Results

By type

          2022-05-21 02:33:38,233 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-05-21 02:33:41,928 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-05-21 02:33:44.435  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
May 21, 2022 2:33:52 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
May 21, 2022 2:33:52 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
May 21, 2022 2:33:52 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
May 21, 2022 2:33:53 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-05-21 02:33:54.828 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-05-21 02:33:55.938  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-05-21 02:33:56.721  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-05-21 02:33:59.723 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-05-21 02:33:59.725 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-05-21 02:33:59.727 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-05-21 02:33:59.730 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-05-21 02:33:59.841 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-05-21 02:33:59.921 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-05-21 02:34:00.322 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-05-21 02:34:04.034 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
May 21, 2022 2:34:06 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-05-21 02:34:07.443  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 32.21 seconds (JVM running for 38.65)
May 21, 2022 2:34:11 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-05-21 02:35:31.233  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-21 02:35:31.321 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-21 02:35:31.435 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-21 02:35:31.439 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-21 02:35:31.528  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-21 02:35:31.531  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-21 02:35:31.531  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-21 02:35:31.533 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-21 02:35:31.533 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-21 02:35:31.537 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-21 02:35:31.542 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-21 02:35:31.622 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-21 02:35:31.730 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-21 02:35:31.736 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-21 02:35:31.737 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-21 02:35:31.820 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-21 02:35:33.014  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-21 02:35:33.016  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-21 02:35:33.016 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-21 02:35:33.018 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-21 02:35:33.025  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-21 02:35:33.025  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-21 02:35:33.026 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 02:35:33.027 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 02:35:33.027 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 02:35:33.037 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 02:35:33.037 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 02:35:33.038 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 02:35:33.043 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 02:35:33.119 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 02:35:33.119 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 02:35:33.121 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-21 02:35:33.227 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 468935300940118230712299918034053276582405968276
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 21 02:28:51 UTC 2022
           Final Date: Thu May 20 02:28:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:69:c0:64:39:f4:1a:bb:77:11:44:74:b8:20:43:2b:72:3e:68:db]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 58f75dd0e8c2626d2c9a5991e3c69dd3beeb4cf4
                       9a1e964dac633cae0d885a420fd6dfca6578e4a9
                       6a4125ba8ad4fbee533a3a3908d234050268bdf2
                       84df18655ee150aed55793d4012cdd834752d19f
                       c3be5db64f737d9223a4c31901ee9f42192905ef
                       5dcdf9c82c7d5ac1070d7ac475cb340d93942e6d
                       3f625124d841ca72bbc81e968d7e164dd6753573
                       8a541ce667a11dcf6bc7a65f38be5f77883755d6
                       852d943398c767ce33b8b0d5840d54b407f9759c
                       24167764b3dadf0009d0756d22aeeac79ff677ac
                       1451402b051fadbcb509b7428e91dd79b5daf9e7
                       e9d05939e00b187a9dd36a821ef73c0717d2d52f
                       6003fc5a101ab01bdb79153f6339ca7b205f78e8
                       f1bc24ad021fa80dbae6ec22c0b6c94c5785b4e1
                       595ce1deba8c720e0005675f4c186c497d98f691
                       a5cdcd87d4ee6dd1d7bd32788b0600941abd8c6c
                       74d1d0600af258445d688d605832dfae49c98c32
                       8cb8de7618ec8c6f2bb41332b48d3fdb58a344fb
                       7e1c117e98656932d8f102df858b14c57efa69b6
                       2ba48d8c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [35:4c:d0:8f:7d:c8:bd:e0:0b:d1:2c:c3:3f:4f:54:db:a2:ad:f3:0f]
            modulus: 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
    public exponent: 10001

] 
2022-05-21 05:51:51.094  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-21 05:51:51.096 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-21 05:51:51.097 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-21 05:51:51.098 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-21 05:51:51.099  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-21 05:51:51.100  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-21 05:51:51.100  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-21 05:51:51.100 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-21 05:51:51.101 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-21 05:51:51.101 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-21 05:51:51.107 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-21 05:51:51.108 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-21 05:51:51.108 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-21 05:51:51.108 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-21 05:51:51.206  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-21 05:51:51.206  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-21 05:51:51.206 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-21 05:51:51.218 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-21 05:51:51.221  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-21 05:51:51.221  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-21 05:51:51.222 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 05:51:51.222 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 05:51:51.222 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 05:51:51.223 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 05:51:51.224 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 05:51:51.224 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 05:51:51.224 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 05:51:51.225 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 05:51:51.225 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 05:51:51.226 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-21 05:51:51.229 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 468935300940118230712299918034053276582405968276
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 21 02:28:51 UTC 2022
           Final Date: Thu May 20 02:28:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:69:c0:64:39:f4:1a:bb:77:11:44:74:b8:20:43:2b:72:3e:68:db]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 58f75dd0e8c2626d2c9a5991e3c69dd3beeb4cf4
                       9a1e964dac633cae0d885a420fd6dfca6578e4a9
                       6a4125ba8ad4fbee533a3a3908d234050268bdf2
                       84df18655ee150aed55793d4012cdd834752d19f
                       c3be5db64f737d9223a4c31901ee9f42192905ef
                       5dcdf9c82c7d5ac1070d7ac475cb340d93942e6d
                       3f625124d841ca72bbc81e968d7e164dd6753573
                       8a541ce667a11dcf6bc7a65f38be5f77883755d6
                       852d943398c767ce33b8b0d5840d54b407f9759c
                       24167764b3dadf0009d0756d22aeeac79ff677ac
                       1451402b051fadbcb509b7428e91dd79b5daf9e7
                       e9d05939e00b187a9dd36a821ef73c0717d2d52f
                       6003fc5a101ab01bdb79153f6339ca7b205f78e8
                       f1bc24ad021fa80dbae6ec22c0b6c94c5785b4e1
                       595ce1deba8c720e0005675f4c186c497d98f691
                       a5cdcd87d4ee6dd1d7bd32788b0600941abd8c6c
                       74d1d0600af258445d688d605832dfae49c98c32
                       8cb8de7618ec8c6f2bb41332b48d3fdb58a344fb
                       7e1c117e98656932d8f102df858b14c57efa69b6
                       2ba48d8c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [80:e4:67:c3:41:60:ad:6e:d8:7f:37:e2:fd:19:74:3a:0a:7d:76:ad]
            modulus: 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
    public exponent: 10001

