Results

By type

          2022-05-20 11:22:29,705 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-05-20 11:22:34,105 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-05-20 11:22:37.403  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
May 20, 2022 11:22:47 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
May 20, 2022 11:22:47 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
May 20, 2022 11:22:47 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
May 20, 2022 11:22:47 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-05-20 11:22:49.611 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-05-20 11:22:51.018  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-05-20 11:22:51.707  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-05-20 11:22:54.805 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-05-20 11:22:54.809 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-05-20 11:22:54.810 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-05-20 11:22:54.813 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-05-20 11:22:55.017 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
2022-05-20 11:22:55.020 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-05-20 11:22:55.627 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-05-20 11:23:01.505 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
May 20, 2022 11:23:05 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-05-20 11:23:06.509  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 40.891 seconds (JVM running for 49.24)
May 20, 2022 11:23:12 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-05-20 11:29:19.411  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-20 11:29:19.505 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-20 11:29:19.614 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-20 11:29:19.617 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-20 11:29:19.711  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-20 11:29:19.802  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-20 11:29:19.803  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-20 11:29:19.805 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-20 11:29:19.805 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 11:29:19.809 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-20 11:29:19.816 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-20 11:29:19.820 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-20 11:29:20.105 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-20 11:29:20.111 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 11:29:20.111 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 11:29:20.114 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 11:29:26.204  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-20 11:29:26.207  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-20 11:29:26.207 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-20 11:29:26.208 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 11:29:26.215  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-20 11:29:26.216  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-20 11:29:26.217 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 11:29:26.217 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 11:29:26.217 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 11:29:26.308 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 11:29:26.308 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 11:29:26.309 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 11:29:26.315 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 11:29:26.315 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 11:29:26.315 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 11:29:26.317 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-20 11:29:26.423 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 228715046496754800539246530448326389900488848053
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 20 11:16:36 UTC 2022
           Final Date: Wed May 19 11:16:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:b9:8d:55:bf:16:8d:be:fc:2c:f0:ca:4d:d8:68:62:27:75:b1:fa]
            modulus: af1eee78c51da4828dacb9e87fdce2f5630a6fb27598c9826752af9f7a7f290f7dcff85494db9de184bd9406d1e4b4073d7977ae2698d8da5d8d7ad5fe71dce356857d1bf6e78ab02a3dfa3826adbb34ee72fbcd08ba03737945d1eab3634d2b440995acc1311f29481f60d9c53ba277af9b6f0abb514a6b1c4692cac76e644ac072db28b1e90fbbcc6fef702eb839cc8bbcd7b139ba44e94d5ee9a8514d1672d003dec34876d7117d7b0f08111a8c1e87482717b7ac4ee17a5dcbcd57a20eba34417c1994cec69fa4e79b8f63003d429368b62f7a48d92eb9bdb4ac5cfe80700888e5a4f7c133229b7e1f9ddab945765615981149a673008409c9f82e1b6660394b1b1117b9d653850e92b506ac9c885cd7f78d4f2b8fb9e9d02271f01e8677159127b1a60bcb3dbdbbdc9429e74b546a7819149aa76a31f276d9059c186cd24883856ed02aadb209f680ca406e3fe3984b19bf2826257d6f39bae4b79133fb47b7ff4f31de2472f3840dfd39da1f80fa160d3ff58e4d0cb221755301d39bd7
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2d3fb8235a766e3b0eedce22d7f61bd58bb7722f
                       1f6bde3360d319b23437d8762ff74c9e43d3aa8a
                       c1d7f467f4af2abe07af96f94923709e0520d751
                       f1a7b37edf9f003308c4dcfcf23897abde34cc61
                       daa8cb660128c0b5d2480c74ebe8cd585cc52bb5
                       74db062753e45248c74a64fe890659bd3c02b48b
                       4a6be0cca554458db7fe24230e4ecfa093c0aa3b
                       22c00dde0b66db045e7f2cc0e281c652451156c1
                       048215ef6f6fee3e47b612514c5a75fd8d8470fa
                       ff1dedc9492a94cdc3df0c21ebf6872f90d23a3e
                       556c5139166d5882ffb33a0bcbfff812cf44d79e
                       78684a3582870f48baff9687ccead5f175c1f72f
                       96a41bb2f6281eab34f14bdb435b8b9ac6e28658
                       313365d2cb65996ead7f767d207d7c664da77abf
                       e1eeb54204ee29fb05a8b7bcfb6c2fdc224447bf
                       1acf48148a803fbbc17c2dd27aed5dd1d73f5c81
                       dbdcc7da3b801e886cf8e1f6a486be8f8033af49
                       7e4895130ac7b07a94816620ba014a5c314c291c
                       f6ae5ee1225d90fb61016195c3f7aa895d1bb751
                       6444a3a2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [86:63:bf:9e:4c:4b:9e:ea:30:6c:a2:54:4f:42:9e:6d:1c:63:7b:7a]
            modulus: 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
    public exponent: 10001

