Results

By type

          2022-06-11 05:14:53,988 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-06-11 05:14:55,557 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-06-11 05:14:56.680  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jun 11, 2022 5:14:59 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jun 11, 2022 5:14:59 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 11, 2022 5:14:59 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jun 11, 2022 5:15:00 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-06-11 05:15:01.006 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-06-11 05:15:01.411  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-06-11 05:15:01.711  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-06-11 05:15:02.931 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-06-11 05:15:02.935 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-06-11 05:15:02.938 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-06-11 05:15:02.944 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-06-11 05:15:03.001 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-06-11 05:15:03.007 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-06-11 05:15:03.217 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-06-11 05:15:04.140 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jun 11, 2022 5:15:05 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-06-11 05:15:05.600  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 12.888 seconds (JVM running for 15.652)
Jun 11, 2022 5:15:26 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-06-11 05:15:45.481  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-11 05:15:45.492 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-11 05:15:45.552 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-11 05:15:45.560 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-11 05:15:45.594  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-11 05:15:45.598  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-11 05:15:45.599  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-11 05:15:45.601 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-11 05:15:45.602 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 05:15:45.607 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-11 05:15:45.614 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-11 05:15:45.618 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-11 05:15:45.666 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-11 05:15:45.671 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 05:15:45.672 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 05:15:45.677 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 05:15:46.623  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-11 05:15:46.628  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-11 05:15:46.629 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-11 05:15:46.632 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 05:15:46.650  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-11 05:15:46.653  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-11 05:15:46.655 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 05:15:46.656 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 05:15:46.657 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 05:15:46.684 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 05:15:46.685 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 05:15:46.686 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 05:15:46.698 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 05:15:46.700 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 05:15:46.701 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 05:15:46.705 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-11 05:15:46.766 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 356190352646939398526093975240727871855495963702
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 11 05:10:30 UTC 2022
           Final Date: Thu Jun 10 05:10:29 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [62:c6:36:cc:01:46:33:cb:e7:49:88:13:65:3d:79:58:49:11:86:bb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1555bc2cbc889f21d8d1a75b914ff7716776c822
                       6e9f2ba7c5af57e584f9c15caf2347592628f9e6
                       0a6bf5ecb0b9f295e306df94381b27576ffbbf83
                       fa9abb80b05d47706ff75995e89baf2f8bdb434e
                       6192c295d45f9af34724894624825885ee877e2d
                       031f1f481a470ca83713c9c0e85d573b96a371de
                       697c3bca7daa8867bbf3a50aca3cddcbe9c00248
                       b6b087b9fe66b31ead16eea21ac6613048e81551
                       bdce6ce33fe936abbd3cf6aa84412b19c5ca4b7b
                       0b64960b2b7b9b524b5538eebf7a079551b1e127
                       221d54b1fac9aa717cb18895c05a2aadebeb6210
                       524cebd4a6453127d1a26790ddfeddb05d1d3c44
                       e07886372e9b96ed91035080fbd897ef25f6affd
                       d8ea4a0b330f1a02f5d5128fbbd042cd7f6e71d3
                       62e6cabed84157e603a6a223b16a9eb81f123194
                       01ee77a6eed5944dfecf7e6c53dea6ae4b3ac3f3
                       a9e3508ee4abf44bc17b2dca2c79aca1a03622b0
                       0b90fd9357e788f56600cd81ae496d6a8a8c5bab
                       07fe5fd1494ae5f6f5c1280ff5c4f39ebb601af6
                       2f8bfc47
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [42:f0:93:12:2b:34:99:91:08:56:97:66:09:33:2d:a8:fa:b9:5e:51]
            modulus: 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
    public exponent: 10001

] 
2022-06-11 06:38:26.461  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-11 06:38:26.466 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-11 06:38:26.471 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-11 06:38:26.472 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-11 06:38:26.473  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-11 06:38:26.475  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-11 06:38:26.475  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-11 06:38:26.476 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-11 06:38:26.476 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-11 06:38:26.477 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-11 06:38:26.485 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-11 06:38:26.487 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 06:38:26.488 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 06:38:26.489 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 06:38:26.863  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-11 06:38:26.870  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-11 06:38:26.871 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-11 06:38:26.872 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 06:38:26.876  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-11 06:38:26.877  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-11 06:38:26.878 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 06:38:26.878 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 06:38:26.879 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 06:38:26.881 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 06:38:26.881 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 06:38:26.882 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 06:38:26.883 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 06:38:26.883 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 06:38:26.884 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 06:38:26.885 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-11 06:38:26.895 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 356190352646939398526093975240727871855495963702
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 11 05:10:30 UTC 2022
           Final Date: Thu Jun 10 05:10:29 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [62:c6:36:cc:01:46:33:cb:e7:49:88:13:65:3d:79:58:49:11:86:bb]
            modulus: c4183ae8171c666d12947fc22700d575bd66603e3f4d6f69fe3b23aa5c030bd8644846744a12ce93a2620ecb7792d7f7efb5222dcb10a38162815fee7d36d7d428c91cbab37d6a0cfbf2d000de766a2110c2c94ae65cceb9e9374cfc954c4a8c994aad09bf350e2d5fbf71c3da98db22dcaf82af1dab3aa6e07dc5424b3d0bfc21ff84076da512040fae82e779867ab136aab7f4a9d47285f78a536ad9703bb8d0761a138a4b8d81d6e9c4d8dfbd55bd5c3d12ebc41e1c6bb426b8866b72b2444a297abc7cf2bc51eae4cdd82b283dd7368760d6d2d33136122688df954f8ff427f311ff2190b5827fd110cac7c35031a76ab4208b525e8f45ebfd4aacd38b2f3528db8f55b5c8289d3cc2ffff5e7d979a833fc33b25d2de4ca03583453e358bdfc172e1b1c80ec19db1dab9bddc91de66372dc96101f0ce1b996eb9d1dbc42dea0d11da526488d04e96d3bae5d43ccba520297ea723e546f62ccc563e37d6c18b6da784309ff792b01538a85059fa994c60c988e09300211016443201f6ca6f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1555bc2cbc889f21d8d1a75b914ff7716776c822
                       6e9f2ba7c5af57e584f9c15caf2347592628f9e6
                       0a6bf5ecb0b9f295e306df94381b27576ffbbf83
                       fa9abb80b05d47706ff75995e89baf2f8bdb434e
                       6192c295d45f9af34724894624825885ee877e2d
                       031f1f481a470ca83713c9c0e85d573b96a371de
                       697c3bca7daa8867bbf3a50aca3cddcbe9c00248
                       b6b087b9fe66b31ead16eea21ac6613048e81551
                       bdce6ce33fe936abbd3cf6aa84412b19c5ca4b7b
                       0b64960b2b7b9b524b5538eebf7a079551b1e127
                       221d54b1fac9aa717cb18895c05a2aadebeb6210
                       524cebd4a6453127d1a26790ddfeddb05d1d3c44
                       e07886372e9b96ed91035080fbd897ef25f6affd
                       d8ea4a0b330f1a02f5d5128fbbd042cd7f6e71d3
                       62e6cabed84157e603a6a223b16a9eb81f123194
                       01ee77a6eed5944dfecf7e6c53dea6ae4b3ac3f3
                       a9e3508ee4abf44bc17b2dca2c79aca1a03622b0
                       0b90fd9357e788f56600cd81ae496d6a8a8c5bab
                       07fe5fd1494ae5f6f5c1280ff5c4f39ebb601af6
                       2f8bfc47
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [14:c8:26:cb:9d:74:2e:e9:d4:db:7d:39:ad:03:5a:ab:71:a1:a4:bd]
            modulus: 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
    public exponent: 10001