] 
2022-05-21 05:56:25.337  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-21 05:56:25.338 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-21 05:56:25.339 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-21 05:56:25.340 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-21 05:56:25.340  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-21 05:56:25.341  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-21 05:56:25.341  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-21 05:56:25.341 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-21 05:56:25.341 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-21 05:56:25.342 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-21 05:56:25.347 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-21 05:56:25.347 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-21 05:56:25.347 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-21 05:56:25.348 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-21 05:56:25.519  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-21 05:56:25.520  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-21 05:56:25.520 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-21 05:56:25.521 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-21 05:56:25.522  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-21 05:56:25.523  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-21 05:56:25.523 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 05:56:25.523 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 05:56:25.524 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 05:56:25.524 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 05:56:25.525 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 05:56:25.525 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 05:56:25.525 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 05:56:25.526 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 05:56:25.526 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 05:56:25.527 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-21 05:56:25.529 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 468935300940118230712299918034053276582405968276
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 21 02:28:51 UTC 2022
           Final Date: Thu May 20 02:28:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:69:c0:64:39:f4:1a:bb:77:11:44:74:b8:20:43:2b:72:3e:68:db]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 58f75dd0e8c2626d2c9a5991e3c69dd3beeb4cf4
                       9a1e964dac633cae0d885a420fd6dfca6578e4a9
                       6a4125ba8ad4fbee533a3a3908d234050268bdf2
                       84df18655ee150aed55793d4012cdd834752d19f
                       c3be5db64f737d9223a4c31901ee9f42192905ef
                       5dcdf9c82c7d5ac1070d7ac475cb340d93942e6d
                       3f625124d841ca72bbc81e968d7e164dd6753573
                       8a541ce667a11dcf6bc7a65f38be5f77883755d6
                       852d943398c767ce33b8b0d5840d54b407f9759c
                       24167764b3dadf0009d0756d22aeeac79ff677ac
                       1451402b051fadbcb509b7428e91dd79b5daf9e7
                       e9d05939e00b187a9dd36a821ef73c0717d2d52f
                       6003fc5a101ab01bdb79153f6339ca7b205f78e8
                       f1bc24ad021fa80dbae6ec22c0b6c94c5785b4e1
                       595ce1deba8c720e0005675f4c186c497d98f691
                       a5cdcd87d4ee6dd1d7bd32788b0600941abd8c6c
                       74d1d0600af258445d688d605832dfae49c98c32
                       8cb8de7618ec8c6f2bb41332b48d3fdb58a344fb
                       7e1c117e98656932d8f102df858b14c57efa69b6
                       2ba48d8c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4b:46:eb:ab:20:4e:dc:c1:f7:6c:44:7c:63:de:d4:8b:25:a5:ab:bd]
            modulus: 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
    public exponent: 10001

] 
2022-05-21 06:00:20.320  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-21 06:00:20.321 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-21 06:00:20.322 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-21 06:00:20.323 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-21 06:00:20.323  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-21 06:00:20.324  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-21 06:00:20.324  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-21 06:00:20.324 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-21 06:00:20.325 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-21 06:00:20.325 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-21 06:00:20.329 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-21 06:00:20.330 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-21 06:00:20.331 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-21 06:00:20.331 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-21 06:00:20.493  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-21 06:00:20.494  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-21 06:00:20.494 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-21 06:00:20.494 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-21 06:00:20.519  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-21 06:00:20.520  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-21 06:00:20.520 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:00:20.520 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:00:20.521 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:00:20.521 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:00:20.521 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:00:20.522 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:00:20.522 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:00:20.523 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:00:20.523 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:00:20.524 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-21 06:00:20.527 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 468935300940118230712299918034053276582405968276
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 21 02:28:51 UTC 2022
           Final Date: Thu May 20 02:28:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:69:c0:64:39:f4:1a:bb:77:11:44:74:b8:20:43:2b:72:3e:68:db]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 58f75dd0e8c2626d2c9a5991e3c69dd3beeb4cf4
                       9a1e964dac633cae0d885a420fd6dfca6578e4a9
                       6a4125ba8ad4fbee533a3a3908d234050268bdf2
                       84df18655ee150aed55793d4012cdd834752d19f
                       c3be5db64f737d9223a4c31901ee9f42192905ef
                       5dcdf9c82c7d5ac1070d7ac475cb340d93942e6d
                       3f625124d841ca72bbc81e968d7e164dd6753573
                       8a541ce667a11dcf6bc7a65f38be5f77883755d6
                       852d943398c767ce33b8b0d5840d54b407f9759c
                       24167764b3dadf0009d0756d22aeeac79ff677ac
                       1451402b051fadbcb509b7428e91dd79b5daf9e7
                       e9d05939e00b187a9dd36a821ef73c0717d2d52f
                       6003fc5a101ab01bdb79153f6339ca7b205f78e8
                       f1bc24ad021fa80dbae6ec22c0b6c94c5785b4e1
                       595ce1deba8c720e0005675f4c186c497d98f691
                       a5cdcd87d4ee6dd1d7bd32788b0600941abd8c6c
                       74d1d0600af258445d688d605832dfae49c98c32
                       8cb8de7618ec8c6f2bb41332b48d3fdb58a344fb
                       7e1c117e98656932d8f102df858b14c57efa69b6
                       2ba48d8c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a5:7a:a5:35:bf:9c:f4:91:bf:56:06:3e:40:68:f1:38:84:5b:36:90]
            modulus: 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
    public exponent: 10001

] 
2022-05-21 06:02:31.034  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-21 06:02:31.034 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-21 06:02:31.036 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-21 06:02:31.036 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-21 06:02:31.037  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-21 06:02:31.037  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-21 06:02:31.037  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-21 06:02:31.038 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-21 06:02:31.038 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-21 06:02:31.038 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-21 06:02:31.046 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-21 06:02:31.046 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-21 06:02:31.046 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-21 06:02:31.047 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-21 06:02:31.148  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-21 06:02:31.149  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-21 06:02:31.149 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-21 06:02:31.149 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-21 06:02:31.150  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-21 06:02:31.151  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-21 06:02:31.151 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:02:31.151 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:02:31.151 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:02:31.152 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:02:31.152 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:02:31.152 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:02:31.153 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:02:31.153 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:02:31.153 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:02:31.154 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-21 06:02:31.156 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 468935300940118230712299918034053276582405968276
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 21 02:28:51 UTC 2022
           Final Date: Thu May 20 02:28:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:69:c0:64:39:f4:1a:bb:77:11:44:74:b8:20:43:2b:72:3e:68:db]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 58f75dd0e8c2626d2c9a5991e3c69dd3beeb4cf4
                       9a1e964dac633cae0d885a420fd6dfca6578e4a9
                       6a4125ba8ad4fbee533a3a3908d234050268bdf2
                       84df18655ee150aed55793d4012cdd834752d19f
                       c3be5db64f737d9223a4c31901ee9f42192905ef
                       5dcdf9c82c7d5ac1070d7ac475cb340d93942e6d
                       3f625124d841ca72bbc81e968d7e164dd6753573
                       8a541ce667a11dcf6bc7a65f38be5f77883755d6
                       852d943398c767ce33b8b0d5840d54b407f9759c
                       24167764b3dadf0009d0756d22aeeac79ff677ac
                       1451402b051fadbcb509b7428e91dd79b5daf9e7
                       e9d05939e00b187a9dd36a821ef73c0717d2d52f
                       6003fc5a101ab01bdb79153f6339ca7b205f78e8
                       f1bc24ad021fa80dbae6ec22c0b6c94c5785b4e1
                       595ce1deba8c720e0005675f4c186c497d98f691
                       a5cdcd87d4ee6dd1d7bd32788b0600941abd8c6c
                       74d1d0600af258445d688d605832dfae49c98c32
                       8cb8de7618ec8c6f2bb41332b48d3fdb58a344fb
                       7e1c117e98656932d8f102df858b14c57efa69b6
                       2ba48d8c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3e:33:5f:0d:dd:f4:f3:da:18:ab:ab:a5:40:67:60:0c:cb:04:d6:9a]
            modulus: a93658749ba2a3b1f775b894895e973d5da5f9bfde90c8d26c389b57f63f0e2d096a5b0695860cb65f1bac3102d2859304a6f9ac049285692260430720a41c9b6ea8dc1a298f373ded126bcc48966637abe8eced9e34865d335c6cd79a83c8f74eaf1e063f4a566a46f421e04426660440a40eea6fa96050187a6c90ba1b2989a1c1995b4b6e767bb675008e3199f9a39fb18199355adcf4bc99e9ff48a3ac806b45ac6afe9ec6b02d09af511cb235a98cd6bb55ca611cf4151ed0b9692b054e4d80d53c6d2b41ce1a16810f15a505896f8f474b42e4cc5ad472b9b4b086e6a988665d6b2fc2433c0ca51c18234e85a6935b400f27302cd57ee9261ce28e1eab
    public exponent: 10001