] 
2022-05-20 13:58:42.567  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-20 13:58:42.569 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-20 13:58:42.571 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-20 13:58:42.572 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-20 13:58:42.573  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-20 13:58:42.573  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-20 13:58:42.574  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-20 13:58:42.574 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-20 13:58:42.574 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-20 13:58:42.575 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-20 13:58:42.587 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-20 13:58:42.587 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 13:58:42.588 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 13:58:42.588 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 13:58:42.802  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-20 13:58:42.803  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-20 13:58:42.803 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-20 13:58:42.804 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 13:58:42.808  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-20 13:58:42.809  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-20 13:58:42.810 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 13:58:42.810 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 13:58:42.810 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 13:58:42.812 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 13:58:42.813 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 13:58:42.813 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 13:58:42.814 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 13:58:42.815 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 13:58:42.815 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 13:58:42.901 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-20 13:58:42.910 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 228715046496754800539246530448326389900488848053
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 20 11:16:36 UTC 2022
           Final Date: Wed May 19 11:16:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:b9:8d:55:bf:16:8d:be:fc:2c:f0:ca:4d:d8:68:62:27:75:b1:fa]
            modulus: af1eee78c51da4828dacb9e87fdce2f5630a6fb27598c9826752af9f7a7f290f7dcff85494db9de184bd9406d1e4b4073d7977ae2698d8da5d8d7ad5fe71dce356857d1bf6e78ab02a3dfa3826adbb34ee72fbcd08ba03737945d1eab3634d2b440995acc1311f29481f60d9c53ba277af9b6f0abb514a6b1c4692cac76e644ac072db28b1e90fbbcc6fef702eb839cc8bbcd7b139ba44e94d5ee9a8514d1672d003dec34876d7117d7b0f08111a8c1e87482717b7ac4ee17a5dcbcd57a20eba34417c1994cec69fa4e79b8f63003d429368b62f7a48d92eb9bdb4ac5cfe80700888e5a4f7c133229b7e1f9ddab945765615981149a673008409c9f82e1b6660394b1b1117b9d653850e92b506ac9c885cd7f78d4f2b8fb9e9d02271f01e8677159127b1a60bcb3dbdbbdc9429e74b546a7819149aa76a31f276d9059c186cd24883856ed02aadb209f680ca406e3fe3984b19bf2826257d6f39bae4b79133fb47b7ff4f31de2472f3840dfd39da1f80fa160d3ff58e4d0cb221755301d39bd7
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2d3fb8235a766e3b0eedce22d7f61bd58bb7722f
                       1f6bde3360d319b23437d8762ff74c9e43d3aa8a
                       c1d7f467f4af2abe07af96f94923709e0520d751
                       f1a7b37edf9f003308c4dcfcf23897abde34cc61
                       daa8cb660128c0b5d2480c74ebe8cd585cc52bb5
                       74db062753e45248c74a64fe890659bd3c02b48b
                       4a6be0cca554458db7fe24230e4ecfa093c0aa3b
                       22c00dde0b66db045e7f2cc0e281c652451156c1
                       048215ef6f6fee3e47b612514c5a75fd8d8470fa
                       ff1dedc9492a94cdc3df0c21ebf6872f90d23a3e
                       556c5139166d5882ffb33a0bcbfff812cf44d79e
                       78684a3582870f48baff9687ccead5f175c1f72f
                       96a41bb2f6281eab34f14bdb435b8b9ac6e28658
                       313365d2cb65996ead7f767d207d7c664da77abf
                       e1eeb54204ee29fb05a8b7bcfb6c2fdc224447bf
                       1acf48148a803fbbc17c2dd27aed5dd1d73f5c81
                       dbdcc7da3b801e886cf8e1f6a486be8f8033af49
                       7e4895130ac7b07a94816620ba014a5c314c291c
                       f6ae5ee1225d90fb61016195c3f7aa895d1bb751
                       6444a3a2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9d:1a:6b:0a:9a:24:ca:92:24:6e:de:60:68:d9:59:9a:38:83:43:cd]
            modulus: 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
    public exponent: 10001

] 
2022-05-20 14:03:18.288  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-20 14:03:18.290 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-20 14:03:18.292 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-20 14:03:18.293 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-20 14:03:18.293  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-20 14:03:18.294  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-20 14:03:18.294  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-20 14:03:18.295 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-20 14:03:18.295 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-20 14:03:18.295 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-20 14:03:18.305 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-20 14:03:18.305 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 14:03:18.306 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 14:03:18.306 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 14:03:18.413  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-20 14:03:18.414  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-20 14:03:18.414 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-20 14:03:18.414 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 14:03:18.416  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-20 14:03:18.417  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-20 14:03:18.417 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:03:18.418 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:03:18.418 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:03:18.419 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:03:18.419 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:03:18.419 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:03:18.420 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:03:18.420 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:03:18.420 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:03:18.421 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-20 14:03:18.424 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 228715046496754800539246530448326389900488848053
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 20 11:16:36 UTC 2022
           Final Date: Wed May 19 11:16:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:b9:8d:55:bf:16:8d:be:fc:2c:f0:ca:4d:d8:68:62:27:75:b1:fa]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2d3fb8235a766e3b0eedce22d7f61bd58bb7722f
                       1f6bde3360d319b23437d8762ff74c9e43d3aa8a
                       c1d7f467f4af2abe07af96f94923709e0520d751
                       f1a7b37edf9f003308c4dcfcf23897abde34cc61
                       daa8cb660128c0b5d2480c74ebe8cd585cc52bb5
                       74db062753e45248c74a64fe890659bd3c02b48b
                       4a6be0cca554458db7fe24230e4ecfa093c0aa3b
                       22c00dde0b66db045e7f2cc0e281c652451156c1
                       048215ef6f6fee3e47b612514c5a75fd8d8470fa
                       ff1dedc9492a94cdc3df0c21ebf6872f90d23a3e
                       556c5139166d5882ffb33a0bcbfff812cf44d79e
                       78684a3582870f48baff9687ccead5f175c1f72f
                       96a41bb2f6281eab34f14bdb435b8b9ac6e28658
                       313365d2cb65996ead7f767d207d7c664da77abf
                       e1eeb54204ee29fb05a8b7bcfb6c2fdc224447bf
                       1acf48148a803fbbc17c2dd27aed5dd1d73f5c81
                       dbdcc7da3b801e886cf8e1f6a486be8f8033af49
                       7e4895130ac7b07a94816620ba014a5c314c291c
                       f6ae5ee1225d90fb61016195c3f7aa895d1bb751
                       6444a3a2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a8:87:67:49:3d:a9:15:a5:75:9c:4a:6a:70:e4:36:14:d5:3a:f7:87]
            modulus: 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
    public exponent: 10001