] 
2022-06-11 06:40:14.293  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-11 06:40:14.295 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-11 06:40:14.297 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-11 06:40:14.298 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-11 06:40:14.299  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-11 06:40:14.300  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-11 06:40:14.300  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-11 06:40:14.301 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-11 06:40:14.301 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-11 06:40:14.302 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-11 06:40:14.313 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-11 06:40:14.314 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 06:40:14.315 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 06:40:14.315 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 06:40:14.610  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-11 06:40:14.611  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-11 06:40:14.612 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-11 06:40:14.613 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 06:40:14.618  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-11 06:40:14.619  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-11 06:40:14.620 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 06:40:14.620 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 06:40:14.621 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 06:40:14.626 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 06:40:14.626 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 06:40:14.627 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 06:40:14.628 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 06:40:14.628 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 06:40:14.628 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 06:40:14.630 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-11 06:40:14.637 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 356190352646939398526093975240727871855495963702
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 11 05:10:30 UTC 2022
           Final Date: Thu Jun 10 05:10:29 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [62:c6:36:cc:01:46:33:cb:e7:49:88:13:65:3d:79:58:49:11:86:bb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1555bc2cbc889f21d8d1a75b914ff7716776c822
                       6e9f2ba7c5af57e584f9c15caf2347592628f9e6
                       0a6bf5ecb0b9f295e306df94381b27576ffbbf83
                       fa9abb80b05d47706ff75995e89baf2f8bdb434e
                       6192c295d45f9af34724894624825885ee877e2d
                       031f1f481a470ca83713c9c0e85d573b96a371de
                       697c3bca7daa8867bbf3a50aca3cddcbe9c00248
                       b6b087b9fe66b31ead16eea21ac6613048e81551
                       bdce6ce33fe936abbd3cf6aa84412b19c5ca4b7b
                       0b64960b2b7b9b524b5538eebf7a079551b1e127
                       221d54b1fac9aa717cb18895c05a2aadebeb6210
                       524cebd4a6453127d1a26790ddfeddb05d1d3c44
                       e07886372e9b96ed91035080fbd897ef25f6affd
                       d8ea4a0b330f1a02f5d5128fbbd042cd7f6e71d3
                       62e6cabed84157e603a6a223b16a9eb81f123194
                       01ee77a6eed5944dfecf7e6c53dea6ae4b3ac3f3
                       a9e3508ee4abf44bc17b2dca2c79aca1a03622b0
                       0b90fd9357e788f56600cd81ae496d6a8a8c5bab
                       07fe5fd1494ae5f6f5c1280ff5c4f39ebb601af6
                       2f8bfc47
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [27:04:92:40:8b:d7:3f:41:b3:77:d7:3e:10:a8:4e:9d:50:32:10:2f]
            modulus: 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
    public exponent: 10001