] 
2022-05-21 06:06:31.216  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-21 06:06:31.217 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-21 06:06:31.219 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-21 06:06:31.219 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-21 06:06:31.220  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-21 06:06:31.220  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-21 06:06:31.221  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-21 06:06:31.221 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-21 06:06:31.222 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-21 06:06:31.222 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-21 06:06:31.226 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-21 06:06:31.227 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-21 06:06:31.227 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-21 06:06:31.227 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-21 06:06:31.320  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-21 06:06:31.320  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-21 06:06:31.321 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-21 06:06:31.321 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-21 06:06:31.322  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-21 06:06:31.323  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-21 06:06:31.323 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:06:31.323 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:06:31.324 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:06:31.324 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:06:31.324 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:06:31.325 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:06:31.325 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:06:31.326 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:06:31.326 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:06:31.327 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-21 06:06:31.330 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 468935300940118230712299918034053276582405968276
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 21 02:28:51 UTC 2022
           Final Date: Thu May 20 02:28:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:69:c0:64:39:f4:1a:bb:77:11:44:74:b8:20:43:2b:72:3e:68:db]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 58f75dd0e8c2626d2c9a5991e3c69dd3beeb4cf4
                       9a1e964dac633cae0d885a420fd6dfca6578e4a9
                       6a4125ba8ad4fbee533a3a3908d234050268bdf2
                       84df18655ee150aed55793d4012cdd834752d19f
                       c3be5db64f737d9223a4c31901ee9f42192905ef
                       5dcdf9c82c7d5ac1070d7ac475cb340d93942e6d
                       3f625124d841ca72bbc81e968d7e164dd6753573
                       8a541ce667a11dcf6bc7a65f38be5f77883755d6
                       852d943398c767ce33b8b0d5840d54b407f9759c
                       24167764b3dadf0009d0756d22aeeac79ff677ac
                       1451402b051fadbcb509b7428e91dd79b5daf9e7
                       e9d05939e00b187a9dd36a821ef73c0717d2d52f
                       6003fc5a101ab01bdb79153f6339ca7b205f78e8
                       f1bc24ad021fa80dbae6ec22c0b6c94c5785b4e1
                       595ce1deba8c720e0005675f4c186c497d98f691
                       a5cdcd87d4ee6dd1d7bd32788b0600941abd8c6c
                       74d1d0600af258445d688d605832dfae49c98c32
                       8cb8de7618ec8c6f2bb41332b48d3fdb58a344fb
                       7e1c117e98656932d8f102df858b14c57efa69b6
                       2ba48d8c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [de:49:9e:29:be:ec:19:92:28:34:19:e6:ae:55:3a:0e:85:5c:18:f1]
            modulus: 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
    public exponent: 10001

] 
2022-05-21 06:10:53.200  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-21 06:10:53.201 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-21 06:10:53.202 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-21 06:10:53.202 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-21 06:10:53.202  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-21 06:10:53.203  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-21 06:10:53.203  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-21 06:10:53.203 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-21 06:10:53.203 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-21 06:10:53.204 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-21 06:10:53.207 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-21 06:10:53.208 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-21 06:10:53.208 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-21 06:10:53.208 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-21 06:10:53.286  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-21 06:10:53.286  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-21 06:10:53.287 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-21 06:10:53.287 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-21 06:10:53.288  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-21 06:10:53.288  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-21 06:10:53.289 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:10:53.289 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:10:53.289 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:10:53.290 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:10:53.290 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:10:53.291 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:10:53.291 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:10:53.292 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:10:53.292 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:10:53.293 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-21 06:10:53.295 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 468935300940118230712299918034053276582405968276
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 21 02:28:51 UTC 2022
           Final Date: Thu May 20 02:28:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:69:c0:64:39:f4:1a:bb:77:11:44:74:b8:20:43:2b:72:3e:68:db]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 58f75dd0e8c2626d2c9a5991e3c69dd3beeb4cf4
                       9a1e964dac633cae0d885a420fd6dfca6578e4a9
                       6a4125ba8ad4fbee533a3a3908d234050268bdf2
                       84df18655ee150aed55793d4012cdd834752d19f
                       c3be5db64f737d9223a4c31901ee9f42192905ef
                       5dcdf9c82c7d5ac1070d7ac475cb340d93942e6d
                       3f625124d841ca72bbc81e968d7e164dd6753573
                       8a541ce667a11dcf6bc7a65f38be5f77883755d6
                       852d943398c767ce33b8b0d5840d54b407f9759c
                       24167764b3dadf0009d0756d22aeeac79ff677ac
                       1451402b051fadbcb509b7428e91dd79b5daf9e7
                       e9d05939e00b187a9dd36a821ef73c0717d2d52f
                       6003fc5a101ab01bdb79153f6339ca7b205f78e8
                       f1bc24ad021fa80dbae6ec22c0b6c94c5785b4e1
                       595ce1deba8c720e0005675f4c186c497d98f691
                       a5cdcd87d4ee6dd1d7bd32788b0600941abd8c6c
                       74d1d0600af258445d688d605832dfae49c98c32
                       8cb8de7618ec8c6f2bb41332b48d3fdb58a344fb
                       7e1c117e98656932d8f102df858b14c57efa69b6
                       2ba48d8c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f8:66:1c:e1:ba:9c:66:f3:a9:89:57:4a:c6:e6:05:10:28:3b:0e:19]
            modulus: b677b8a49c2d4ccd580c8eb5ac84ff15bf9cf29970b92fb49e0abfbf24dae6f8e5df7e642e568b92a6045d3b2b758e5308e97a4d10da952e68d65981c0942b8c41c6bf039d3befa8f9e9ebebdec9315f011ea05669d6898f38e494c1cffc1b05ff63496144e36783d91727444b7faafa9af165b81f3c87b7a5b823adbedfc816073e9340bc17510734d0552b96bff9a4f2695bebde1a00d7f309404a3543be97cda828ff70b2baea814afcc8cbc11ecd263e702d4eef43f59e90e62a6fadc6e14edb11503173f0b13275e261f551c1c7da2209721b62a49b07bd8a0edc7a0fa44e984a6c8fb347821943c71c063a35b4b56ae17ca28796a95fadc3852ede79ef
    public exponent: 10001

