e7c1bec34d231d327
                       9d64e298175bbf0c880ad7a894a3af19fd4149b9
                       40450b511427909665df976d1e236a88596f6d60
                       691e38ed
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a4:b6:70:d3:2c:61:58:ec:4c:1a:d1:26:bf:da:c7:06:1d:61:ad:b8]
            modulus: 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
    public exponent: 10001

] 
2022-08-16 04:39:10.923  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-16 04:39:10.927 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-16 04:39:10.937 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-08-16 04:39:10.939 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-16 04:39:10.943  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-08-16 04:39:10.944  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-16 04:39:10.945  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-16 04:39:10.946 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-16 04:39:10.947 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-16 04:39:10.948 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-16 04:39:10.958 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-16 04:39:10.959 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-16 04:39:10.960 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-16 04:39:10.960 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-16 04:39:11.209  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-16 04:39:11.211  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-16 04:39:11.212 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-16 04:39:11.213 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-16 04:39:11.222  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-16 04:39:11.224  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-16 04:39:11.228 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 04:39:11.229 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 04:39:11.230 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 04:39:11.232 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 04:39:11.233 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 04:39:11.238 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 04:39:11.247 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 04:39:11.256 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 04:39:11.256 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 04:39:11.258 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-16 04:39:11.265 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 508995842759824130373074345084967789775120005572
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Aug 16 03:08:41 UTC 2022
           Final Date: Sun Aug 15 03:08:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2e:92:4f:1d:f1:4c:26:fc:65:12:0a:2c:31:56:58:6f:c8:32:b5:e1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 22a66986b90a81c88e96c56a6efba27015006035
                       e3bfb79b6f4bf0dbcb782fdf71b52674404c1ac2
                       e142df43ec03465275abb7ef6bf59ff88b456c4a
                       99d00ec9ed409f1f7a3d38fcc89d3dfdbc1fae40
                       5dba8387c7cf6bcbe7a3e527b413257b6c9fdc9c
                       836f287c453e8660873a16465260841ef53e334a
                       f3bc3a4700a43332fc91f45928696b0d187f27ef
                       ea1adbcf54cad204e2474f742e5815bd83436125
                       ad557bdc36edd9939f3eb7d4113b71a7fde73c1c
                       e65e0f4aa435a2418af6e3ebd02c0de36ac7d01d
                       cfdf0f0ae928b56a7e8cb84fb4fd793685d33178
                       cd5e815aed18acc06448ac75f396cd0ae7a00cc4
                       2e9b9db15a63a0af4ac1f9dfbf9fd8394b4a3546
                       b87d1d167d858a547e887ed09a70ba97b8433d7a
                       c1b72131e41bbf289903fce5165b3b7e57fe53ce
                       2b5dcb317cbbe22a0c4ddb7c1912535362450849
                       6e1c1fb7eab23c5d93e9174e7c1bec34d231d327
                       9d64e298175bbf0c880ad7a894a3af19fd4149b9
                       40450b511427909665df976d1e236a88596f6d60
                       691e38ed
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0c:2f:79:2d:e7:f2:6a:3c:58:1b:06:71:70:33:9c:11:64:02:39:a4]
            modulus: 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
    public exponent: 10001

] 
2022-08-16 04:41:15.286  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-16 04:41:15.296 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-16 04:41:15.299 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-16 04:41:15.301 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-16 04:41:15.301  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-16 04:41:15.302  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-16 04:41:15.303  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-16 04:41:15.304 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-16 04:41:15.304 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-16 04:41:15.305 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-16 04:41:15.320 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-16 04:41:15.321 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-16 04:41:15.322 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-16 04:41:15.322 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-16 04:41:15.581  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-16 04:41:15.583  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-16 04:41:15.583 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-16 04:41:15.584 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-16 04:41:15.587  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-16 04:41:15.587  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-16 04:41:15.589 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 04:41:15.590 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 04:41:15.591 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 04:41:15.594 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 04:41:15.595 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 04:41:15.596 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 04:41:15.597 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 04:41:15.598 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 04:41:15.600 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 04:41:15.602 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-16 04:41:15.609 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 508995842759824130373074345084967789775120005572