] 
2022-06-11 06:41:30.516  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-11 06:41:30.518 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-11 06:41:30.522 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-11 06:41:30.523 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-11 06:41:30.525  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-11 06:41:30.528  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-11 06:41:30.529  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-11 06:41:30.531 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-11 06:41:30.531 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-11 06:41:30.532 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-11 06:41:30.548 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-11 06:41:30.550 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 06:41:30.550 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 06:41:30.551 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 06:41:30.756  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-11 06:41:30.757  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-11 06:41:30.762 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-11 06:41:30.763 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 06:41:30.767  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-11 06:41:30.769  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-11 06:41:30.769 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 06:41:30.770 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 06:41:30.771 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 06:41:30.776 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 06:41:30.777 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 06:41:30.777 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 06:41:30.780 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 06:41:30.781 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 06:41:30.781 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 06:41:30.783 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-11 06:41:30.789 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 356190352646939398526093975240727871855495963702
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 11 05:10:30 UTC 2022
           Final Date: Thu Jun 10 05:10:29 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [62:c6:36:cc:01:46:33:cb:e7:49:88:13:65:3d:79:58:49:11:86:bb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1555bc2cbc889f21d8d1a75b914ff7716776c822
                       6e9f2ba7c5af57e584f9c15caf2347592628f9e6
                       0a6bf5ecb0b9f295e306df94381b27576ffbbf83
                       fa9abb80b05d47706ff75995e89baf2f8bdb434e
                       6192c295d45f9af34724894624825885ee877e2d
                       031f1f481a470ca83713c9c0e85d573b96a371de
                       697c3bca7daa8867bbf3a50aca3cddcbe9c00248
                       b6b087b9fe66b31ead16eea21ac6613048e81551
                       bdce6ce33fe936abbd3cf6aa84412b19c5ca4b7b
                       0b64960b2b7b9b524b5538eebf7a079551b1e127
                       221d54b1fac9aa717cb18895c05a2aadebeb6210
                       524cebd4a6453127d1a26790ddfeddb05d1d3c44
                       e07886372e9b96ed91035080fbd897ef25f6affd
                       d8ea4a0b330f1a02f5d5128fbbd042cd7f6e71d3
                       62e6cabed84157e603a6a223b16a9eb81f123194
                       01ee77a6eed5944dfecf7e6c53dea6ae4b3ac3f3
                       a9e3508ee4abf44bc17b2dca2c79aca1a03622b0
                       0b90fd9357e788f56600cd81ae496d6a8a8c5bab
                       07fe5fd1494ae5f6f5c1280ff5c4f39ebb601af6
                       2f8bfc47
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c8:bd:be:25:06:11:b3:33:ca:fb:c0:a3:12:3c:b0:a0:1d:f6:ba:41]
            modulus: c63099d32b78cc686770e5bc66ed704c77e9c2668bb3c1a48af936f9c37ab32e74f956d9ce01e6b1951e99c648c1359fc771954d5d81cd7d53e758581e61ab2c770c3b60c4ecb95d20fd9b9eb3ffca14bc429e3a322d8e237ab19ce3ca57f71c8845970c89baca0e6284412fe917944eaad5c4924337f8d1fc4407936c082cbf88b2e52535be3f7b6f129fc5f96282764bf4830a9c34d82c874f1ed5dc7e475e09371233652e116ef4a293e5e1334c6c7ba94a0918d2ba256e748d9f3dd73f8997c33458a195aaea58d9c1acae7b1a54fccb7b12ba75b176b726872624be8e667e6e5d8b62dd8794ac9bbb23deec3bdefaf04355a750566ec760f06b4f722ced
    public exponent: 10001

] 
2022-06-11 06:43:58.156  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-11 06:43:58.159 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-11 06:43:58.161 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-11 06:43:58.164 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-11 06:43:58.165  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-11 06:43:58.166  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-11 06:43:58.167  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-11 06:43:58.168 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-11 06:43:58.168 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-11 06:43:58.170 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-11 06:43:58.176 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-11 06:43:58.176 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 06:43:58.177 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 06:43:58.177 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 06:43:58.441  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-11 06:43:58.442  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-11 06:43:58.443 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-11 06:43:58.443 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 06:43:58.446  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-11 06:43:58.446  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-11 06:43:58.447 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 06:43:58.448 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 06:43:58.448 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 06:43:58.449 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 06:43:58.449 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 06:43:58.449 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 06:43:58.451 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 06:43:58.451 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 06:43:58.452 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 06:43:58.453 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-11 06:43:58.458 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 356190352646939398526093975240727871855495963702
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 11 05:10:30 UTC 2022
           Final Date: Thu Jun 10 05:10:29 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [62:c6:36:cc:01:46:33:cb:e7:49:88:13:65:3d:79:58:49:11:86:bb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1555bc2cbc889f21d8d1a75b914ff7716776c822
                       6e9f2ba7c5af57e584f9c15caf2347592628f9e6
                       0a6bf5ecb0b9f295e306df94381b27576ffbbf83
                       fa9abb80b05d47706ff75995e89baf2f8bdb434e
                       6192c295d45f9af34724894624825885ee877e2d
                       031f1f481a470ca83713c9c0e85d573b96a371de
                       697c3bca7daa8867bbf3a50aca3cddcbe9c00248
                       b6b087b9fe66b31ead16eea21ac6613048e81551
                       bdce6ce33fe936abbd3cf6aa84412b19c5ca4b7b
                       0b64960b2b7b9b524b5538eebf7a079551b1e127
                       221d54b1fac9aa717cb18895c05a2aadebeb6210
                       524cebd4a6453127d1a26790ddfeddb05d1d3c44
                       e07886372e9b96ed91035080fbd897ef25f6affd
                       d8ea4a0b330f1a02f5d5128fbbd042cd7f6e71d3
                       62e6cabed84157e603a6a223b16a9eb81f123194
                       01ee77a6eed5944dfecf7e6c53dea6ae4b3ac3f3
                       a9e3508ee4abf44bc17b2dca2c79aca1a03622b0
                       0b90fd9357e788f56600cd81ae496d6a8a8c5bab
                       07fe5fd1494ae5f6f5c1280ff5c4f39ebb601af6
                       2f8bfc47
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [00:7b:95:4d:1a:17:f5:54:34:fa:f6:db:a8:6f:5f:9a:df:88:44:4c]
            modulus: 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
    public exponent: 10001