] 
2022-05-21 06:11:23.627  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-21 06:11:23.627 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-21 06:11:23.628 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-21 06:11:23.629 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-21 06:11:23.629  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-21 06:11:23.630  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-21 06:11:23.630  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-21 06:11:23.630 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-21 06:11:23.630 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-21 06:11:23.631 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-21 06:11:23.635 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-21 06:11:23.636 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-21 06:11:23.636 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-21 06:11:23.636 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-21 06:11:23.707  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-21 06:11:23.708  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-21 06:11:23.708 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-21 06:11:23.708 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-21 06:11:23.709  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-21 06:11:23.710  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-21 06:11:23.710 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:11:23.710 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:11:23.710 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:11:23.719 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:11:23.719 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:11:23.719 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:11:23.720 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:11:23.720 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:11:23.720 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:11:23.721 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-21 06:11:23.723 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 468935300940118230712299918034053276582405968276
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 21 02:28:51 UTC 2022
           Final Date: Thu May 20 02:28:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:69:c0:64:39:f4:1a:bb:77:11:44:74:b8:20:43:2b:72:3e:68:db]
            modulus: a7641748a72db0c0138f999b20d03e63ea2752a2eee9d303c4405d7b26f1bd7b5f82581c130e3279bca4a1564aaa9284cf2422a08edd3a2b43b7180933f71917490c17838845115dda3b93afefeda0f82ae54f292b4154e7c50482c0545abd9642140690e3eaf97386e2bbb5e404c4660522920e40ebb30ae1e820d2caae2671c764fa2f3246271a42a34fffc24c3d38a0d08628efe2ea1bd572915139a066951bdd73751a9b6a946bd29dd9861275b2555ed1a2921d4e4bfd559ac69d1df52d3b3a46e82286d499aa9a9cb136bbddfd0bacd1777824c4fa71ca0222af2eb699c5f937878b23fe0341dc564e88e361262048529207e4dd501600e4b8c14f4ee2388f0041ae14fa26717c24253b595c412ac6464e073f987052b039a7338687ff655533781c37241cee2aa8738d879720fb4e65b0f64357d3fdd661cd2b2b092e7372eb7827c820df13134a7ea51b08e712931cc07c49118ea6aae71c5346990693593af0384c305e604293d0457e0f247f6d991d933d9c6ab2988aa8b25ea685
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 58f75dd0e8c2626d2c9a5991e3c69dd3beeb4cf4
                       9a1e964dac633cae0d885a420fd6dfca6578e4a9
                       6a4125ba8ad4fbee533a3a3908d234050268bdf2
                       84df18655ee150aed55793d4012cdd834752d19f
                       c3be5db64f737d9223a4c31901ee9f42192905ef
                       5dcdf9c82c7d5ac1070d7ac475cb340d93942e6d
                       3f625124d841ca72bbc81e968d7e164dd6753573
                       8a541ce667a11dcf6bc7a65f38be5f77883755d6
                       852d943398c767ce33b8b0d5840d54b407f9759c
                       24167764b3dadf0009d0756d22aeeac79ff677ac
                       1451402b051fadbcb509b7428e91dd79b5daf9e7
                       e9d05939e00b187a9dd36a821ef73c0717d2d52f
                       6003fc5a101ab01bdb79153f6339ca7b205f78e8
                       f1bc24ad021fa80dbae6ec22c0b6c94c5785b4e1
                       595ce1deba8c720e0005675f4c186c497d98f691
                       a5cdcd87d4ee6dd1d7bd32788b0600941abd8c6c
                       74d1d0600af258445d688d605832dfae49c98c32
                       8cb8de7618ec8c6f2bb41332b48d3fdb58a344fb
                       7e1c117e98656932d8f102df858b14c57efa69b6
                       2ba48d8c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bd:ab:5f:cb:42:a5:39:45:79:b3:6d:da:15:0d:74:3c:8d:30:ab:66]
            modulus: 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
    public exponent: 10001

] 
2022-05-21 06:20:22.379  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-21 06:20:22.381 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-21 06:20:22.382 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-21 06:20:22.382 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-21 06:20:22.383  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-21 06:20:22.384  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-21 06:20:22.384  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-21 06:20:22.385 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-21 06:20:22.385 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-21 06:20:22.385 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-21 06:20:22.390 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-21 06:20:22.390 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-21 06:20:22.391 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-21 06:20:22.391 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-21 06:20:22.466  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-21 06:20:22.467  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-21 06:20:22.468 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-21 06:20:22.468 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-21 06:20:22.469  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-21 06:20:22.470  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-21 06:20:22.470 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:20:22.470 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:20:22.470 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:20:22.471 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:20:22.471 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:20:22.472 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:20:22.472 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:20:22.473 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:20:22.473 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:20:22.473 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-21 06:20:22.476 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 468935300940118230712299918034053276582405968276
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 21 02:28:51 UTC 2022
           Final Date: Thu May 20 02:28:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:69:c0:64:39:f4:1a:bb:77:11:44:74:b8:20:43:2b:72:3e:68:db]
            modulus: a7641748a72db0c0138f999b20d03e63ea2752a2eee9d303c4405d7b26f1bd7b5f82581c130e3279bca4a1564aaa9284cf2422a08edd3a2b43b7180933f71917490c17838845115dda3b93afefeda0f82ae54f292b4154e7c50482c0545abd9642140690e3eaf97386e2bbb5e404c4660522920e40ebb30ae1e820d2caae2671c764fa2f3246271a42a34fffc24c3d38a0d08628efe2ea1bd572915139a066951bdd73751a9b6a946bd29dd9861275b2555ed1a2921d4e4bfd559ac69d1df52d3b3a46e82286d499aa9a9cb136bbddfd0bacd1777824c4fa71ca0222af2eb699c5f937878b23fe0341dc564e88e361262048529207e4dd501600e4b8c14f4ee2388f0041ae14fa26717c24253b595c412ac6464e073f987052b039a7338687ff655533781c37241cee2aa8738d879720fb4e65b0f64357d3fdd661cd2b2b092e7372eb7827c820df13134a7ea51b08e712931cc07c49118ea6aae71c5346990693593af0384c305e604293d0457e0f247f6d991d933d9c6ab2988aa8b25ea685
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 58f75dd0e8c2626d2c9a5991e3c69dd3beeb4cf4
                       9a1e964dac633cae0d885a420fd6dfca6578e4a9
                       6a4125ba8ad4fbee533a3a3908d234050268bdf2
                       84df18655ee150aed55793d4012cdd834752d19f
                       c3be5db64f737d9223a4c31901ee9f42192905ef
                       5dcdf9c82c7d5ac1070d7ac475cb340d93942e6d
                       3f625124d841ca72bbc81e968d7e164dd6753573
                       8a541ce667a11dcf6bc7a65f38be5f77883755d6
                       852d943398c767ce33b8b0d5840d54b407f9759c
                       24167764b3dadf0009d0756d22aeeac79ff677ac
                       1451402b051fadbcb509b7428e91dd79b5daf9e7
                       e9d05939e00b187a9dd36a821ef73c0717d2d52f
                       6003fc5a101ab01bdb79153f6339ca7b205f78e8
                       f1bc24ad021fa80dbae6ec22c0b6c94c5785b4e1
                       595ce1deba8c720e0005675f4c186c497d98f691
                       a5cdcd87d4ee6dd1d7bd32788b0600941abd8c6c
                       74d1d0600af258445d688d605832dfae49c98c32
                       8cb8de7618ec8c6f2bb41332b48d3fdb58a344fb
                       7e1c117e98656932d8f102df858b14c57efa69b6
                       2ba48d8c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f8:df:35:0e:cf:c6:9e:33:01:49:65:1c:65:3b:60:fa:f4:8e:95:35]
            modulus: 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
    public exponent: 10001