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Aug 16 03:08:41 UTC 2022
           Final Date: Sun Aug 15 03:08:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2e:92:4f:1d:f1:4c:26:fc:65:12:0a:2c:31:56:58:6f:c8:32:b5:e1]
            modulus: 9499350fe1a846ce58f63accc396a19c18b5ef7fb53b61467af929bdfccac02a5e13c3da7a8f26c51f0bd30b615c1f789bc2d8d652773c7640deb6fcd03169f099e10d03d7d08904a24c4871393af2e653e1698a1d3a77bfe646ce7086db25c89f5e3949498d55d8dbba5293362bd94fd5a631567a92a98b99df15c684011d8b8dfbe0c692cc748ac97fd95dc3c721de488add0489780eef310d1a507806dc19199833a6cda2b3f2d6d9c55ad2bec55f98b5809977be25a9b36586ded1090ae2206efdde3427e694d326afd64bdd55c97a4ed1182b17029fcc16d5556070e041227fbad1b459da82a53ebd54707e1f55e6d25302a0dcebaf0fa8685e2d0da9160be19272eeab1055a805c7dec4b5b17f82e1149a82a7222d118565d77104cda6e4cca17ef06e2a057f7fd24ebf36a10b4b534495ee1794a29d1e5672a541dcfd5ced6ec62b0a25bfc72d395c10ce90f89d35a4a56600ab758a406015623432c43c6ef9d39fc5b90822911adbb285c86e81c877fc54b1773f2173e2d43b720a5f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 22a66986b90a81c88e96c56a6efba27015006035
                       e3bfb79b6f4bf0dbcb782fdf71b52674404c1ac2
                       e142df43ec03465275abb7ef6bf59ff88b456c4a
                       99d00ec9ed409f1f7a3d38fcc89d3dfdbc1fae40
                       5dba8387c7cf6bcbe7a3e527b413257b6c9fdc9c
                       836f287c453e8660873a16465260841ef53e334a
                       f3bc3a4700a43332fc91f45928696b0d187f27ef
                       ea1adbcf54cad204e2474f742e5815bd83436125
                       ad557bdc36edd9939f3eb7d4113b71a7fde73c1c
                       e65e0f4aa435a2418af6e3ebd02c0de36ac7d01d
                       cfdf0f0ae928b56a7e8cb84fb4fd793685d33178
                       cd5e815aed18acc06448ac75f396cd0ae7a00cc4
                       2e9b9db15a63a0af4ac1f9dfbf9fd8394b4a3546
                       b87d1d167d858a547e887ed09a70ba97b8433d7a
                       c1b72131e41bbf289903fce5165b3b7e57fe53ce
                       2b5dcb317cbbe22a0c4ddb7c1912535362450849
                       6e1c1fb7eab23c5d93e9174e7c1bec34d231d327
                       9d64e298175bbf0c880ad7a894a3af19fd4149b9
                       40450b511427909665df976d1e236a88596f6d60
                       691e38ed
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c9:c6:2e:1d:e4:4f:79:2c:67:ca:ad:fb:65:47:c6:c0:cd:3b:88:7c]
            modulus: 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
    public exponent: 10001

] 
2022-08-16 04:45:21.448  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-16 04:45:21.452 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-16 04:45:21.466 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-16 04:45:21.469 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-16 04:45:21.470  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-16 04:45:21.471  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-16 04:45:21.472  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-16 04:45:21.473 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-16 04:45:21.473 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-16 04:45:21.474 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-16 04:45:21.482 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-16 04:45:21.483 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-16 04:45:21.484 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-16 04:45:21.485 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-16 04:45:22.337  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-16 04:45:22.338  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-16 04:45:22.338 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-16 04:45:22.338 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-16 04:45:22.341  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-16 04:45:22.341  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-16 04:45:22.342 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 04:45:22.343 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 04:45:22.343 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 04:45:22.344 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 04:45:22.345 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 04:45:22.345 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 04:45:22.346 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 04:45:22.347 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 04:45:22.347 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 04:45:22.366 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-16 04:45:22.374 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 508995842759824130373074345084967789775120005572
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Aug 16 03:08:41 UTC 2022
           Final Date: Sun Aug 15 03:08:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2e:92:4f:1d:f1:4c:26:fc:65:12:0a:2c:31:56:58:6f:c8:32:b5:e1]
            modulus: 9499350fe1a846ce58f63accc396a19c18b5ef7fb53b61467af929bdfccac02a5e13c3da7a8f26c51f0bd30b615c1f789bc2d8d652773c7640deb6fcd03169f099e10d03d7d08904a24c4871393af2e653e1698a1d3a77bfe646ce7086db25c89f5e3949498d55d8dbba5293362bd94fd5a631567a92a98b99df15c684011d8b8dfbe0c692cc748ac97fd95dc3c721de488add0489780eef310d1a507806dc19199833a6cda2b3f2d6d9c55ad2bec55f98b5809977be25a9b36586ded1090ae2206efdde3427e694d326afd64bdd55c97a4ed1182b17029fcc16d5556070e041227fbad1b459da82a53ebd54707e1f55e6d25302a0dcebaf0fa8685e2d0da9160be19272eeab1055a805c7dec4b5b17f82e1149a82a7222d118565d77104cda6e4cca17ef06e2a057f7fd24ebf36a10b4b534495ee1794a29d1e5672a541dcfd5ced6ec62b0a25bfc72d395c10ce90f89d35a4a56600ab758a406015623432c43c6ef9d39fc5b90822911adbb285c86e81c877fc54b1773f2173e2d43b720a5f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 22a66986b90a81c88e96c56a6efba27015006035