] 
2022-06-11 06:47:25.224  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-11 06:47:25.228 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-11 06:47:25.230 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-11 06:47:25.233 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-11 06:47:25.233  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-11 06:47:25.234  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-11 06:47:25.235  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-11 06:47:25.236 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-11 06:47:25.237 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-11 06:47:25.238 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-11 06:47:25.246 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-11 06:47:25.248 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 06:47:25.248 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 06:47:25.248 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 06:47:25.514  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-11 06:47:25.515  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-11 06:47:25.516 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-11 06:47:25.516 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 06:47:25.519  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-11 06:47:25.520  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-11 06:47:25.520 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 06:47:25.522 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 06:47:25.523 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 06:47:25.532 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 06:47:25.534 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 06:47:25.535 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 06:47:25.536 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 06:47:25.536 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 06:47:25.537 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 06:47:25.538 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-11 06:47:25.545 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 356190352646939398526093975240727871855495963702
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 11 05:10:30 UTC 2022
           Final Date: Thu Jun 10 05:10:29 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [62:c6:36:cc:01:46:33:cb:e7:49:88:13:65:3d:79:58:49:11:86:bb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1555bc2cbc889f21d8d1a75b914ff7716776c822
                       6e9f2ba7c5af57e584f9c15caf2347592628f9e6
                       0a6bf5ecb0b9f295e306df94381b27576ffbbf83
                       fa9abb80b05d47706ff75995e89baf2f8bdb434e
                       6192c295d45f9af34724894624825885ee877e2d
                       031f1f481a470ca83713c9c0e85d573b96a371de
                       697c3bca7daa8867bbf3a50aca3cddcbe9c00248
                       b6b087b9fe66b31ead16eea21ac6613048e81551
                       bdce6ce33fe936abbd3cf6aa84412b19c5ca4b7b
                       0b64960b2b7b9b524b5538eebf7a079551b1e127
                       221d54b1fac9aa717cb18895c05a2aadebeb6210
                       524cebd4a6453127d1a26790ddfeddb05d1d3c44
                       e07886372e9b96ed91035080fbd897ef25f6affd
                       d8ea4a0b330f1a02f5d5128fbbd042cd7f6e71d3
                       62e6cabed84157e603a6a223b16a9eb81f123194
                       01ee77a6eed5944dfecf7e6c53dea6ae4b3ac3f3
                       a9e3508ee4abf44bc17b2dca2c79aca1a03622b0
                       0b90fd9357e788f56600cd81ae496d6a8a8c5bab
                       07fe5fd1494ae5f6f5c1280ff5c4f39ebb601af6
                       2f8bfc47
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [57:91:90:da:b2:77:4f:79:80:ad:9e:18:ff:12:da:47:a4:b8:5b:1d]
            modulus: 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
    public exponent: 10001

] 
2022-06-11 06:51:57.173  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-11 06:51:57.184 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-11 06:51:57.189 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-11 06:51:57.191 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-11 06:51:57.195  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-11 06:51:57.196  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-11 06:51:57.197  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-11 06:51:57.197 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-11 06:51:57.198 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-11 06:51:57.198 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-11 06:51:57.204 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-11 06:51:57.205 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 06:51:57.205 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 06:51:57.206 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 06:51:57.451  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-11 06:51:57.452  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-11 06:51:57.452 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-11 06:51:57.453 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 06:51:57.456  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-11 06:51:57.457  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-11 06:51:57.457 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 06:51:57.457 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 06:51:57.458 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 06:51:57.459 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 06:51:57.459 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 06:51:57.460 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 06:51:57.461 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 06:51:57.461 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 06:51:57.461 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 06:51:57.463 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-11 06:51:57.468 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 356190352646939398526093975240727871855495963702
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 11 05:10:30 UTC 2022
           Final Date: Thu Jun 10 05:10:29 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [62:c6:36:cc:01:46:33:cb:e7:49:88:13:65:3d:79:58:49:11:86:bb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1555bc2cbc889f21d8d1a75b914ff7716776c822
                       6e9f2ba7c5af57e584f9c15caf2347592628f9e6
                       0a6bf5ecb0b9f295e306df94381b27576ffbbf83
                       fa9abb80b05d47706ff75995e89baf2f8bdb434e
                       6192c295d45f9af34724894624825885ee877e2d
                       031f1f481a470ca83713c9c0e85d573b96a371de
                       697c3bca7daa8867bbf3a50aca3cddcbe9c00248
                       b6b087b9fe66b31ead16eea21ac6613048e81551
                       bdce6ce33fe936abbd3cf6aa84412b19c5ca4b7b
                       0b64960b2b7b9b524b5538eebf7a079551b1e127
                       221d54b1fac9aa717cb18895c05a2aadebeb6210
                       524cebd4a6453127d1a26790ddfeddb05d1d3c44
                       e07886372e9b96ed91035080fbd897ef25f6affd
                       d8ea4a0b330f1a02f5d5128fbbd042cd7f6e71d3
                       62e6cabed84157e603a6a223b16a9eb81f123194
                       01ee77a6eed5944dfecf7e6c53dea6ae4b3ac3f3
                       a9e3508ee4abf44bc17b2dca2c79aca1a03622b0
                       0b90fd9357e788f56600cd81ae496d6a8a8c5bab
                       07fe5fd1494ae5f6f5c1280ff5c4f39ebb601af6
                       2f8bfc47
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8e:9c:3f:ef:9f:63:60:3a:13:4f:94:06:63:72:e6:59:20:18:58:9a]
            modulus: c59d25bbbf921cdd6d429022e18f2f3df8fb1797c7b2b0e0ef432f4b9798568e5ba78a8e72867ee7f2a636a0f71a13860c58f0aab1aaf35ae06b98f688f2c4650d0c101350bac9f93337b6bccb0e91a2c739fc57bc56a35dc160ecb62836a79722e484507baffc1a1e7d4545ee9d4e2b0b2ba74251a0588f9034dea36f0940198419fae0c2dd5f546043640e90dec5de2216e1ec81def7d98fd7f2ad1a2fa9b053be47fd07f7782cc43902d12434457abbc60df9e4660e6752a16dc60b457537ec427ddb2dcf5da33847914e0dbb2d4c9c92c3336ccbae89461d133460d0a1cb82b763eff88e4f719963d02eac22113cc39f6da69a85c25d55938cf4fd3620c3
    public exponent: 10001