] 
2022-05-21 06:20:42.332  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-21 06:20:42.333 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-21 06:20:42.334 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-21 06:20:42.335 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-21 06:20:42.335  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-21 06:20:42.336  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-21 06:20:42.336  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-21 06:20:42.336 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-21 06:20:42.337 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-21 06:20:42.337 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-21 06:20:42.341 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-21 06:20:42.342 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-21 06:20:42.342 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-21 06:20:42.342 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-21 06:20:42.417  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-21 06:20:42.418  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-21 06:20:42.418 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-21 06:20:42.418 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-21 06:20:42.420  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-21 06:20:42.420  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-21 06:20:42.421 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:20:42.421 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:20:42.421 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:20:42.422 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:20:42.422 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:20:42.422 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:20:42.423 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:20:42.423 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:20:42.423 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:20:42.424 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-21 06:20:42.427 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 468935300940118230712299918034053276582405968276
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 21 02:28:51 UTC 2022
           Final Date: Thu May 20 02:28:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:69:c0:64:39:f4:1a:bb:77:11:44:74:b8:20:43:2b:72:3e:68:db]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 58f75dd0e8c2626d2c9a5991e3c69dd3beeb4cf4
                       9a1e964dac633cae0d885a420fd6dfca6578e4a9
                       6a4125ba8ad4fbee533a3a3908d234050268bdf2
                       84df18655ee150aed55793d4012cdd834752d19f
                       c3be5db64f737d9223a4c31901ee9f42192905ef
                       5dcdf9c82c7d5ac1070d7ac475cb340d93942e6d
                       3f625124d841ca72bbc81e968d7e164dd6753573
                       8a541ce667a11dcf6bc7a65f38be5f77883755d6
                       852d943398c767ce33b8b0d5840d54b407f9759c
                       24167764b3dadf0009d0756d22aeeac79ff677ac
                       1451402b051fadbcb509b7428e91dd79b5daf9e7
                       e9d05939e00b187a9dd36a821ef73c0717d2d52f
                       6003fc5a101ab01bdb79153f6339ca7b205f78e8
                       f1bc24ad021fa80dbae6ec22c0b6c94c5785b4e1
                       595ce1deba8c720e0005675f4c186c497d98f691
                       a5cdcd87d4ee6dd1d7bd32788b0600941abd8c6c
                       74d1d0600af258445d688d605832dfae49c98c32
                       8cb8de7618ec8c6f2bb41332b48d3fdb58a344fb
                       7e1c117e98656932d8f102df858b14c57efa69b6
                       2ba48d8c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1b:08:09:76:e8:95:33:38:de:1e:14:9a:4c:f2:9f:41:a1:6b:96:a1]
            modulus: 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
    public exponent: 10001

] 
2022-05-21 06:22:43.224  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-21 06:22:43.225 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-21 06:22:43.226 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-21 06:22:43.227 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-21 06:22:43.227  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-21 06:22:43.228  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-21 06:22:43.228  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-21 06:22:43.228 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-21 06:22:43.228 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-21 06:22:43.229 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-21 06:22:43.235 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-21 06:22:43.236 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-21 06:22:43.236 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-21 06:22:43.236 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-21 06:22:43.311  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-21 06:22:43.312  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-21 06:22:43.312 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-21 06:22:43.312 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-21 06:22:43.313  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-21 06:22:43.314  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-21 06:22:43.314 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:22:43.314 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:22:43.314 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:22:43.319 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:22:43.319 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:22:43.319 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:22:43.320 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:22:43.320 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:22:43.320 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:22:43.321 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-21 06:22:43.323 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 468935300940118230712299918034053276582405968276
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 21 02:28:51 UTC 2022
           Final Date: Thu May 20 02:28:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:69:c0:64:39:f4:1a:bb:77:11:44:74:b8:20:43:2b:72:3e:68:db]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 58f75dd0e8c2626d2c9a5991e3c69dd3beeb4cf4
                       9a1e964dac633cae0d885a420fd6dfca6578e4a9
                       6a4125ba8ad4fbee533a3a3908d234050268bdf2
                       84df18655ee150aed55793d4012cdd834752d19f
                       c3be5db64f737d9223a4c31901ee9f42192905ef
                       5dcdf9c82c7d5ac1070d7ac475cb340d93942e6d
                       3f625124d841ca72bbc81e968d7e164dd6753573
                       8a541ce667a11dcf6bc7a65f38be5f77883755d6
                       852d943398c767ce33b8b0d5840d54b407f9759c
                       24167764b3dadf0009d0756d22aeeac79ff677ac
                       1451402b051fadbcb509b7428e91dd79b5daf9e7
                       e9d05939e00b187a9dd36a821ef73c0717d2d52f
                       6003fc5a101ab01bdb79153f6339ca7b205f78e8
                       f1bc24ad021fa80dbae6ec22c0b6c94c5785b4e1
                       595ce1deba8c720e0005675f4c186c497d98f691
                       a5cdcd87d4ee6dd1d7bd32788b0600941abd8c6c
                       74d1d0600af258445d688d605832dfae49c98c32
                       8cb8de7618ec8c6f2bb41332b48d3fdb58a344fb
                       7e1c117e98656932d8f102df858b14c57efa69b6
                       2ba48d8c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b0:95:bf:58:81:b8:d0:f0:ca:aa:01:d2:25:e5:30:a2:f3:4e:5f:ac]
            modulus: b6c654631c5694d9a6c71a9709f35e6869b6996967636a9384c815eaedd1823feddb2182131e636fbb615e874a7ef2689158364fa6e2c1062bd19d50e885b9886626f86f0c70a2f119b74907a5ec8ac8e104324614092f948eff51c34e66eb143aeaa3b2c534c3e2523d09f214dc809a3f6836ca0431863ddb17189dcbbd5609ef79129349d5cfb38d17d503c8b2dcc764e1c0a78c2ddd66c9ad97cd3fec307bcca31586acbbb308659ee0913d5f5ed2f4ef450c0a7c9e6670c8e229382f266cc531e34a14d5bf6829be44f8344351ace5e0fd6b15e2b4fb452157d75d5e80181feab1967cb361f4efd9ff5d8b3534424d9221c10d004924115b41c743ee8a65
    public exponent: 10001