                       e3bfb79b6f4bf0dbcb782fdf71b52674404c1ac2
                       e142df43ec03465275abb7ef6bf59ff88b456c4a
                       99d00ec9ed409f1f7a3d38fcc89d3dfdbc1fae40
                       5dba8387c7cf6bcbe7a3e527b413257b6c9fdc9c
                       836f287c453e8660873a16465260841ef53e334a
                       f3bc3a4700a43332fc91f45928696b0d187f27ef
                       ea1adbcf54cad204e2474f742e5815bd83436125
                       ad557bdc36edd9939f3eb7d4113b71a7fde73c1c
                       e65e0f4aa435a2418af6e3ebd02c0de36ac7d01d
                       cfdf0f0ae928b56a7e8cb84fb4fd793685d33178
                       cd5e815aed18acc06448ac75f396cd0ae7a00cc4
                       2e9b9db15a63a0af4ac1f9dfbf9fd8394b4a3546
                       b87d1d167d858a547e887ed09a70ba97b8433d7a
                       c1b72131e41bbf289903fce5165b3b7e57fe53ce
                       2b5dcb317cbbe22a0c4ddb7c1912535362450849
                       6e1c1fb7eab23c5d93e9174e7c1bec34d231d327
                       9d64e298175bbf0c880ad7a894a3af19fd4149b9
                       40450b511427909665df976d1e236a88596f6d60
                       691e38ed
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [88:93:9d:8d:de:64:1c:d5:e8:13:b9:c4:d0:50:85:e0:ab:ee:54:ba]
            modulus: c49bc872222ecdd2de590ab9308aaa867ef7a3c1733334c5ed62ae63ee625a4b3f5f3df1227305ffe7a857363409364abb2ee64e786fa9f8e8fd4ed7736cade3a3bf1fb3f243d64a914034213822ad5a66566030f7a2ac0b61fd2c05a5e4818880fd86fee8d0f991ff684238f06d3bddbc1e1525875abbe6e82c2f367d338ceaa449d2e9d0c17dff14a14e7c023fb962d26e8e3289e1d943cb2b41d0c257a65a619a86b1232dca540e53cd8aa3fe9ad52362911e2acd271e300bb7d2aad1d3128b14464686686d1ee1ce6413a6a7a56ba405559c40dd95eaae660c9b8db8d308bb69fa75b1c2080657fc1a80f8f80efc9717db406ab41ce39307e9ec56100e27
    public exponent: 10001

] 
2022-08-16 04:47:29.909  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-16 04:47:29.912 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-16 04:47:29.914 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-08-16 04:47:29.929 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-16 04:47:29.941  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-08-16 04:47:29.942  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-16 04:47:29.943  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-16 04:47:29.943 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-16 04:47:29.944 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-16 04:47:29.945 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-16 04:47:29.962 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-16 04:47:29.965 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-16 04:47:29.965 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-16 04:47:29.966 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-16 04:47:30.360  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-16 04:47:30.361  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-16 04:47:30.362 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-16 04:47:30.362 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-16 04:47:30.365  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-16 04:47:30.365  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-16 04:47:30.366 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 04:47:30.366 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 04:47:30.366 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 04:47:30.367 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 04:47:30.368 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 04:47:30.368 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 04:47:30.369 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 04:47:30.369 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 04:47:30.370 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 04:47:30.371 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-16 04:47:30.378 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 508995842759824130373074345084967789775120005572
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Aug 16 03:08:41 UTC 2022
           Final Date: Sun Aug 15 03:08:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2e:92:4f:1d:f1:4c:26:fc:65:12:0a:2c:31:56:58:6f:c8:32:b5:e1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 22a66986b90a81c88e96c56a6efba27015006035
                       e3bfb79b6f4bf0dbcb782fdf71b52674404c1ac2
                       e142df43ec03465275abb7ef6bf59ff88b456c4a
                       99d00ec9ed409f1f7a3d38fcc89d3dfdbc1fae40
                       5dba8387c7cf6bcbe7a3e527b413257b6c9fdc9c
                       836f287c453e8660873a16465260841ef53e334a
                       f3bc3a4700a43332fc91f45928696b0d187f27ef
                       ea1adbcf54cad204e2474f742e5815bd83436125
                       ad557bdc36edd9939f3eb7d4113b71a7fde73c1c
                       e65e0f4aa435a2418af6e3ebd02c0de36ac7d01d
                       cfdf0f0ae928b56a7e8cb84fb4fd793685d33178
                       cd5e815aed18acc06448ac75f396cd0ae7a00cc4
                       2e9b9db15a63a0af4ac1f9dfbf9fd8394b4a3546
                       b87d1d167d858a547e887ed09a70ba97b8433d7a
                       c1b72131e41bbf289903fce5165b3b7e57fe53ce
                       2b5dcb317cbbe22a0c4ddb7c1912535362450849
                       6e1c1fb7eab23c5d93e9174e7c1bec34d231d327
                       9d64e298175bbf0c880ad7a894a3af19fd4149b9
                       40450b511427909665df976d1e236a88596f6d60
                       691e38ed
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cb:58:ee:16:37:43:21:33:c6:0a:c8:be:c9:32:29:09:76:22:f4:56]
            modulus: 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
    public exponent: 10001

] 