] 
2022-06-11 06:55:07.808  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-11 06:55:07.812 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-11 06:55:07.817 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-11 06:55:07.819 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-11 06:55:07.820  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-11 06:55:07.821  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-11 06:55:07.822  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-11 06:55:07.824 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-11 06:55:07.824 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-11 06:55:07.825 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-11 06:55:07.836 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-11 06:55:07.840 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 06:55:07.848 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 06:55:07.849 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 06:55:08.150  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-11 06:55:08.151  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-11 06:55:08.151 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-11 06:55:08.152 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 06:55:08.154  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-11 06:55:08.155  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-11 06:55:08.155 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 06:55:08.156 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 06:55:08.156 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 06:55:08.157 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 06:55:08.158 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 06:55:08.158 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 06:55:08.159 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 06:55:08.159 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 06:55:08.160 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 06:55:08.161 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-11 06:55:08.166 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 356190352646939398526093975240727871855495963702
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 11 05:10:30 UTC 2022
           Final Date: Thu Jun 10 05:10:29 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [62:c6:36:cc:01:46:33:cb:e7:49:88:13:65:3d:79:58:49:11:86:bb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1555bc2cbc889f21d8d1a75b914ff7716776c822
                       6e9f2ba7c5af57e584f9c15caf2347592628f9e6
                       0a6bf5ecb0b9f295e306df94381b27576ffbbf83
                       fa9abb80b05d47706ff75995e89baf2f8bdb434e
                       6192c295d45f9af34724894624825885ee877e2d
                       031f1f481a470ca83713c9c0e85d573b96a371de
                       697c3bca7daa8867bbf3a50aca3cddcbe9c00248
                       b6b087b9fe66b31ead16eea21ac6613048e81551
                       bdce6ce33fe936abbd3cf6aa84412b19c5ca4b7b
                       0b64960b2b7b9b524b5538eebf7a079551b1e127
                       221d54b1fac9aa717cb18895c05a2aadebeb6210
                       524cebd4a6453127d1a26790ddfeddb05d1d3c44
                       e07886372e9b96ed91035080fbd897ef25f6affd
                       d8ea4a0b330f1a02f5d5128fbbd042cd7f6e71d3
                       62e6cabed84157e603a6a223b16a9eb81f123194
                       01ee77a6eed5944dfecf7e6c53dea6ae4b3ac3f3
                       a9e3508ee4abf44bc17b2dca2c79aca1a03622b0
                       0b90fd9357e788f56600cd81ae496d6a8a8c5bab
                       07fe5fd1494ae5f6f5c1280ff5c4f39ebb601af6
                       2f8bfc47
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a5:0e:66:a8:7d:b4:f4:8b:bf:c2:58:13:46:98:37:4a:2d:37:05:8c]
            modulus: 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
    public exponent: 10001

] 
2022-06-11 06:56:29.536  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-11 06:56:29.537 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-11 06:56:29.540 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-11 06:56:29.541 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-11 06:56:29.542  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-11 06:56:29.542  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-11 06:56:29.543  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-11 06:56:29.543 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-11 06:56:29.544 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-11 06:56:29.544 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-11 06:56:29.552 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-11 06:56:29.553 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 06:56:29.554 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 06:56:29.554 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 06:56:29.872  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-11 06:56:29.873  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-11 06:56:29.873 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-11 06:56:29.874 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 06:56:29.876  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-11 06:56:29.876  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-11 06:56:29.877 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 06:56:29.878 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 06:56:29.878 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 06:56:29.879 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 06:56:29.879 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 06:56:29.879 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 06:56:29.880 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 06:56:29.881 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 06:56:29.881 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 06:56:29.882 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-11 06:56:29.889 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 356190352646939398526093975240727871855495963702
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 11 05:10:30 UTC 2022
           Final Date: Thu Jun 10 05:10:29 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [62:c6:36:cc:01:46:33:cb:e7:49:88:13:65:3d:79:58:49:11:86:bb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1555bc2cbc889f21d8d1a75b914ff7716776c822
                       6e9f2ba7c5af57e584f9c15caf2347592628f9e6
                       0a6bf5ecb0b9f295e306df94381b27576ffbbf83
                       fa9abb80b05d47706ff75995e89baf2f8bdb434e
                       6192c295d45f9af34724894624825885ee877e2d
                       031f1f481a470ca83713c9c0e85d573b96a371de
                       697c3bca7daa8867bbf3a50aca3cddcbe9c00248
                       b6b087b9fe66b31ead16eea21ac6613048e81551
                       bdce6ce33fe936abbd3cf6aa84412b19c5ca4b7b
                       0b64960b2b7b9b524b5538eebf7a079551b1e127
                       221d54b1fac9aa717cb18895c05a2aadebeb6210
                       524cebd4a6453127d1a26790ddfeddb05d1d3c44
                       e07886372e9b96ed91035080fbd897ef25f6affd
                       d8ea4a0b330f1a02f5d5128fbbd042cd7f6e71d3
                       62e6cabed84157e603a6a223b16a9eb81f123194
                       01ee77a6eed5944dfecf7e6c53dea6ae4b3ac3f3
                       a9e3508ee4abf44bc17b2dca2c79aca1a03622b0
                       0b90fd9357e788f56600cd81ae496d6a8a8c5bab
                       07fe5fd1494ae5f6f5c1280ff5c4f39ebb601af6
                       2f8bfc47
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7e:e1:ae:df:d6:94:01:da:05:83:b0:a2:fd:b7:56:58:6b:85:35:56]
            modulus: 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
    public exponent: 10001