] 
2022-05-21 06:25:47.740  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-21 06:25:47.741 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-21 06:25:47.743 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-21 06:25:47.744 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-21 06:25:47.744  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-21 06:25:47.744  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-21 06:25:47.745  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-21 06:25:47.745 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-21 06:25:47.745 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-21 06:25:47.745 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-21 06:25:47.749 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-21 06:25:47.749 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-21 06:25:47.750 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-21 06:25:47.750 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-21 06:25:47.827  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-21 06:25:47.828  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-21 06:25:47.828 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-21 06:25:47.828 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-21 06:25:47.829  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-21 06:25:47.830  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-21 06:25:47.830 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:25:47.830 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:25:47.831 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:25:47.831 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:25:47.832 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:25:47.832 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:25:47.832 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:25:47.832 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:25:47.832 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:25:47.833 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-21 06:25:47.836 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 468935300940118230712299918034053276582405968276
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 21 02:28:51 UTC 2022
           Final Date: Thu May 20 02:28:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:69:c0:64:39:f4:1a:bb:77:11:44:74:b8:20:43:2b:72:3e:68:db]
            modulus: a7641748a72db0c0138f999b20d03e63ea2752a2eee9d303c4405d7b26f1bd7b5f82581c130e3279bca4a1564aaa9284cf2422a08edd3a2b43b7180933f71917490c17838845115dda3b93afefeda0f82ae54f292b4154e7c50482c0545abd9642140690e3eaf97386e2bbb5e404c4660522920e40ebb30ae1e820d2caae2671c764fa2f3246271a42a34fffc24c3d38a0d08628efe2ea1bd572915139a066951bdd73751a9b6a946bd29dd9861275b2555ed1a2921d4e4bfd559ac69d1df52d3b3a46e82286d499aa9a9cb136bbddfd0bacd1777824c4fa71ca0222af2eb699c5f937878b23fe0341dc564e88e361262048529207e4dd501600e4b8c14f4ee2388f0041ae14fa26717c24253b595c412ac6464e073f987052b039a7338687ff655533781c37241cee2aa8738d879720fb4e65b0f64357d3fdd661cd2b2b092e7372eb7827c820df13134a7ea51b08e712931cc07c49118ea6aae71c5346990693593af0384c305e604293d0457e0f247f6d991d933d9c6ab2988aa8b25ea685
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 58f75dd0e8c2626d2c9a5991e3c69dd3beeb4cf4
                       9a1e964dac633cae0d885a420fd6dfca6578e4a9
                       6a4125ba8ad4fbee533a3a3908d234050268bdf2
                       84df18655ee150aed55793d4012cdd834752d19f
                       c3be5db64f737d9223a4c31901ee9f42192905ef
                       5dcdf9c82c7d5ac1070d7ac475cb340d93942e6d
                       3f625124d841ca72bbc81e968d7e164dd6753573
                       8a541ce667a11dcf6bc7a65f38be5f77883755d6
                       852d943398c767ce33b8b0d5840d54b407f9759c
                       24167764b3dadf0009d0756d22aeeac79ff677ac
                       1451402b051fadbcb509b7428e91dd79b5daf9e7
                       e9d05939e00b187a9dd36a821ef73c0717d2d52f
                       6003fc5a101ab01bdb79153f6339ca7b205f78e8
                       f1bc24ad021fa80dbae6ec22c0b6c94c5785b4e1
                       595ce1deba8c720e0005675f4c186c497d98f691
                       a5cdcd87d4ee6dd1d7bd32788b0600941abd8c6c
                       74d1d0600af258445d688d605832dfae49c98c32
                       8cb8de7618ec8c6f2bb41332b48d3fdb58a344fb
                       7e1c117e98656932d8f102df858b14c57efa69b6
                       2ba48d8c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [61:0b:96:64:df:d8:8a:17:72:0a:56:5d:30:2e:33:89:83:4d:29:63]
            modulus: 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
    public exponent: 10001

] 
2022-05-21 06:31:23.258  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-21 06:31:23.259 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-21 06:31:23.260 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-21 06:31:23.261 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-21 06:31:23.261  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-21 06:31:23.261  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-21 06:31:23.262  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-21 06:31:23.262 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-21 06:31:23.262 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-21 06:31:23.262 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-21 06:31:23.266 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-21 06:31:23.267 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-21 06:31:23.267 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-21 06:31:23.267 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-21 06:31:23.339  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-21 06:31:23.339  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-21 06:31:23.339 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-21 06:31:23.340 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-21 06:31:23.341  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-21 06:31:23.341  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-21 06:31:23.341 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:31:23.341 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:31:23.341 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:31:23.342 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:31:23.342 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:31:23.342 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:31:23.342 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:31:23.343 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:31:23.343 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:31:23.343 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-21 06:31:23.345 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 468935300940118230712299918034053276582405968276
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 21 02:28:51 UTC 2022
           Final Date: Thu May 20 02:28:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:69:c0:64:39:f4:1a:bb:77:11:44:74:b8:20:43:2b:72:3e:68:db]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 58f75dd0e8c2626d2c9a5991e3c69dd3beeb4cf4
                       9a1e964dac633cae0d885a420fd6dfca6578e4a9
                       6a4125ba8ad4fbee533a3a3908d234050268bdf2
                       84df18655ee150aed55793d4012cdd834752d19f
                       c3be5db64f737d9223a4c31901ee9f42192905ef
                       5dcdf9c82c7d5ac1070d7ac475cb340d93942e6d
                       3f625124d841ca72bbc81e968d7e164dd6753573
                       8a541ce667a11dcf6bc7a65f38be5f77883755d6
                       852d943398c767ce33b8b0d5840d54b407f9759c
                       24167764b3dadf0009d0756d22aeeac79ff677ac
                       1451402b051fadbcb509b7428e91dd79b5daf9e7
                       e9d05939e00b187a9dd36a821ef73c0717d2d52f
                       6003fc5a101ab01bdb79153f6339ca7b205f78e8
                       f1bc24ad021fa80dbae6ec22c0b6c94c5785b4e1
                       595ce1deba8c720e0005675f4c186c497d98f691
                       a5cdcd87d4ee6dd1d7bd32788b0600941abd8c6c
                       74d1d0600af258445d688d605832dfae49c98c32
                       8cb8de7618ec8c6f2bb41332b48d3fdb58a344fb
                       7e1c117e98656932d8f102df858b14c57efa69b6
                       2ba48d8c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2b:06:36:cb:80:72:45:bb:7b:36:b8:07:ff:a5:6f:7e:89:6d:37:76]
            modulus: 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
    public exponent: 10001