] 
2022-05-20 14:05:57.924  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-20 14:05:57.925 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-20 14:05:57.927 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-20 14:05:57.928 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-20 14:05:57.928  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-20 14:05:57.929  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-20 14:05:57.929  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-20 14:05:57.930 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-20 14:05:57.930 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-20 14:05:57.930 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-20 14:05:57.937 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-20 14:05:57.938 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 14:05:57.938 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 14:05:57.938 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 14:05:58.112  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-20 14:05:58.113  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-20 14:05:58.113 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-20 14:05:58.113 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 14:05:58.115  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-20 14:05:58.115  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-20 14:05:58.116 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:05:58.116 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:05:58.117 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:05:58.117 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:05:58.118 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:05:58.118 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:05:58.119 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:05:58.119 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:05:58.119 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:05:58.120 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-20 14:05:58.123 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 228715046496754800539246530448326389900488848053
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 20 11:16:36 UTC 2022
           Final Date: Wed May 19 11:16:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:b9:8d:55:bf:16:8d:be:fc:2c:f0:ca:4d:d8:68:62:27:75:b1:fa]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2d3fb8235a766e3b0eedce22d7f61bd58bb7722f
                       1f6bde3360d319b23437d8762ff74c9e43d3aa8a
                       c1d7f467f4af2abe07af96f94923709e0520d751
                       f1a7b37edf9f003308c4dcfcf23897abde34cc61
                       daa8cb660128c0b5d2480c74ebe8cd585cc52bb5
                       74db062753e45248c74a64fe890659bd3c02b48b
                       4a6be0cca554458db7fe24230e4ecfa093c0aa3b
                       22c00dde0b66db045e7f2cc0e281c652451156c1
                       048215ef6f6fee3e47b612514c5a75fd8d8470fa
                       ff1dedc9492a94cdc3df0c21ebf6872f90d23a3e
                       556c5139166d5882ffb33a0bcbfff812cf44d79e
                       78684a3582870f48baff9687ccead5f175c1f72f
                       96a41bb2f6281eab34f14bdb435b8b9ac6e28658
                       313365d2cb65996ead7f767d207d7c664da77abf
                       e1eeb54204ee29fb05a8b7bcfb6c2fdc224447bf
                       1acf48148a803fbbc17c2dd27aed5dd1d73f5c81
                       dbdcc7da3b801e886cf8e1f6a486be8f8033af49
                       7e4895130ac7b07a94816620ba014a5c314c291c
                       f6ae5ee1225d90fb61016195c3f7aa895d1bb751
                       6444a3a2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5b:69:a0:4e:d8:c5:6f:a1:5c:36:13:5f:9c:23:84:6e:c3:dd:16:b0]
            modulus: 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
    public exponent: 10001

] 
2022-05-20 14:08:17.347  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-20 14:08:17.349 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-20 14:08:17.351 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-20 14:08:17.352 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-20 14:08:17.352  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-20 14:08:17.353  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-20 14:08:17.354  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-20 14:08:17.354 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-20 14:08:17.355 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-20 14:08:17.355 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-20 14:08:17.360 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-20 14:08:17.360 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 14:08:17.360 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 14:08:17.361 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 14:08:17.478  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-20 14:08:17.479  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-20 14:08:17.479 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-20 14:08:17.480 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 14:08:17.502  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-20 14:08:17.503  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-20 14:08:17.504 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:08:17.504 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:08:17.505 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:08:17.506 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:08:17.506 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:08:17.506 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:08:17.507 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:08:17.508 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:08:17.508 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:08:17.509 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-20 14:08:17.514 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 228715046496754800539246530448326389900488848053
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 20 11:16:36 UTC 2022
           Final Date: Wed May 19 11:16:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:b9:8d:55:bf:16:8d:be:fc:2c:f0:ca:4d:d8:68:62:27:75:b1:fa]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2d3fb8235a766e3b0eedce22d7f61bd58bb7722f
                       1f6bde3360d319b23437d8762ff74c9e43d3aa8a
                       c1d7f467f4af2abe07af96f94923709e0520d751
                       f1a7b37edf9f003308c4dcfcf23897abde34cc61
                       daa8cb660128c0b5d2480c74ebe8cd585cc52bb5
                       74db062753e45248c74a64fe890659bd3c02b48b
                       4a6be0cca554458db7fe24230e4ecfa093c0aa3b
                       22c00dde0b66db045e7f2cc0e281c652451156c1
                       048215ef6f6fee3e47b612514c5a75fd8d8470fa
                       ff1dedc9492a94cdc3df0c21ebf6872f90d23a3e
                       556c5139166d5882ffb33a0bcbfff812cf44d79e
                       78684a3582870f48baff9687ccead5f175c1f72f
                       96a41bb2f6281eab34f14bdb435b8b9ac6e28658
                       313365d2cb65996ead7f767d207d7c664da77abf
                       e1eeb54204ee29fb05a8b7bcfb6c2fdc224447bf
                       1acf48148a803fbbc17c2dd27aed5dd1d73f5c81
                       dbdcc7da3b801e886cf8e1f6a486be8f8033af49
                       7e4895130ac7b07a94816620ba014a5c314c291c
                       f6ae5ee1225d90fb61016195c3f7aa895d1bb751
                       6444a3a2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d4:00:a2:4a:cc:1c:87:8c:59:25:a7:42:fa:3c:fc:98:0a:c1:a8:0f]
            modulus: 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
    public exponent: 10001

] 
2022-05-20 14:12:43.308  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-20 14:12:43.309 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-20 14:12:43.316 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-20 14:12:43.317 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-20 14:12:43.317  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-20 14:12:43.318  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-20 14:12:43.318  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-20 14:12:43.318 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-20 14:12:43.318 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-20 14:12:43.319 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-20 14:12:43.324 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-20 14:12:43.324 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 14:12:43.324 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 14:12:43.325 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 14:12:43.485  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-20 14:12:43.486  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-20 14:12:43.486 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-20 14:12:43.486 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 14:12:43.488  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-20 14:12:43.488  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-20 14:12:43.488 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:12:43.501 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:12:43.501 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:12:43.503 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:12:43.503 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:12:43.504 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:12:43.505 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:12:43.505 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:12:43.506 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:12:43.507 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-20 14:12:43.511 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 228715046496754800539246530448326389900488848053
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 20 11:16:36 UTC 2022
           Final Date: Wed May 19 11:16:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:b9:8d:55:bf:16:8d:be:fc:2c:f0:ca:4d:d8:68:62:27:75:b1:fa]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2d3fb8235a766e3b0eedce22d7f61bd58bb7722f
                       1f6bde3360d319b23437d8762ff74c9e43d3aa8a
                       c1d7f467f4af2abe07af96f94923709e0520d751
                       f1a7b37edf9f003308c4dcfcf23897abde34cc61
                       daa8cb660128c0b5d2480c74ebe8cd585cc52bb5
                       74db062753e45248c74a64fe890659bd3c02b48b
                       4a6be0cca554458db7fe24230e4ecfa093c0aa3b
                       22c00dde0b66db045e7f2cc0e281c652451156c1
                       048215ef6f6fee3e47b612514c5a75fd8d8470fa
                       ff1dedc9492a94cdc3df0c21ebf6872f90d23a3e
                       556c5139166d5882ffb33a0bcbfff812cf44d79e
                       78684a3582870f48baff9687ccead5f175c1f72f
                       96a41bb2f6281eab34f14bdb435b8b9ac6e28658
                       313365d2cb65996ead7f767d207d7c664da77abf
                       e1eeb54204ee29fb05a8b7bcfb6c2fdc224447bf
                       1acf48148a803fbbc17c2dd27aed5dd1d73f5c81
                       dbdcc7da3b801e886cf8e1f6a486be8f8033af49
                       7e4895130ac7b07a94816620ba014a5c314c291c
                       f6ae5ee1225d90fb61016195c3f7aa895d1bb751
                       6444a3a2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [36:fb:f8:ab:87:d7:14:26:3c:bd:45:5d:9e:89:28:ae:29:d2:c9:cf]
            modulus: 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
    public exponent: 10001