] 
2022-06-11 07:00:36.647  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-11 07:00:36.651 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-11 07:00:36.657 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-11 07:00:36.659 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-11 07:00:36.659  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-11 07:00:36.660  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-11 07:00:36.661  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-11 07:00:36.661 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-11 07:00:36.662 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-11 07:00:36.663 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-11 07:00:36.669 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-11 07:00:36.670 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 07:00:36.671 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 07:00:36.671 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 07:00:36.931  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-11 07:00:36.932  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-11 07:00:36.933 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-11 07:00:36.934 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 07:00:36.937  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-11 07:00:36.937  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-11 07:00:36.945 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 07:00:36.945 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 07:00:36.946 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 07:00:36.947 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 07:00:36.948 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 07:00:36.948 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 07:00:36.949 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 07:00:36.949 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 07:00:36.950 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 07:00:36.952 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-11 07:00:36.956 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 356190352646939398526093975240727871855495963702
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 11 05:10:30 UTC 2022
           Final Date: Thu Jun 10 05:10:29 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [62:c6:36:cc:01:46:33:cb:e7:49:88:13:65:3d:79:58:49:11:86:bb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1555bc2cbc889f21d8d1a75b914ff7716776c822
                       6e9f2ba7c5af57e584f9c15caf2347592628f9e6
                       0a6bf5ecb0b9f295e306df94381b27576ffbbf83
                       fa9abb80b05d47706ff75995e89baf2f8bdb434e
                       6192c295d45f9af34724894624825885ee877e2d
                       031f1f481a470ca83713c9c0e85d573b96a371de
                       697c3bca7daa8867bbf3a50aca3cddcbe9c00248
                       b6b087b9fe66b31ead16eea21ac6613048e81551
                       bdce6ce33fe936abbd3cf6aa84412b19c5ca4b7b
                       0b64960b2b7b9b524b5538eebf7a079551b1e127
                       221d54b1fac9aa717cb18895c05a2aadebeb6210
                       524cebd4a6453127d1a26790ddfeddb05d1d3c44
                       e07886372e9b96ed91035080fbd897ef25f6affd
                       d8ea4a0b330f1a02f5d5128fbbd042cd7f6e71d3
                       62e6cabed84157e603a6a223b16a9eb81f123194
                       01ee77a6eed5944dfecf7e6c53dea6ae4b3ac3f3
                       a9e3508ee4abf44bc17b2dca2c79aca1a03622b0
                       0b90fd9357e788f56600cd81ae496d6a8a8c5bab
                       07fe5fd1494ae5f6f5c1280ff5c4f39ebb601af6
                       2f8bfc47
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [31:54:02:dd:47:c7:64:4e:f8:94:9a:e8:d0:94:9a:b4:58:b5:ee:0f]
            modulus: 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
    public exponent: 10001

] 
2022-06-11 07:01:42.341  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-11 07:01:42.343 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-11 07:01:42.346 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-11 07:01:42.348 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-11 07:01:42.349  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-11 07:01:42.350  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-11 07:01:42.351  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-11 07:01:42.352 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-11 07:01:42.352 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-11 07:01:42.353 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-11 07:01:42.362 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-11 07:01:42.364 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 07:01:42.365 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 07:01:42.365 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 07:01:42.597  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-11 07:01:42.598  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-11 07:01:42.599 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-11 07:01:42.599 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 07:01:42.601  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-11 07:01:42.602  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-11 07:01:42.602 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 07:01:42.603 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 07:01:42.604 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 07:01:42.605 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 07:01:42.605 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 07:01:42.605 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 07:01:42.607 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 07:01:42.607 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 07:01:42.607 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 07:01:42.609 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-11 07:01:42.615 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 356190352646939398526093975240727871855495963702
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 11 05:10:30 UTC 2022
           Final Date: Thu Jun 10 05:10:29 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [62:c6:36:cc:01:46:33:cb:e7:49:88:13:65:3d:79:58:49:11:86:bb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1555bc2cbc889f21d8d1a75b914ff7716776c822
                       6e9f2ba7c5af57e584f9c15caf2347592628f9e6
                       0a6bf5ecb0b9f295e306df94381b27576ffbbf83
                       fa9abb80b05d47706ff75995e89baf2f8bdb434e
                       6192c295d45f9af34724894624825885ee877e2d
                       031f1f481a470ca83713c9c0e85d573b96a371de
                       697c3bca7daa8867bbf3a50aca3cddcbe9c00248
                       b6b087b9fe66b31ead16eea21ac6613048e81551
                       bdce6ce33fe936abbd3cf6aa84412b19c5ca4b7b
                       0b64960b2b7b9b524b5538eebf7a079551b1e127
                       221d54b1fac9aa717cb18895c05a2aadebeb6210
                       524cebd4a6453127d1a26790ddfeddb05d1d3c44
                       e07886372e9b96ed91035080fbd897ef25f6affd
                       d8ea4a0b330f1a02f5d5128fbbd042cd7f6e71d3
                       62e6cabed84157e603a6a223b16a9eb81f123194
                       01ee77a6eed5944dfecf7e6c53dea6ae4b3ac3f3
                       a9e3508ee4abf44bc17b2dca2c79aca1a03622b0
                       0b90fd9357e788f56600cd81ae496d6a8a8c5bab
                       07fe5fd1494ae5f6f5c1280ff5c4f39ebb601af6
                       2f8bfc47
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [24:3f:f8:19:2a:bc:39:b4:ce:a2:f0:51:3b:9e:a0:98:f0:1d:63:8f]
            modulus: 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
    public exponent: 10001