2022-08-16 04:51:34.963  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-16 04:51:34.967 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-16 04:51:34.971 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-16 04:51:34.973 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-16 04:51:34.973  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-16 04:51:34.974  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-16 04:51:34.975  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-16 04:51:34.975 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-16 04:51:34.976 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-16 04:51:34.976 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-16 04:51:35.001 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-16 04:51:35.003 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-16 04:51:35.003 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-16 04:51:35.006 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-16 04:51:35.256  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-16 04:51:35.257  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-16 04:51:35.258 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-16 04:51:35.264 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-16 04:51:35.269  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-16 04:51:35.270  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-16 04:51:35.271 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 04:51:35.272 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 04:51:35.272 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 04:51:35.273 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 04:51:35.273 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 04:51:35.274 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 04:51:35.275 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 04:51:35.276 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 04:51:35.276 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 04:51:35.277 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-16 04:51:35.286 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 508995842759824130373074345084967789775120005572
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Aug 16 03:08:41 UTC 2022
           Final Date: Sun Aug 15 03:08:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2e:92:4f:1d:f1:4c:26:fc:65:12:0a:2c:31:56:58:6f:c8:32:b5:e1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 22a66986b90a81c88e96c56a6efba27015006035
                       e3bfb79b6f4bf0dbcb782fdf71b52674404c1ac2
                       e142df43ec03465275abb7ef6bf59ff88b456c4a
                       99d00ec9ed409f1f7a3d38fcc89d3dfdbc1fae40
                       5dba8387c7cf6bcbe7a3e527b413257b6c9fdc9c
                       836f287c453e8660873a16465260841ef53e334a
                       f3bc3a4700a43332fc91f45928696b0d187f27ef
                       ea1adbcf54cad204e2474f742e5815bd83436125
                       ad557bdc36edd9939f3eb7d4113b71a7fde73c1c
                       e65e0f4aa435a2418af6e3ebd02c0de36ac7d01d
                       cfdf0f0ae928b56a7e8cb84fb4fd793685d33178
                       cd5e815aed18acc06448ac75f396cd0ae7a00cc4
                       2e9b9db15a63a0af4ac1f9dfbf9fd8394b4a3546
                       b87d1d167d858a547e887ed09a70ba97b8433d7a
                       c1b72131e41bbf289903fce5165b3b7e57fe53ce
                       2b5dcb317cbbe22a0c4ddb7c1912535362450849
                       6e1c1fb7eab23c5d93e9174e7c1bec34d231d327
                       9d64e298175bbf0c880ad7a894a3af19fd4149b9
                       40450b511427909665df976d1e236a88596f6d60
                       691e38ed
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f0:17:ae:d7:2b:05:a6:ee:f1:f7:5a:c7:c9:ca:31:a0:9e:26:ed:a7]
            modulus: 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
    public exponent: 10001

] 
2022-08-16 04:53:39.312  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-16 04:53:39.319 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-16 04:53:39.322 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-08-16 04:53:39.323 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-16 04:53:39.324  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-08-16 04:53:39.326  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-16 04:53:39.326  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-16 04:53:39.327 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-16 04:53:39.328 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-16 04:53:39.329 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-16 04:53:39.340 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-16 04:53:39.342 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-16 04:53:39.343 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-16 04:53:39.344 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-16 04:53:39.652  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-16 04:53:39.653  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-16 04:53:39.654 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-16 04:53:39.654 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-16 04:53:39.705  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-16 04:53:39.707  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-16 04:53:39.708 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 04:53:39.709 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 04:53:39.709 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 04:53:39.711 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 04:53:39.711 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 04:53:39.712 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 04:53:39.713 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 04:53:39.713 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 04:53:39.714 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 04:53:39.716 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-16 04:53:39.735 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 508995842759824130373074345084967789775120005572