] 
2022-05-21 06:37:27.309  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-21 06:37:27.309 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-21 06:37:27.311 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-21 06:37:27.311 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-21 06:37:27.312  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-21 06:37:27.312  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-21 06:37:27.312  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-21 06:37:27.312 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-21 06:37:27.313 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-21 06:37:27.313 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-21 06:37:27.317 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-21 06:37:27.317 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-21 06:37:27.317 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-21 06:37:27.318 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-21 06:37:27.419  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-21 06:37:27.420  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-21 06:37:27.420 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-21 06:37:27.420 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-21 06:37:27.421  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-21 06:37:27.421  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-21 06:37:27.421 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:37:27.422 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:37:27.422 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:37:27.422 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:37:27.422 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:37:27.422 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:37:27.423 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:37:27.423 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:37:27.423 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:37:27.424 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-21 06:37:27.426 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 468935300940118230712299918034053276582405968276
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 21 02:28:51 UTC 2022
           Final Date: Thu May 20 02:28:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:69:c0:64:39:f4:1a:bb:77:11:44:74:b8:20:43:2b:72:3e:68:db]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 58f75dd0e8c2626d2c9a5991e3c69dd3beeb4cf4
                       9a1e964dac633cae0d885a420fd6dfca6578e4a9
                       6a4125ba8ad4fbee533a3a3908d234050268bdf2
                       84df18655ee150aed55793d4012cdd834752d19f
                       c3be5db64f737d9223a4c31901ee9f42192905ef
                       5dcdf9c82c7d5ac1070d7ac475cb340d93942e6d
                       3f625124d841ca72bbc81e968d7e164dd6753573
                       8a541ce667a11dcf6bc7a65f38be5f77883755d6
                       852d943398c767ce33b8b0d5840d54b407f9759c
                       24167764b3dadf0009d0756d22aeeac79ff677ac
                       1451402b051fadbcb509b7428e91dd79b5daf9e7
                       e9d05939e00b187a9dd36a821ef73c0717d2d52f
                       6003fc5a101ab01bdb79153f6339ca7b205f78e8
                       f1bc24ad021fa80dbae6ec22c0b6c94c5785b4e1
                       595ce1deba8c720e0005675f4c186c497d98f691
                       a5cdcd87d4ee6dd1d7bd32788b0600941abd8c6c
                       74d1d0600af258445d688d605832dfae49c98c32
                       8cb8de7618ec8c6f2bb41332b48d3fdb58a344fb
                       7e1c117e98656932d8f102df858b14c57efa69b6
                       2ba48d8c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [14:a8:01:e2:97:a7:5d:ec:2a:d3:22:0b:f9:80:42:d0:a2:81:7f:1b]
            modulus: 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
    public exponent: 10001

] 
2022-05-21 06:45:03.821  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-21 06:45:03.821 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-21 06:45:03.823 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-21 06:45:03.823 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-21 06:45:03.823  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-21 06:45:03.824  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-21 06:45:03.824  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-21 06:45:03.824 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-21 06:45:03.824 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-21 06:45:03.824 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-21 06:45:03.828 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-21 06:45:03.829 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-21 06:45:03.829 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-21 06:45:03.829 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-21 06:45:03.919  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-21 06:45:03.919  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-21 06:45:03.919 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-21 06:45:03.920 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-21 06:45:03.920  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-21 06:45:03.921  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-21 06:45:03.921 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:45:03.921 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:45:03.921 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:45:03.922 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:45:03.922 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:45:03.922 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:45:03.922 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:45:03.922 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:45:03.923 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:45:03.923 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-21 06:45:03.925 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 468935300940118230712299918034053276582405968276
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 21 02:28:51 UTC 2022
           Final Date: Thu May 20 02:28:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:69:c0:64:39:f4:1a:bb:77:11:44:74:b8:20:43:2b:72:3e:68:db]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 58f75dd0e8c2626d2c9a5991e3c69dd3beeb4cf4
                       9a1e964dac633cae0d885a420fd6dfca6578e4a9
                       6a4125ba8ad4fbee533a3a3908d234050268bdf2
                       84df18655ee150aed55793d4012cdd834752d19f
                       c3be5db64f737d9223a4c31901ee9f42192905ef
                       5dcdf9c82c7d5ac1070d7ac475cb340d93942e6d
                       3f625124d841ca72bbc81e968d7e164dd6753573
                       8a541ce667a11dcf6bc7a65f38be5f77883755d6
                       852d943398c767ce33b8b0d5840d54b407f9759c
                       24167764b3dadf0009d0756d22aeeac79ff677ac
                       1451402b051fadbcb509b7428e91dd79b5daf9e7
                       e9d05939e00b187a9dd36a821ef73c0717d2d52f
                       6003fc5a101ab01bdb79153f6339ca7b205f78e8
                       f1bc24ad021fa80dbae6ec22c0b6c94c5785b4e1
                       595ce1deba8c720e0005675f4c186c497d98f691
                       a5cdcd87d4ee6dd1d7bd32788b0600941abd8c6c
                       74d1d0600af258445d688d605832dfae49c98c32
                       8cb8de7618ec8c6f2bb41332b48d3fdb58a344fb
                       7e1c117e98656932d8f102df858b14c57efa69b6
                       2ba48d8c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a8:ed:7e:35:b1:a2:bd:dc:22:5f:75:ad:27:bc:ec:68:d9:6d:71:ce]
            modulus: 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
    public exponent: 10001

] 
2022-05-21 06:49:57.953  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-21 06:49:57.956 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-21 06:49:57.957 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-21 06:49:57.957 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-21 06:49:57.958  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-21 06:49:57.958  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-21 06:49:57.959  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-21 06:49:57.959 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-21 06:49:57.959 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-21 06:49:57.960 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-21 06:49:57.964 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-21 06:49:57.964 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-21 06:49:57.964 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-21 06:49:57.965 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-21 06:49:58.066  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-21 06:49:58.066  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-21 06:49:58.067 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-21 06:49:58.067 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-21 06:49:58.068  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-21 06:49:58.068  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-21 06:49:58.069 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:49:58.069 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:49:58.069 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:49:58.070 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:49:58.070 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:49:58.070 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:49:58.070 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:49:58.071 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:49:58.071 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:49:58.072 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-21 06:49:58.074 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 468935300940118230712299918034053276582405968276
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 21 02:28:51 UTC 2022
           Final Date: Thu May 20 02:28:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:69:c0:64:39:f4:1a:bb:77:11:44:74:b8:20:43:2b:72:3e:68:db]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 58f75dd0e8c2626d2c9a5991e3c69dd3beeb4cf4
                       9a1e964dac633cae0d885a420fd6dfca6578e4a9
                       6a4125ba8ad4fbee533a3a3908d234050268bdf2
                       84df18655ee150aed55793d4012cdd834752d19f
                       c3be5db64f737d9223a4c31901ee9f42192905ef
                       5dcdf9c82c7d5ac1070d7ac475cb340d93942e6d
                       3f625124d841ca72bbc81e968d7e164dd6753573
                       8a541ce667a11dcf6bc7a65f38be5f77883755d6
                       852d943398c767ce33b8b0d5840d54b407f9759c
                       24167764b3dadf0009d0756d22aeeac79ff677ac
                       1451402b051fadbcb509b7428e91dd79b5daf9e7
                       e9d05939e00b187a9dd36a821ef73c0717d2d52f
                       6003fc5a101ab01bdb79153f6339ca7b205f78e8
                       f1bc24ad021fa80dbae6ec22c0b6c94c5785b4e1
                       595ce1deba8c720e0005675f4c186c497d98f691
                       a5cdcd87d4ee6dd1d7bd32788b0600941abd8c6c
                       74d1d0600af258445d688d605832dfae49c98c32
                       8cb8de7618ec8c6f2bb41332b48d3fdb58a344fb
                       7e1c117e98656932d8f102df858b14c57efa69b6
                       2ba48d8c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a4:b0:90:57:11:c0:81:56:c3:98:41:49:2e:ee:30:e7:37:02:e2:85]
            modulus: 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
    public exponent: 10001