] 
2022-05-20 14:17:37.785  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-20 14:17:37.786 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-20 14:17:37.788 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-20 14:17:37.788 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-20 14:17:37.789  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-20 14:17:37.789  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-20 14:17:37.789  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-20 14:17:37.790 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-20 14:17:37.790 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-20 14:17:37.790 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-20 14:17:37.795 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-20 14:17:37.795 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 14:17:37.795 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 14:17:37.796 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 14:17:37.896  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-20 14:17:37.896  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-20 14:17:37.897 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-20 14:17:37.897 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 14:17:37.899  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-20 14:17:37.899  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-20 14:17:37.899 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:17:37.900 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:17:37.900 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:17:37.900 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:17:37.900 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:17:37.901 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:17:37.901 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:17:37.902 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:17:37.902 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:17:37.903 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-20 14:17:37.905 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 228715046496754800539246530448326389900488848053
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 20 11:16:36 UTC 2022
           Final Date: Wed May 19 11:16:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:b9:8d:55:bf:16:8d:be:fc:2c:f0:ca:4d:d8:68:62:27:75:b1:fa]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2d3fb8235a766e3b0eedce22d7f61bd58bb7722f
                       1f6bde3360d319b23437d8762ff74c9e43d3aa8a
                       c1d7f467f4af2abe07af96f94923709e0520d751
                       f1a7b37edf9f003308c4dcfcf23897abde34cc61
                       daa8cb660128c0b5d2480c74ebe8cd585cc52bb5
                       74db062753e45248c74a64fe890659bd3c02b48b
                       4a6be0cca554458db7fe24230e4ecfa093c0aa3b
                       22c00dde0b66db045e7f2cc0e281c652451156c1
                       048215ef6f6fee3e47b612514c5a75fd8d8470fa
                       ff1dedc9492a94cdc3df0c21ebf6872f90d23a3e
                       556c5139166d5882ffb33a0bcbfff812cf44d79e
                       78684a3582870f48baff9687ccead5f175c1f72f
                       96a41bb2f6281eab34f14bdb435b8b9ac6e28658
                       313365d2cb65996ead7f767d207d7c664da77abf
                       e1eeb54204ee29fb05a8b7bcfb6c2fdc224447bf
                       1acf48148a803fbbc17c2dd27aed5dd1d73f5c81
                       dbdcc7da3b801e886cf8e1f6a486be8f8033af49
                       7e4895130ac7b07a94816620ba014a5c314c291c
                       f6ae5ee1225d90fb61016195c3f7aa895d1bb751
                       6444a3a2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9e:10:2d:27:6f:7a:34:12:8c:7e:82:82:07:58:53:5e:93:08:7e:7e]
            modulus: e71fbe4f45b36fd218387524435aba97d82be532f0cd6948722ea9f8081307015baab2399c21d8ad66a05839855ea05e4e4ab60cf81531330fd7ea4f58491059a759de2511043776195ec2bd1668aec242ca093cfb1ddfc4fe6a50deb328224ac1d54ef2d9983f74dd53bf0a208f610059677066e926cf1fe6caaa6ffe0f07e101dd72a226169751e17b05020707a9605623d1cd4fdc305c239c40b637ed16ca6e391e0459a4a1599e132b5689bf930660ed7a91a304fa93773a9c129e56b661812ca033652749332e772ed1b1a82f1e25634b6027c7ea71e8198906097b67711ae9a37599f5c66ebb93be5dfbc9a2fd4d6844f6a311c4d6d035c9823116d059
    public exponent: 10001

] 
2022-05-20 14:23:59.694  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-20 14:23:59.696 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-20 14:23:59.697 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-20 14:23:59.698 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-20 14:23:59.699  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-20 14:23:59.699  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-20 14:23:59.700  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-20 14:23:59.700 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-20 14:23:59.701 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-20 14:23:59.702 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-20 14:23:59.707 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-20 14:23:59.707 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 14:23:59.707 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 14:23:59.708 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 14:23:59.783  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-20 14:23:59.783  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-20 14:23:59.784 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-20 14:23:59.784 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 14:23:59.802  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-20 14:23:59.802  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-20 14:23:59.803 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:23:59.803 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:23:59.803 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:23:59.804 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:23:59.804 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:23:59.804 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:23:59.805 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:23:59.806 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:23:59.806 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:23:59.807 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-20 14:23:59.810 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 228715046496754800539246530448326389900488848053
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 20 11:16:36 UTC 2022
           Final Date: Wed May 19 11:16:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:b9:8d:55:bf:16:8d:be:fc:2c:f0:ca:4d:d8:68:62:27:75:b1:fa]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2d3fb8235a766e3b0eedce22d7f61bd58bb7722f
                       1f6bde3360d319b23437d8762ff74c9e43d3aa8a
                       c1d7f467f4af2abe07af96f94923709e0520d751
                       f1a7b37edf9f003308c4dcfcf23897abde34cc61
                       daa8cb660128c0b5d2480c74ebe8cd585cc52bb5
                       74db062753e45248c74a64fe890659bd3c02b48b
                       4a6be0cca554458db7fe24230e4ecfa093c0aa3b
                       22c00dde0b66db045e7f2cc0e281c652451156c1
                       048215ef6f6fee3e47b612514c5a75fd8d8470fa
                       ff1dedc9492a94cdc3df0c21ebf6872f90d23a3e
                       556c5139166d5882ffb33a0bcbfff812cf44d79e
                       78684a3582870f48baff9687ccead5f175c1f72f
                       96a41bb2f6281eab34f14bdb435b8b9ac6e28658
                       313365d2cb65996ead7f767d207d7c664da77abf
                       e1eeb54204ee29fb05a8b7bcfb6c2fdc224447bf
                       1acf48148a803fbbc17c2dd27aed5dd1d73f5c81
                       dbdcc7da3b801e886cf8e1f6a486be8f8033af49
                       7e4895130ac7b07a94816620ba014a5c314c291c
                       f6ae5ee1225d90fb61016195c3f7aa895d1bb751
                       6444a3a2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [21:fd:06:46:61:90:9c:3f:eb:9f:a9:50:9f:bb:c1:fa:d4:43:92:86]
            modulus: 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
    public exponent: 10001