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Aug 16 03:08:41 UTC 2022
           Final Date: Sun Aug 15 03:08:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2e:92:4f:1d:f1:4c:26:fc:65:12:0a:2c:31:56:58:6f:c8:32:b5:e1]
            modulus: 9499350fe1a846ce58f63accc396a19c18b5ef7fb53b61467af929bdfccac02a5e13c3da7a8f26c51f0bd30b615c1f789bc2d8d652773c7640deb6fcd03169f099e10d03d7d08904a24c4871393af2e653e1698a1d3a77bfe646ce7086db25c89f5e3949498d55d8dbba5293362bd94fd5a631567a92a98b99df15c684011d8b8dfbe0c692cc748ac97fd95dc3c721de488add0489780eef310d1a507806dc19199833a6cda2b3f2d6d9c55ad2bec55f98b5809977be25a9b36586ded1090ae2206efdde3427e694d326afd64bdd55c97a4ed1182b17029fcc16d5556070e041227fbad1b459da82a53ebd54707e1f55e6d25302a0dcebaf0fa8685e2d0da9160be19272eeab1055a805c7dec4b5b17f82e1149a82a7222d118565d77104cda6e4cca17ef06e2a057f7fd24ebf36a10b4b534495ee1794a29d1e5672a541dcfd5ced6ec62b0a25bfc72d395c10ce90f89d35a4a56600ab758a406015623432c43c6ef9d39fc5b90822911adbb285c86e81c877fc54b1773f2173e2d43b720a5f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 22a66986b90a81c88e96c56a6efba27015006035
                       e3bfb79b6f4bf0dbcb782fdf71b52674404c1ac2
                       e142df43ec03465275abb7ef6bf59ff88b456c4a
                       99d00ec9ed409f1f7a3d38fcc89d3dfdbc1fae40
                       5dba8387c7cf6bcbe7a3e527b413257b6c9fdc9c
                       836f287c453e8660873a16465260841ef53e334a
                       f3bc3a4700a43332fc91f45928696b0d187f27ef
                       ea1adbcf54cad204e2474f742e5815bd83436125
                       ad557bdc36edd9939f3eb7d4113b71a7fde73c1c
                       e65e0f4aa435a2418af6e3ebd02c0de36ac7d01d
                       cfdf0f0ae928b56a7e8cb84fb4fd793685d33178
                       cd5e815aed18acc06448ac75f396cd0ae7a00cc4
                       2e9b9db15a63a0af4ac1f9dfbf9fd8394b4a3546
                       b87d1d167d858a547e887ed09a70ba97b8433d7a
                       c1b72131e41bbf289903fce5165b3b7e57fe53ce
                       2b5dcb317cbbe22a0c4ddb7c1912535362450849
                       6e1c1fb7eab23c5d93e9174e7c1bec34d231d327
                       9d64e298175bbf0c880ad7a894a3af19fd4149b9
                       40450b511427909665df976d1e236a88596f6d60
                       691e38ed
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6d:7a:e2:fe:57:bb:36:4b:ec:93:6e:c5:6b:9b:e0:2b:07:40:69:6c]
            modulus: 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
    public exponent: 10001

] 
2022-08-16 04:54:09.302  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-16 04:54:09.303 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-16 04:54:09.305 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-08-16 04:54:09.306 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-16 04:54:09.306  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-08-16 04:54:09.307  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-16 04:54:09.307  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-16 04:54:09.307 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-16 04:54:09.308 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-16 04:54:09.308 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-16 04:54:09.314 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-16 04:54:09.317 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-16 04:54:09.318 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-16 04:54:09.318 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-16 04:54:09.578  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-16 04:54:09.579  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-16 04:54:09.581 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-16 04:54:09.581 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-16 04:54:09.583  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-16 04:54:09.583  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-16 04:54:09.584 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 04:54:09.585 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 04:54:09.585 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 04:54:09.586 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 04:54:09.586 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 04:54:09.586 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 04:54:09.587 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 04:54:09.587 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 04:54:09.588 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 04:54:09.589 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-16 04:54:09.594 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 508995842759824130373074345084967789775120005572
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Aug 16 03:08:41 UTC 2022
           Final Date: Sun Aug 15 03:08:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2e:92:4f:1d:f1:4c:26:fc:65:12:0a:2c:31:56:58:6f:c8:32:b5:e1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 22a66986b90a81c88e96c56a6efba27015006035
                       e3bfb79b6f4bf0dbcb782fdf71b52674404c1ac2
                       e142df43ec03465275abb7ef6bf59ff88b456c4a
                       99d00ec9ed409f1f7a3d38fcc89d3dfdbc1fae40
                       5dba8387c7cf6bcbe7a3e527b413257b6c9fdc9c
                       836f287c453e8660873a16465260841ef53e334a
                       f3bc3a4700a43332fc91f45928696b0d187f27ef
                       ea1adbcf54cad204e2474f742e5815bd83436125
                       ad557bdc36edd9939f3eb7d4113b71a7fde73c1c
                       e65e0f4aa435a2418af6e3ebd02c0de36ac7d01d
                       cfdf0f0ae928b56a7e8cb84fb4fd793685d33178
                       cd5e815aed18acc06448ac75f396cd0ae7a00cc4
                       2e9b9db15a63a0af4ac1f9dfbf9fd8394b4a3546
                       b87d1d167d858a547e887ed09a70ba97b8433d7a
                       c1b72131e41bbf289903fce5165b3b7e57fe53ce
                       2b5dcb317cbbe22a0c4ddb7c1912535362450849