] 
2022-06-11 07:02:14.926  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-11 07:02:14.929 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-11 07:02:14.931 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-11 07:02:14.932 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-11 07:02:14.932  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-11 07:02:14.933  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-11 07:02:14.934  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-11 07:02:14.934 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-11 07:02:14.935 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-11 07:02:14.935 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-11 07:02:14.941 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-11 07:02:14.943 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 07:02:14.943 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 07:02:14.943 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 07:02:15.229  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-11 07:02:15.232  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-11 07:02:15.233 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-11 07:02:15.234 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 07:02:15.240  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-11 07:02:15.241  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-11 07:02:15.241 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 07:02:15.242 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 07:02:15.246 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 07:02:15.252 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 07:02:15.252 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 07:02:15.253 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 07:02:15.254 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 07:02:15.254 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 07:02:15.254 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 07:02:15.256 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-11 07:02:15.266 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 356190352646939398526093975240727871855495963702
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 11 05:10:30 UTC 2022
           Final Date: Thu Jun 10 05:10:29 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [62:c6:36:cc:01:46:33:cb:e7:49:88:13:65:3d:79:58:49:11:86:bb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1555bc2cbc889f21d8d1a75b914ff7716776c822
                       6e9f2ba7c5af57e584f9c15caf2347592628f9e6
                       0a6bf5ecb0b9f295e306df94381b27576ffbbf83
                       fa9abb80b05d47706ff75995e89baf2f8bdb434e
                       6192c295d45f9af34724894624825885ee877e2d
                       031f1f481a470ca83713c9c0e85d573b96a371de
                       697c3bca7daa8867bbf3a50aca3cddcbe9c00248
                       b6b087b9fe66b31ead16eea21ac6613048e81551
                       bdce6ce33fe936abbd3cf6aa84412b19c5ca4b7b
                       0b64960b2b7b9b524b5538eebf7a079551b1e127
                       221d54b1fac9aa717cb18895c05a2aadebeb6210
                       524cebd4a6453127d1a26790ddfeddb05d1d3c44
                       e07886372e9b96ed91035080fbd897ef25f6affd
                       d8ea4a0b330f1a02f5d5128fbbd042cd7f6e71d3
                       62e6cabed84157e603a6a223b16a9eb81f123194
                       01ee77a6eed5944dfecf7e6c53dea6ae4b3ac3f3
                       a9e3508ee4abf44bc17b2dca2c79aca1a03622b0
                       0b90fd9357e788f56600cd81ae496d6a8a8c5bab
                       07fe5fd1494ae5f6f5c1280ff5c4f39ebb601af6
                       2f8bfc47
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [69:03:c4:f9:df:7e:06:34:9d:d1:57:eb:3a:c7:aa:06:61:9c:a6:26]
            modulus: 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
    public exponent: 10001

] 
2022-06-11 07:05:01.106  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-11 07:05:01.111 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-11 07:05:01.115 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-11 07:05:01.120 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-11 07:05:01.121  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-11 07:05:01.122  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-11 07:05:01.123  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-11 07:05:01.123 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-11 07:05:01.124 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-11 07:05:01.125 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-11 07:05:01.135 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-11 07:05:01.136 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 07:05:01.137 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 07:05:01.137 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 07:05:01.404  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-11 07:05:01.405  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-11 07:05:01.405 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-11 07:05:01.406 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 07:05:01.407  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-11 07:05:01.408  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-11 07:05:01.408 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 07:05:01.409 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 07:05:01.409 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 07:05:01.410 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 07:05:01.410 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 07:05:01.411 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 07:05:01.411 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 07:05:01.412 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 07:05:01.412 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 07:05:01.413 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-11 07:05:01.417 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 356190352646939398526093975240727871855495963702
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 11 05:10:30 UTC 2022
           Final Date: Thu Jun 10 05:10:29 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [62:c6:36:cc:01:46:33:cb:e7:49:88:13:65:3d:79:58:49:11:86:bb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1555bc2cbc889f21d8d1a75b914ff7716776c822
                       6e9f2ba7c5af57e584f9c15caf2347592628f9e6
                       0a6bf5ecb0b9f295e306df94381b27576ffbbf83
                       fa9abb80b05d47706ff75995e89baf2f8bdb434e
                       6192c295d45f9af34724894624825885ee877e2d
                       031f1f481a470ca83713c9c0e85d573b96a371de
                       697c3bca7daa8867bbf3a50aca3cddcbe9c00248
                       b6b087b9fe66b31ead16eea21ac6613048e81551
                       bdce6ce33fe936abbd3cf6aa84412b19c5ca4b7b
                       0b64960b2b7b9b524b5538eebf7a079551b1e127
                       221d54b1fac9aa717cb18895c05a2aadebeb6210
                       524cebd4a6453127d1a26790ddfeddb05d1d3c44
                       e07886372e9b96ed91035080fbd897ef25f6affd
                       d8ea4a0b330f1a02f5d5128fbbd042cd7f6e71d3
                       62e6cabed84157e603a6a223b16a9eb81f123194
                       01ee77a6eed5944dfecf7e6c53dea6ae4b3ac3f3
                       a9e3508ee4abf44bc17b2dca2c79aca1a03622b0
                       0b90fd9357e788f56600cd81ae496d6a8a8c5bab
                       07fe5fd1494ae5f6f5c1280ff5c4f39ebb601af6
                       2f8bfc47
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4a:80:4f:f0:0c:11:5d:75:4b:09:a4:30:10:dd:47:87:61:a6:86:ef]
            modulus: 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
    public exponent: 10001