] 
2022-05-20 14:24:56.624  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-20 14:24:56.625 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-20 14:24:56.626 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-20 14:24:56.626 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-20 14:24:56.626  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-20 14:24:56.627  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-20 14:24:56.627  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-20 14:24:56.627 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-20 14:24:56.628 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-20 14:24:56.628 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-20 14:24:56.634 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-20 14:24:56.634 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 14:24:56.635 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 14:24:56.635 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 14:24:56.728  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-20 14:24:56.729  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-20 14:24:56.729 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-20 14:24:56.730 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 14:24:56.731  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-20 14:24:56.732  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-20 14:24:56.732 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:24:56.733 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:24:56.733 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:24:56.733 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:24:56.733 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:24:56.734 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:24:56.734 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:24:56.734 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:24:56.735 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:24:56.735 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-20 14:24:56.804 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 228715046496754800539246530448326389900488848053
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 20 11:16:36 UTC 2022
           Final Date: Wed May 19 11:16:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:b9:8d:55:bf:16:8d:be:fc:2c:f0:ca:4d:d8:68:62:27:75:b1:fa]
            modulus: af1eee78c51da4828dacb9e87fdce2f5630a6fb27598c9826752af9f7a7f290f7dcff85494db9de184bd9406d1e4b4073d7977ae2698d8da5d8d7ad5fe71dce356857d1bf6e78ab02a3dfa3826adbb34ee72fbcd08ba03737945d1eab3634d2b440995acc1311f29481f60d9c53ba277af9b6f0abb514a6b1c4692cac76e644ac072db28b1e90fbbcc6fef702eb839cc8bbcd7b139ba44e94d5ee9a8514d1672d003dec34876d7117d7b0f08111a8c1e87482717b7ac4ee17a5dcbcd57a20eba34417c1994cec69fa4e79b8f63003d429368b62f7a48d92eb9bdb4ac5cfe80700888e5a4f7c133229b7e1f9ddab945765615981149a673008409c9f82e1b6660394b1b1117b9d653850e92b506ac9c885cd7f78d4f2b8fb9e9d02271f01e8677159127b1a60bcb3dbdbbdc9429e74b546a7819149aa76a31f276d9059c186cd24883856ed02aadb209f680ca406e3fe3984b19bf2826257d6f39bae4b79133fb47b7ff4f31de2472f3840dfd39da1f80fa160d3ff58e4d0cb221755301d39bd7
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2d3fb8235a766e3b0eedce22d7f61bd58bb7722f
                       1f6bde3360d319b23437d8762ff74c9e43d3aa8a
                       c1d7f467f4af2abe07af96f94923709e0520d751
                       f1a7b37edf9f003308c4dcfcf23897abde34cc61
                       daa8cb660128c0b5d2480c74ebe8cd585cc52bb5
                       74db062753e45248c74a64fe890659bd3c02b48b
                       4a6be0cca554458db7fe24230e4ecfa093c0aa3b
                       22c00dde0b66db045e7f2cc0e281c652451156c1
                       048215ef6f6fee3e47b612514c5a75fd8d8470fa
                       ff1dedc9492a94cdc3df0c21ebf6872f90d23a3e
                       556c5139166d5882ffb33a0bcbfff812cf44d79e
                       78684a3582870f48baff9687ccead5f175c1f72f
                       96a41bb2f6281eab34f14bdb435b8b9ac6e28658
                       313365d2cb65996ead7f767d207d7c664da77abf
                       e1eeb54204ee29fb05a8b7bcfb6c2fdc224447bf
                       1acf48148a803fbbc17c2dd27aed5dd1d73f5c81
                       dbdcc7da3b801e886cf8e1f6a486be8f8033af49
                       7e4895130ac7b07a94816620ba014a5c314c291c
                       f6ae5ee1225d90fb61016195c3f7aa895d1bb751
                       6444a3a2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2d:b0:8c:e9:2d:c4:32:0f:a8:1d:2b:4b:7f:62:3b:d3:9d:6a:d8:c5]
            modulus: bcb87885857e89ab96752fa916ff96c33063d7e35b7155f40b726f26136cf615cdcbeed34af690f5138124e5095b285603a5f39af226d41d3791927f4fff63bfa0b44afbc38d601344c941da68df659b874b8d2a2aab29cef54ad8509828e1c0655b6c4083b914fa37d8167a663a45210c6ec10cd44ccaec0f88034d079239e1e899250f9500eb69f56fae31845516799f86c13175c2ae6fe5eb6bf88b12a63964c773da73a2418b9b3f7c403a674deda2cf199fc93b0288776e5373948e91efda7502f74a9b12063d5208322d8db5211851f8eb225e3a1753e3163a26cb136bd6d563f00416685827942e2e9c0204c77f2d0e482937ae410b566e07a8473873
    public exponent: 10001