                       6e1c1fb7eab23c5d93e9174e7c1bec34d231d327
                       9d64e298175bbf0c880ad7a894a3af19fd4149b9
                       40450b511427909665df976d1e236a88596f6d60
                       691e38ed
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [90:e1:7e:17:ca:e5:3e:f6:09:35:a8:57:fe:d7:7b:a1:a5:0b:86:25]
            modulus: a6545a350df375b0cc5fb8fcc69a0ea5ed22b35db076e7db2c89c16072824c83f04012506281095744677a01798d16564353b6ddce8a1edc8600c3c2154456f2bf83c5fbec82b92dfb205fcd99433698bce18cd0c374a685bf2c1a6bfa28ff203643661c7a3f44632e0d2337f7a03e7f307c01b36cdf71fefa5f9040e425d1cc9c755ea2eac8c13fbf8122365deb759af54e1e9fa02a0c213e1f21c4abd07856528a9af70a184057654931111ffc0beb1bdc017eb2cafedb4c8b2c53a664bda9d85e5fb837470e4631df57dc3570161ddecc3178393f91957da26aacb52885d739fd9235dc65102c48b5ea67223c52217a65df64bdd3c72bf757b7f587971ae3
    public exponent: 10001

] 
2022-08-16 04:56:07.168  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-16 04:56:07.172 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-16 04:56:07.174 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-16 04:56:07.176 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-16 04:56:07.177  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-16 04:56:07.178  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-16 04:56:07.178  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-16 04:56:07.185 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-16 04:56:07.186 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-16 04:56:07.187 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-16 04:56:07.194 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-16 04:56:07.195 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-16 04:56:07.196 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-16 04:56:07.196 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-16 04:56:07.421  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-16 04:56:07.422  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-16 04:56:07.422 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-16 04:56:07.423 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-16 04:56:07.425  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-16 04:56:07.426  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-16 04:56:07.426 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 04:56:07.426 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 04:56:07.427 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 04:56:07.428 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 04:56:07.428 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 04:56:07.428 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 04:56:07.429 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 04:56:07.429 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 04:56:07.429 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 04:56:07.430 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-16 04:56:07.434 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 508995842759824130373074345084967789775120005572
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Aug 16 03:08:41 UTC 2022
           Final Date: Sun Aug 15 03:08:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2e:92:4f:1d:f1:4c:26:fc:65:12:0a:2c:31:56:58:6f:c8:32:b5:e1]
            modulus: 9499350fe1a846ce58f63accc396a19c18b5ef7fb53b61467af929bdfccac02a5e13c3da7a8f26c51f0bd30b615c1f789bc2d8d652773c7640deb6fcd03169f099e10d03d7d08904a24c4871393af2e653e1698a1d3a77bfe646ce7086db25c89f5e3949498d55d8dbba5293362bd94fd5a631567a92a98b99df15c684011d8b8dfbe0c692cc748ac97fd95dc3c721de488add0489780eef310d1a507806dc19199833a6cda2b3f2d6d9c55ad2bec55f98b5809977be25a9b36586ded1090ae2206efdde3427e694d326afd64bdd55c97a4ed1182b17029fcc16d5556070e041227fbad1b459da82a53ebd54707e1f55e6d25302a0dcebaf0fa8685e2d0da9160be19272eeab1055a805c7dec4b5b17f82e1149a82a7222d118565d77104cda6e4cca17ef06e2a057f7fd24ebf36a10b4b534495ee1794a29d1e5672a541dcfd5ced6ec62b0a25bfc72d395c10ce90f89d35a4a56600ab758a406015623432c43c6ef9d39fc5b90822911adbb285c86e81c877fc54b1773f2173e2d43b720a5f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 22a66986b90a81c88e96c56a6efba27015006035
                       e3bfb79b6f4bf0dbcb782fdf71b52674404c1ac2
                       e142df43ec03465275abb7ef6bf59ff88b456c4a
                       99d00ec9ed409f1f7a3d38fcc89d3dfdbc1fae40
                       5dba8387c7cf6bcbe7a3e527b413257b6c9fdc9c
                       836f287c453e8660873a16465260841ef53e334a
                       f3bc3a4700a43332fc91f45928696b0d187f27ef
                       ea1adbcf54cad204e2474f742e5815bd83436125
                       ad557bdc36edd9939f3eb7d4113b71a7fde73c1c
                       e65e0f4aa435a2418af6e3ebd02c0de36ac7d01d
                       cfdf0f0ae928b56a7e8cb84fb4fd793685d33178
                       cd5e815aed18acc06448ac75f396cd0ae7a00cc4
                       2e9b9db15a63a0af4ac1f9dfbf9fd8394b4a3546
                       b87d1d167d858a547e887ed09a70ba97b8433d7a
                       c1b72131e41bbf289903fce5165b3b7e57fe53ce
                       2b5dcb317cbbe22a0c4ddb7c1912535362450849
                       6e1c1fb7eab23c5d93e9174e7c1bec34d231d327
                       9d64e298175bbf0c880ad7a894a3af19fd4149b9
                       40450b511427909665df976d1e236a88596f6d60
                       691e38ed
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [21:46:34:98:81:99:b5:0c:d6:5b:a7:7a:13:63:1f:38:b0:14:b0:75]
            modulus: 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
    public exponent: 10001

] 