] 
2022-06-11 07:09:38.285  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-11 07:09:38.287 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-11 07:09:38.289 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-11 07:09:38.290 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-11 07:09:38.291  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-11 07:09:38.292  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-11 07:09:38.292  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-11 07:09:38.292 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-11 07:09:38.293 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-11 07:09:38.293 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-11 07:09:38.300 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-11 07:09:38.301 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 07:09:38.301 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 07:09:38.302 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 07:09:38.521  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-11 07:09:38.522  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-11 07:09:38.523 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-11 07:09:38.523 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 07:09:38.525  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-11 07:09:38.525  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-11 07:09:38.526 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 07:09:38.527 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 07:09:38.527 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 07:09:38.528 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 07:09:38.528 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 07:09:38.529 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 07:09:38.530 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 07:09:38.530 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 07:09:38.531 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 07:09:38.532 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-11 07:09:38.537 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 356190352646939398526093975240727871855495963702
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 11 05:10:30 UTC 2022
           Final Date: Thu Jun 10 05:10:29 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [62:c6:36:cc:01:46:33:cb:e7:49:88:13:65:3d:79:58:49:11:86:bb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1555bc2cbc889f21d8d1a75b914ff7716776c822
                       6e9f2ba7c5af57e584f9c15caf2347592628f9e6
                       0a6bf5ecb0b9f295e306df94381b27576ffbbf83
                       fa9abb80b05d47706ff75995e89baf2f8bdb434e
                       6192c295d45f9af34724894624825885ee877e2d
                       031f1f481a470ca83713c9c0e85d573b96a371de
                       697c3bca7daa8867bbf3a50aca3cddcbe9c00248
                       b6b087b9fe66b31ead16eea21ac6613048e81551
                       bdce6ce33fe936abbd3cf6aa84412b19c5ca4b7b
                       0b64960b2b7b9b524b5538eebf7a079551b1e127
                       221d54b1fac9aa717cb18895c05a2aadebeb6210
                       524cebd4a6453127d1a26790ddfeddb05d1d3c44
                       e07886372e9b96ed91035080fbd897ef25f6affd
                       d8ea4a0b330f1a02f5d5128fbbd042cd7f6e71d3
                       62e6cabed84157e603a6a223b16a9eb81f123194
                       01ee77a6eed5944dfecf7e6c53dea6ae4b3ac3f3
                       a9e3508ee4abf44bc17b2dca2c79aca1a03622b0
                       0b90fd9357e788f56600cd81ae496d6a8a8c5bab
                       07fe5fd1494ae5f6f5c1280ff5c4f39ebb601af6
                       2f8bfc47
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0f:59:49:73:a0:29:2a:0e:35:da:29:7f:16:1b:67:96:2d:8b:7b:96]
            modulus: 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
    public exponent: 10001

] 
2022-06-11 07:13:51.962  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-11 07:13:51.965 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-11 07:13:51.970 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-11 07:13:51.972 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-11 07:13:51.972  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-11 07:13:51.973  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-11 07:13:51.974  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-11 07:13:51.974 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-11 07:13:51.975 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-11 07:13:51.975 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-11 07:13:51.982 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-11 07:13:51.984 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 07:13:51.984 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-11 07:13:51.984 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 07:13:52.232  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-11 07:13:52.233  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-11 07:13:52.234 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-11 07:13:52.235 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-11 07:13:52.236  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-11 07:13:52.237  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-11 07:13:52.237 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 07:13:52.237 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 07:13:52.238 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 07:13:52.238 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 07:13:52.239 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 07:13:52.239 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 07:13:52.240 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-11 07:13:52.240 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-11 07:13:52.240 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-11 07:13:52.241 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-11 07:13:52.247 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 356190352646939398526093975240727871855495963702
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 11 05:10:30 UTC 2022
           Final Date: Thu Jun 10 05:10:29 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [62:c6:36:cc:01:46:33:cb:e7:49:88:13:65:3d:79:58:49:11:86:bb]
            modulus: c4183ae8171c666d12947fc22700d575bd66603e3f4d6f69fe3b23aa5c030bd8644846744a12ce93a2620ecb7792d7f7efb5222dcb10a38162815fee7d36d7d428c91cbab37d6a0cfbf2d000de766a2110c2c94ae65cceb9e9374cfc954c4a8c994aad09bf350e2d5fbf71c3da98db22dcaf82af1dab3aa6e07dc5424b3d0bfc21ff84076da512040fae82e779867ab136aab7f4a9d47285f78a536ad9703bb8d0761a138a4b8d81d6e9c4d8dfbd55bd5c3d12ebc41e1c6bb426b8866b72b2444a297abc7cf2bc51eae4cdd82b283dd7368760d6d2d33136122688df954f8ff427f311ff2190b5827fd110cac7c35031a76ab4208b525e8f45ebfd4aacd38b2f3528db8f55b5c8289d3cc2ffff5e7d979a833fc33b25d2de4ca03583453e358bdfc172e1b1c80ec19db1dab9bddc91de66372dc96101f0ce1b996eb9d1dbc42dea0d11da526488d04e96d3bae5d43ccba520297ea723e546f62ccc563e37d6c18b6da784309ff792b01538a85059fa994c60c988e09300211016443201f6ca6f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1555bc2cbc889f21d8d1a75b914ff7716776c822
                       6e9f2ba7c5af57e584f9c15caf2347592628f9e6
                       0a6bf5ecb0b9f295e306df94381b27576ffbbf83
                       fa9abb80b05d47706ff75995e89baf2f8bdb434e
                       6192c295d45f9af34724894624825885ee877e2d
                       031f1f481a470ca83713c9c0e85d573b96a371de
                       697c3bca7daa8867bbf3a50aca3cddcbe9c00248
                       b6b087b9fe66b31ead16eea21ac6613048e81551
                       bdce6ce33fe936abbd3cf6aa84412b19c5ca4b7b
                       0b64960b2b7b9b524b5538eebf7a079551b1e127
                       221d54b1fac9aa717cb18895c05a2aadebeb6210
                       524cebd4a6453127d1a26790ddfeddb05d1d3c44
                       e07886372e9b96ed91035080fbd897ef25f6affd
                       d8ea4a0b330f1a02f5d5128fbbd042cd7f6e71d3
                       62e6cabed84157e603a6a223b16a9eb81f123194
                       01ee77a6eed5944dfecf7e6c53dea6ae4b3ac3f3
                       a9e3508ee4abf44bc17b2dca2c79aca1a03622b0
                       0b90fd9357e788f56600cd81ae496d6a8a8c5bab
                       07fe5fd1494ae5f6f5c1280ff5c4f39ebb601af6
                       2f8bfc47
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ed:55:d5:6a:ed:0b:3d:55:8a:52:0a:ae:6c:80:1a:d4:7d:61:5f:20]
            modulus: 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
    public exponent: 10001

]