] 
2022-05-20 14:28:55.658  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-20 14:28:55.660 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-20 14:28:55.662 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-20 14:28:55.663 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-20 14:28:55.663  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-20 14:28:55.664  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-20 14:28:55.664  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-20 14:28:55.664 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-20 14:28:55.664 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-20 14:28:55.665 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-20 14:28:55.669 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-20 14:28:55.669 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 14:28:55.669 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 14:28:55.670 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 14:28:55.763  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-20 14:28:55.763  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-20 14:28:55.764 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-20 14:28:55.764 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 14:28:55.766  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-20 14:28:55.766  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-20 14:28:55.767 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:28:55.767 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:28:55.767 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:28:55.767 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:28:55.768 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:28:55.768 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:28:55.769 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:28:55.769 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:28:55.769 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:28:55.770 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-20 14:28:55.773 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 228715046496754800539246530448326389900488848053
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 20 11:16:36 UTC 2022
           Final Date: Wed May 19 11:16:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:b9:8d:55:bf:16:8d:be:fc:2c:f0:ca:4d:d8:68:62:27:75:b1:fa]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2d3fb8235a766e3b0eedce22d7f61bd58bb7722f
                       1f6bde3360d319b23437d8762ff74c9e43d3aa8a
                       c1d7f467f4af2abe07af96f94923709e0520d751
                       f1a7b37edf9f003308c4dcfcf23897abde34cc61
                       daa8cb660128c0b5d2480c74ebe8cd585cc52bb5
                       74db062753e45248c74a64fe890659bd3c02b48b
                       4a6be0cca554458db7fe24230e4ecfa093c0aa3b
                       22c00dde0b66db045e7f2cc0e281c652451156c1
                       048215ef6f6fee3e47b612514c5a75fd8d8470fa
                       ff1dedc9492a94cdc3df0c21ebf6872f90d23a3e
                       556c5139166d5882ffb33a0bcbfff812cf44d79e
                       78684a3582870f48baff9687ccead5f175c1f72f
                       96a41bb2f6281eab34f14bdb435b8b9ac6e28658
                       313365d2cb65996ead7f767d207d7c664da77abf
                       e1eeb54204ee29fb05a8b7bcfb6c2fdc224447bf
                       1acf48148a803fbbc17c2dd27aed5dd1d73f5c81
                       dbdcc7da3b801e886cf8e1f6a486be8f8033af49
                       7e4895130ac7b07a94816620ba014a5c314c291c
                       f6ae5ee1225d90fb61016195c3f7aa895d1bb751
                       6444a3a2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bb:aa:28:a2:f9:c7:d0:a8:98:df:95:14:04:b3:90:88:7a:52:35:36]
            modulus: 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
    public exponent: 10001

] 
2022-05-20 14:36:06.529  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-20 14:36:06.530 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-20 14:36:06.532 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-20 14:36:06.532 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-20 14:36:06.533  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-20 14:36:06.533  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-20 14:36:06.533  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-20 14:36:06.533 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-20 14:36:06.534 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-20 14:36:06.534 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-20 14:36:06.541 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-20 14:36:06.541 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 14:36:06.541 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 14:36:06.542 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 14:36:06.627  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-20 14:36:06.628  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-20 14:36:06.629 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-20 14:36:06.629 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 14:36:06.631  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-20 14:36:06.632  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-20 14:36:06.632 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:36:06.633 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:36:06.633 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:36:06.634 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:36:06.635 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:36:06.635 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:36:06.636 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:36:06.636 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:36:06.637 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:36:06.638 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-20 14:36:06.642 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 228715046496754800539246530448326389900488848053
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 20 11:16:36 UTC 2022
           Final Date: Wed May 19 11:16:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:b9:8d:55:bf:16:8d:be:fc:2c:f0:ca:4d:d8:68:62:27:75:b1:fa]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2d3fb8235a766e3b0eedce22d7f61bd58bb7722f
                       1f6bde3360d319b23437d8762ff74c9e43d3aa8a
                       c1d7f467f4af2abe07af96f94923709e0520d751
                       f1a7b37edf9f003308c4dcfcf23897abde34cc61
                       daa8cb660128c0b5d2480c74ebe8cd585cc52bb5
                       74db062753e45248c74a64fe890659bd3c02b48b
                       4a6be0cca554458db7fe24230e4ecfa093c0aa3b
                       22c00dde0b66db045e7f2cc0e281c652451156c1
                       048215ef6f6fee3e47b612514c5a75fd8d8470fa
                       ff1dedc9492a94cdc3df0c21ebf6872f90d23a3e
                       556c5139166d5882ffb33a0bcbfff812cf44d79e
                       78684a3582870f48baff9687ccead5f175c1f72f
                       96a41bb2f6281eab34f14bdb435b8b9ac6e28658
                       313365d2cb65996ead7f767d207d7c664da77abf
                       e1eeb54204ee29fb05a8b7bcfb6c2fdc224447bf
                       1acf48148a803fbbc17c2dd27aed5dd1d73f5c81
                       dbdcc7da3b801e886cf8e1f6a486be8f8033af49
                       7e4895130ac7b07a94816620ba014a5c314c291c
                       f6ae5ee1225d90fb61016195c3f7aa895d1bb751
                       6444a3a2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4e:64:af:f3:17:0f:bf:03:73:14:5a:d8:c4:a5:76:b7:47:22:10:8e]
            modulus: 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
    public exponent: 10001