2022-08-16 05:01:52.121  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-16 05:01:52.152 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-16 05:01:52.162 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-16 05:01:52.164 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-16 05:01:52.165  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-16 05:01:52.166  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-16 05:01:52.166  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-16 05:01:52.167 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-16 05:01:52.168 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-16 05:01:52.168 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-16 05:01:52.190 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-16 05:01:52.192 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-16 05:01:52.195 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-16 05:01:52.195 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-16 05:01:52.714  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-16 05:01:52.720  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-16 05:01:52.721 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-16 05:01:52.722 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-16 05:01:52.726  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-16 05:01:52.732  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-16 05:01:52.733 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 05:01:52.733 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 05:01:52.734 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 05:01:52.741 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 05:01:52.742 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 05:01:52.742 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 05:01:52.743 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 05:01:52.744 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 05:01:52.744 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 05:01:52.745 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-16 05:01:52.752 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 508995842759824130373074345084967789775120005572
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Aug 16 03:08:41 UTC 2022
           Final Date: Sun Aug 15 03:08:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2e:92:4f:1d:f1:4c:26:fc:65:12:0a:2c:31:56:58:6f:c8:32:b5:e1]
            modulus: 9499350fe1a846ce58f63accc396a19c18b5ef7fb53b61467af929bdfccac02a5e13c3da7a8f26c51f0bd30b615c1f789bc2d8d652773c7640deb6fcd03169f099e10d03d7d08904a24c4871393af2e653e1698a1d3a77bfe646ce7086db25c89f5e3949498d55d8dbba5293362bd94fd5a631567a92a98b99df15c684011d8b8dfbe0c692cc748ac97fd95dc3c721de488add0489780eef310d1a507806dc19199833a6cda2b3f2d6d9c55ad2bec55f98b5809977be25a9b36586ded1090ae2206efdde3427e694d326afd64bdd55c97a4ed1182b17029fcc16d5556070e041227fbad1b459da82a53ebd54707e1f55e6d25302a0dcebaf0fa8685e2d0da9160be19272eeab1055a805c7dec4b5b17f82e1149a82a7222d118565d77104cda6e4cca17ef06e2a057f7fd24ebf36a10b4b534495ee1794a29d1e5672a541dcfd5ced6ec62b0a25bfc72d395c10ce90f89d35a4a56600ab758a406015623432c43c6ef9d39fc5b90822911adbb285c86e81c877fc54b1773f2173e2d43b720a5f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 22a66986b90a81c88e96c56a6efba27015006035
                       e3bfb79b6f4bf0dbcb782fdf71b52674404c1ac2
                       e142df43ec03465275abb7ef6bf59ff88b456c4a
                       99d00ec9ed409f1f7a3d38fcc89d3dfdbc1fae40
                       5dba8387c7cf6bcbe7a3e527b413257b6c9fdc9c
                       836f287c453e8660873a16465260841ef53e334a
                       f3bc3a4700a43332fc91f45928696b0d187f27ef
                       ea1adbcf54cad204e2474f742e5815bd83436125
                       ad557bdc36edd9939f3eb7d4113b71a7fde73c1c
                       e65e0f4aa435a2418af6e3ebd02c0de36ac7d01d
                       cfdf0f0ae928b56a7e8cb84fb4fd793685d33178
                       cd5e815aed18acc06448ac75f396cd0ae7a00cc4
                       2e9b9db15a63a0af4ac1f9dfbf9fd8394b4a3546
                       b87d1d167d858a547e887ed09a70ba97b8433d7a
                       c1b72131e41bbf289903fce5165b3b7e57fe53ce
                       2b5dcb317cbbe22a0c4ddb7c1912535362450849
                       6e1c1fb7eab23c5d93e9174e7c1bec34d231d327
                       9d64e298175bbf0c880ad7a894a3af19fd4149b9
                       40450b511427909665df976d1e236a88596f6d60
                       691e38ed
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fd:1a:d5:64:a8:c9:ae:8a:ea:49:30:ca:b0:18:d0:0e:19:39:c3:c9]
            modulus: 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
    public exponent: 10001

] 
2022-08-16 05:07:19.888  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-16 05:07:19.892 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-16 05:07:19.900 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-16 05:07:19.910 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-16 05:07:19.911  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-16 05:07:19.912  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-16 05:07:19.912  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-16 05:07:19.913 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-16 05:07:19.914 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-16 05:07:19.914 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-16 05:07:19.941 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-16 05:07:19.942 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-16 05:07:19.943 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-16 05:07:19.943 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-16 05:07:20.242  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-16 05:07:20.243  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-16 05:07:20.243 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-16 05:07:20.244 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-16 05:07:20.246  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-16 05:07:20.247  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-16 05:07:20.247 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 05:07:20.249 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 05:07:20.249 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 05:07:20.250 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 05:07:20.252 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 05:07:20.252 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 05:07:20.254 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 05:07:20.254 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 05:07:20.254 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 05:07:20.268 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-16 05:07:20.284 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 508995842759824130373074345084967789775120005572