] 
2022-05-20 14:36:30.864  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-20 14:36:30.865 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-20 14:36:30.866 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-20 14:36:30.866 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-20 14:36:30.867  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-20 14:36:30.867  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-20 14:36:30.867  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-20 14:36:30.867 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-20 14:36:30.867 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-20 14:36:30.868 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-20 14:36:30.901 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-20 14:36:30.902 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 14:36:30.902 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 14:36:30.903 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 14:36:31.002  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-20 14:36:31.002  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-20 14:36:31.003 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-20 14:36:31.003 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 14:36:31.005  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-20 14:36:31.005  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-20 14:36:31.006 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:36:31.006 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:36:31.006 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:36:31.007 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:36:31.007 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:36:31.008 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:36:31.008 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:36:31.009 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:36:31.009 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:36:31.010 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-20 14:36:31.013 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 228715046496754800539246530448326389900488848053
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 20 11:16:36 UTC 2022
           Final Date: Wed May 19 11:16:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:b9:8d:55:bf:16:8d:be:fc:2c:f0:ca:4d:d8:68:62:27:75:b1:fa]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2d3fb8235a766e3b0eedce22d7f61bd58bb7722f
                       1f6bde3360d319b23437d8762ff74c9e43d3aa8a
                       c1d7f467f4af2abe07af96f94923709e0520d751
                       f1a7b37edf9f003308c4dcfcf23897abde34cc61
                       daa8cb660128c0b5d2480c74ebe8cd585cc52bb5
                       74db062753e45248c74a64fe890659bd3c02b48b
                       4a6be0cca554458db7fe24230e4ecfa093c0aa3b
                       22c00dde0b66db045e7f2cc0e281c652451156c1
                       048215ef6f6fee3e47b612514c5a75fd8d8470fa
                       ff1dedc9492a94cdc3df0c21ebf6872f90d23a3e
                       556c5139166d5882ffb33a0bcbfff812cf44d79e
                       78684a3582870f48baff9687ccead5f175c1f72f
                       96a41bb2f6281eab34f14bdb435b8b9ac6e28658
                       313365d2cb65996ead7f767d207d7c664da77abf
                       e1eeb54204ee29fb05a8b7bcfb6c2fdc224447bf
                       1acf48148a803fbbc17c2dd27aed5dd1d73f5c81
                       dbdcc7da3b801e886cf8e1f6a486be8f8033af49
                       7e4895130ac7b07a94816620ba014a5c314c291c
                       f6ae5ee1225d90fb61016195c3f7aa895d1bb751
                       6444a3a2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fc:82:6d:62:31:72:75:d8:a8:b1:e7:0c:db:9f:a2:95:bc:cb:37:df]
            modulus: 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
    public exponent: 10001

] 
2022-05-20 14:38:21.684  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-20 14:38:21.685 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-20 14:38:21.686 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-20 14:38:21.686 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-20 14:38:21.686  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-20 14:38:21.687  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-20 14:38:21.687  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-20 14:38:21.687 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-20 14:38:21.687 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-20 14:38:21.688 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-20 14:38:21.693 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-20 14:38:21.693 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 14:38:21.694 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 14:38:21.694 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 14:38:21.794  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-20 14:38:21.795  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-20 14:38:21.795 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-20 14:38:21.796 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 14:38:21.798  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-20 14:38:21.798  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-20 14:38:21.799 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:38:21.799 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:38:21.799 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:38:21.800 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:38:21.800 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:38:21.800 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:38:21.801 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:38:21.802 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:38:21.802 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:38:21.803 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-20 14:38:21.805 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 228715046496754800539246530448326389900488848053
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 20 11:16:36 UTC 2022
           Final Date: Wed May 19 11:16:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:b9:8d:55:bf:16:8d:be:fc:2c:f0:ca:4d:d8:68:62:27:75:b1:fa]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2d3fb8235a766e3b0eedce22d7f61bd58bb7722f
                       1f6bde3360d319b23437d8762ff74c9e43d3aa8a
                       c1d7f467f4af2abe07af96f94923709e0520d751
                       f1a7b37edf9f003308c4dcfcf23897abde34cc61
                       daa8cb660128c0b5d2480c74ebe8cd585cc52bb5
                       74db062753e45248c74a64fe890659bd3c02b48b
                       4a6be0cca554458db7fe24230e4ecfa093c0aa3b
                       22c00dde0b66db045e7f2cc0e281c652451156c1
                       048215ef6f6fee3e47b612514c5a75fd8d8470fa
                       ff1dedc9492a94cdc3df0c21ebf6872f90d23a3e
                       556c5139166d5882ffb33a0bcbfff812cf44d79e
                       78684a3582870f48baff9687ccead5f175c1f72f
                       96a41bb2f6281eab34f14bdb435b8b9ac6e28658
                       313365d2cb65996ead7f767d207d7c664da77abf
                       e1eeb54204ee29fb05a8b7bcfb6c2fdc224447bf
                       1acf48148a803fbbc17c2dd27aed5dd1d73f5c81
                       dbdcc7da3b801e886cf8e1f6a486be8f8033af49
                       7e4895130ac7b07a94816620ba014a5c314c291c
                       f6ae5ee1225d90fb61016195c3f7aa895d1bb751
                       6444a3a2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fe:1e:51:16:2c:25:7c:2b:c6:0a:63:c5:d4:ba:60:59:89:29:be:3e]
            modulus: bec841cd1a0b39e728aa4862e9bad7d8691eb80df277d971390ae31cf028914b106593de0fa2992de0efab86cc6b680f304cf3fdce5c732ff639e00b61b10cb036b053f0d596e2b0108101d5e4150dc2305ed239c26c04ab5f56d7df30a09bbed4a31083249bfc12672e0c64ff88acbdcfa78a66673e7558f657758cdba9b2dee16674515e9650b7713d428e24076c404e0e3563989a519ed92d49b7d47e525e80b76c4f37a926d73dceabf48980f2eb79fe37ea0f278c9a631a6c795e6fcca1f4348c157340aaad03de473219df102065146de97661e2fb07304125a209ba0b6cd7d24fe606aaa20173dd7fb59f7b7726d145c00c3cde898d60b495445b4ec9
    public exponent: 10001

] 
2022-05-20 14:47:28.088  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-20 14:47:28.089 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-20 14:47:28.091 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-20 14:47:28.092 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-20 14:47:28.092  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-20 14:47:28.093  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-20 14:47:28.093  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-20 14:47:28.094 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-20 14:47:28.094 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-20 14:47:28.094 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-20 14:47:28.101 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-20 14:47:28.102 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 14:47:28.102 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 14:47:28.102 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 14:47:28.199  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-20 14:47:28.200  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-20 14:47:28.200 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-20 14:47:28.200 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 14:47:28.202  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-20 14:47:28.202  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-20 14:47:28.202 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:47:28.203 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:47:28.203 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:47:28.203 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:47:28.204 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:47:28.204 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:47:28.205 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:47:28.205 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:47:28.205 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:47:28.206 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-20 14:47:28.209 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 228715046496754800539246530448326389900488848053
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 20 11:16:36 UTC 2022
           Final Date: Wed May 19 11:16:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:b9:8d:55:bf:16:8d:be:fc:2c:f0:ca:4d:d8:68:62:27:75:b1:fa]
            modulus: af1eee78c51da4828dacb9e87fdce2f5630a6fb27598c9826752af9f7a7f290f7dcff85494db9de184bd9406d1e4b4073d7977ae2698d8da5d8d7ad5fe71dce356857d1bf6e78ab02a3dfa3826adbb34ee72fbcd08ba03737945d1eab3634d2b440995acc1311f29481f60d9c53ba277af9b6f0abb514a6b1c4692cac76e644ac072db28b1e90fbbcc6fef702eb839cc8bbcd7b139ba44e94d5ee9a8514d1672d003dec34876d7117d7b0f08111a8c1e87482717b7ac4ee17a5dcbcd57a20eba34417c1994cec69fa4e79b8f63003d429368b62f7a48d92eb9bdb4ac5cfe80700888e5a4f7c133229b7e1f9ddab945765615981149a673008409c9f82e1b6660394b1b1117b9d653850e92b506ac9c885cd7f78d4f2b8fb9e9d02271f01e8677159127b1a60bcb3dbdbbdc9429e74b546a7819149aa76a31f276d9059c186cd24883856ed02aadb209f680ca406e3fe3984b19bf2826257d6f39bae4b79133fb47b7ff4f31de2472f3840dfd39da1f80fa160d3ff58e4d0cb221755301d39bd7
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2d3fb8235a766e3b0eedce22d7f61bd58bb7722f
                       1f6bde3360d319b23437d8762ff74c9e43d3aa8a
                       c1d7f467f4af2abe07af96f94923709e0520d751
                       f1a7b37edf9f003308c4dcfcf23897abde34cc61
                       daa8cb660128c0b5d2480c74ebe8cd585cc52bb5
                       74db062753e45248c74a64fe890659bd3c02b48b
                       4a6be0cca554458db7fe24230e4ecfa093c0aa3b
                       22c00dde0b66db045e7f2cc0e281c652451156c1
                       048215ef6f6fee3e47b612514c5a75fd8d8470fa
                       ff1dedc9492a94cdc3df0c21ebf6872f90d23a3e
                       556c5139166d5882ffb33a0bcbfff812cf44d79e
                       78684a3582870f48baff9687ccead5f175c1f72f
                       96a41bb2f6281eab34f14bdb435b8b9ac6e28658
                       313365d2cb65996ead7f767d207d7c664da77abf
                       e1eeb54204ee29fb05a8b7bcfb6c2fdc224447bf
                       1acf48148a803fbbc17c2dd27aed5dd1d73f5c81
                       dbdcc7da3b801e886cf8e1f6a486be8f8033af49
                       7e4895130ac7b07a94816620ba014a5c314c291c
                       f6ae5ee1225d90fb61016195c3f7aa895d1bb751
                       6444a3a2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5c:1a:eb:fd:56:83:af:62:54:ac:d0:78:3b:3f:9b:3e:80:e2:f3:bd]
            modulus: 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
    public exponent: 10001

] 
2022-05-20 14:57:29.834  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-20 14:57:29.836 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-20 14:57:29.837 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-20 14:57:29.838 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-20 14:57:29.838  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-20 14:57:29.839  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-20 14:57:29.839  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-20 14:57:29.839 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-20 14:57:29.840 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-20 14:57:29.840 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-20 14:57:29.845 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-20 14:57:29.846 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 14:57:29.846 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-20 14:57:29.847 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 14:57:29.937  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-20 14:57:29.937  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-20 14:57:29.937 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-20 14:57:29.937 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-20 14:57:29.939  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-20 14:57:29.939  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-20 14:57:29.939 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:57:29.939 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:57:29.940 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:57:29.940 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:57:29.940 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:57:29.941 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:57:29.941 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-20 14:57:29.941 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-20 14:57:29.942 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-20 14:57:29.942 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-20 14:57:29.946 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 228715046496754800539246530448326389900488848053
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 20 11:16:36 UTC 2022
           Final Date: Wed May 19 11:16:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:b9:8d:55:bf:16:8d:be:fc:2c:f0:ca:4d:d8:68:62:27:75:b1:fa]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2d3fb8235a766e3b0eedce22d7f61bd58bb7722f
                       1f6bde3360d319b23437d8762ff74c9e43d3aa8a
                       c1d7f467f4af2abe07af96f94923709e0520d751
                       f1a7b37edf9f003308c4dcfcf23897abde34cc61
                       daa8cb660128c0b5d2480c74ebe8cd585cc52bb5
                       74db062753e45248c74a64fe890659bd3c02b48b
                       4a6be0cca554458db7fe24230e4ecfa093c0aa3b
                       22c00dde0b66db045e7f2cc0e281c652451156c1
                       048215ef6f6fee3e47b612514c5a75fd8d8470fa
                       ff1dedc9492a94cdc3df0c21ebf6872f90d23a3e
                       556c5139166d5882ffb33a0bcbfff812cf44d79e
                       78684a3582870f48baff9687ccead5f175c1f72f
                       96a41bb2f6281eab34f14bdb435b8b9ac6e28658
                       313365d2cb65996ead7f767d207d7c664da77abf
                       e1eeb54204ee29fb05a8b7bcfb6c2fdc224447bf
                       1acf48148a803fbbc17c2dd27aed5dd1d73f5c81
                       dbdcc7da3b801e886cf8e1f6a486be8f8033af49
                       7e4895130ac7b07a94816620ba014a5c314c291c
                       f6ae5ee1225d90fb61016195c3f7aa895d1bb751
                       6444a3a2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [36:d0:0d:ee:7f:e0:ce:86:21:38:8d:7a:e2:76:a9:a4:5e:96:be:c3]
            modulus: df77abc5536521a0e709947542fda3827d47f058e225727e7f4f5a473a4cf331cd1b567b24c4b68e4a32b8f18295e9e437283fa53134484e233df3775e0d61bc968a721bcb95c80e6acb8fc9de2d3aca0c4abc0d559985b99e03350bc63b58cc1d26e4bbbedce68fb1ce100e755678fe3f70829b4a6d0a323736ca567650a8eb7deb03299f25f39002cef96f8953a4858d40a90af64ab35af4a1165246926095d103ceacf3b4de7e1d1d883c9c46924479b8b8512d4c14982e4a127f622a5d3feda050e549e7aefc9710585b795abd56a649f6999beaf8d2794134d4afa00087bbecc3cccb7e6b1631f4491a1f3973a77436be18f26071737959549e10764b95
    public exponent: 10001

]