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Aug 16 03:08:41 UTC 2022
           Final Date: Sun Aug 15 03:08:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2e:92:4f:1d:f1:4c:26:fc:65:12:0a:2c:31:56:58:6f:c8:32:b5:e1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 22a66986b90a81c88e96c56a6efba27015006035
                       e3bfb79b6f4bf0dbcb782fdf71b52674404c1ac2
                       e142df43ec03465275abb7ef6bf59ff88b456c4a
                       99d00ec9ed409f1f7a3d38fcc89d3dfdbc1fae40
                       5dba8387c7cf6bcbe7a3e527b413257b6c9fdc9c
                       836f287c453e8660873a16465260841ef53e334a
                       f3bc3a4700a43332fc91f45928696b0d187f27ef
                       ea1adbcf54cad204e2474f742e5815bd83436125
                       ad557bdc36edd9939f3eb7d4113b71a7fde73c1c
                       e65e0f4aa435a2418af6e3ebd02c0de36ac7d01d
                       cfdf0f0ae928b56a7e8cb84fb4fd793685d33178
                       cd5e815aed18acc06448ac75f396cd0ae7a00cc4
                       2e9b9db15a63a0af4ac1f9dfbf9fd8394b4a3546
                       b87d1d167d858a547e887ed09a70ba97b8433d7a
                       c1b72131e41bbf289903fce5165b3b7e57fe53ce
                       2b5dcb317cbbe22a0c4ddb7c1912535362450849
                       6e1c1fb7eab23c5d93e9174e7c1bec34d231d327
                       9d64e298175bbf0c880ad7a894a3af19fd4149b9
                       40450b511427909665df976d1e236a88596f6d60
                       691e38ed
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [75:41:d0:23:f3:23:6e:51:96:63:28:aa:4c:11:3a:ff:e0:67:bb:bf]
            modulus: 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
    public exponent: 10001

] 
2022-08-16 05:12:31.786  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-16 05:12:31.791 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-16 05:12:31.793 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-16 05:12:31.794 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-16 05:12:31.795  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-16 05:12:31.796  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-16 05:12:31.796  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-16 05:12:31.797 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-16 05:12:31.797 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-16 05:12:31.797 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-16 05:12:31.804 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-16 05:12:31.805 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-16 05:12:31.806 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-16 05:12:31.806 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-16 05:12:32.081  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-16 05:12:32.081  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-16 05:12:32.082 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-16 05:12:32.082 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-16 05:12:32.085  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-16 05:12:32.086  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-16 05:12:32.086 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 05:12:32.087 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 05:12:32.087 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 05:12:32.088 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 05:12:32.089 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 05:12:32.089 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 05:12:32.090 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-16 05:12:32.090 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-16 05:12:32.092 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-16 05:12:32.093 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-16 05:12:32.100 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 508995842759824130373074345084967789775120005572
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Aug 16 03:08:41 UTC 2022
           Final Date: Sun Aug 15 03:08:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2e:92:4f:1d:f1:4c:26:fc:65:12:0a:2c:31:56:58:6f:c8:32:b5:e1]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 22a66986b90a81c88e96c56a6efba27015006035
                       e3bfb79b6f4bf0dbcb782fdf71b52674404c1ac2
                       e142df43ec03465275abb7ef6bf59ff88b456c4a
                       99d00ec9ed409f1f7a3d38fcc89d3dfdbc1fae40
                       5dba8387c7cf6bcbe7a3e527b413257b6c9fdc9c
                       836f287c453e8660873a16465260841ef53e334a
                       f3bc3a4700a43332fc91f45928696b0d187f27ef
                       ea1adbcf54cad204e2474f742e5815bd83436125
                       ad557bdc36edd9939f3eb7d4113b71a7fde73c1c
                       e65e0f4aa435a2418af6e3ebd02c0de36ac7d01d
                       cfdf0f0ae928b56a7e8cb84fb4fd793685d33178
                       cd5e815aed18acc06448ac75f396cd0ae7a00cc4
                       2e9b9db15a63a0af4ac1f9dfbf9fd8394b4a3546
                       b87d1d167d858a547e887ed09a70ba97b8433d7a
                       c1b72131e41bbf289903fce5165b3b7e57fe53ce
                       2b5dcb317cbbe22a0c4ddb7c1912535362450849
                       6e1c1fb7eab23c5d93e9174e7c1bec34d231d327
                       9d64e298175bbf0c880ad7a894a3af19fd4149b9
                       40450b511427909665df976d1e236a88596f6d60
                       691e38ed
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a4:55:46:96:5d:09:37:b5:22:df:bf:0c:d2:6e:86:e9:24:8b:8b:76]
            modulus: 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
    public exponent: 10001

]