] 
2022-05-21 06:52:08.591  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-21 06:52:08.592 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-21 06:52:08.593 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-21 06:52:08.593 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-21 06:52:08.594  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-21 06:52:08.594  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-21 06:52:08.594  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-21 06:52:08.594 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-21 06:52:08.595 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-21 06:52:08.595 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-21 06:52:08.599 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-21 06:52:08.599 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-21 06:52:08.599 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-21 06:52:08.599 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-21 06:52:08.685  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-21 06:52:08.685  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-21 06:52:08.686 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-21 06:52:08.686 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-21 06:52:08.687  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-21 06:52:08.687  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-21 06:52:08.687 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:52:08.688 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:52:08.688 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:52:08.688 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:52:08.688 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:52:08.689 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:52:08.689 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:52:08.689 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:52:08.689 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:52:08.690 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-21 06:52:08.692 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 468935300940118230712299918034053276582405968276
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 21 02:28:51 UTC 2022
           Final Date: Thu May 20 02:28:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:69:c0:64:39:f4:1a:bb:77:11:44:74:b8:20:43:2b:72:3e:68:db]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 58f75dd0e8c2626d2c9a5991e3c69dd3beeb4cf4
                       9a1e964dac633cae0d885a420fd6dfca6578e4a9
                       6a4125ba8ad4fbee533a3a3908d234050268bdf2
                       84df18655ee150aed55793d4012cdd834752d19f
                       c3be5db64f737d9223a4c31901ee9f42192905ef
                       5dcdf9c82c7d5ac1070d7ac475cb340d93942e6d
                       3f625124d841ca72bbc81e968d7e164dd6753573
                       8a541ce667a11dcf6bc7a65f38be5f77883755d6
                       852d943398c767ce33b8b0d5840d54b407f9759c
                       24167764b3dadf0009d0756d22aeeac79ff677ac
                       1451402b051fadbcb509b7428e91dd79b5daf9e7
                       e9d05939e00b187a9dd36a821ef73c0717d2d52f
                       6003fc5a101ab01bdb79153f6339ca7b205f78e8
                       f1bc24ad021fa80dbae6ec22c0b6c94c5785b4e1
                       595ce1deba8c720e0005675f4c186c497d98f691
                       a5cdcd87d4ee6dd1d7bd32788b0600941abd8c6c
                       74d1d0600af258445d688d605832dfae49c98c32
                       8cb8de7618ec8c6f2bb41332b48d3fdb58a344fb
                       7e1c117e98656932d8f102df858b14c57efa69b6
                       2ba48d8c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0a:90:dd:01:0f:54:b9:04:af:8e:5f:8d:2d:05:6d:be:91:91:03:be]
            modulus: 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
    public exponent: 10001

] 
2022-05-21 06:54:08.300  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-21 06:54:08.301 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-21 06:54:08.303 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-21 06:54:08.303 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-21 06:54:08.304  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-21 06:54:08.304  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-21 06:54:08.304  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-21 06:54:08.305 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-21 06:54:08.305 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-21 06:54:08.305 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-21 06:54:08.312 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-21 06:54:08.312 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-21 06:54:08.312 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-21 06:54:08.313 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-21 06:54:08.395  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-21 06:54:08.396  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-21 06:54:08.396 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-21 06:54:08.396 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-21 06:54:08.397  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-21 06:54:08.397  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-21 06:54:08.397 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:54:08.397 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:54:08.397 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:54:08.398 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:54:08.398 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:54:08.398 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:54:08.398 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-21 06:54:08.399 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-21 06:54:08.399 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-21 06:54:08.399 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-21 06:54:08.401 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 468935300940118230712299918034053276582405968276
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 21 02:28:51 UTC 2022
           Final Date: Thu May 20 02:28:50 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:69:c0:64:39:f4:1a:bb:77:11:44:74:b8:20:43:2b:72:3e:68:db]
            modulus: a7641748a72db0c0138f999b20d03e63ea2752a2eee9d303c4405d7b26f1bd7b5f82581c130e3279bca4a1564aaa9284cf2422a08edd3a2b43b7180933f71917490c17838845115dda3b93afefeda0f82ae54f292b4154e7c50482c0545abd9642140690e3eaf97386e2bbb5e404c4660522920e40ebb30ae1e820d2caae2671c764fa2f3246271a42a34fffc24c3d38a0d08628efe2ea1bd572915139a066951bdd73751a9b6a946bd29dd9861275b2555ed1a2921d4e4bfd559ac69d1df52d3b3a46e82286d499aa9a9cb136bbddfd0bacd1777824c4fa71ca0222af2eb699c5f937878b23fe0341dc564e88e361262048529207e4dd501600e4b8c14f4ee2388f0041ae14fa26717c24253b595c412ac6464e073f987052b039a7338687ff655533781c37241cee2aa8738d879720fb4e65b0f64357d3fdd661cd2b2b092e7372eb7827c820df13134a7ea51b08e712931cc07c49118ea6aae71c5346990693593af0384c305e604293d0457e0f247f6d991d933d9c6ab2988aa8b25ea685
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 58f75dd0e8c2626d2c9a5991e3c69dd3beeb4cf4
                       9a1e964dac633cae0d885a420fd6dfca6578e4a9
                       6a4125ba8ad4fbee533a3a3908d234050268bdf2
                       84df18655ee150aed55793d4012cdd834752d19f
                       c3be5db64f737d9223a4c31901ee9f42192905ef
                       5dcdf9c82c7d5ac1070d7ac475cb340d93942e6d
                       3f625124d841ca72bbc81e968d7e164dd6753573
                       8a541ce667a11dcf6bc7a65f38be5f77883755d6
                       852d943398c767ce33b8b0d5840d54b407f9759c
                       24167764b3dadf0009d0756d22aeeac79ff677ac
                       1451402b051fadbcb509b7428e91dd79b5daf9e7
                       e9d05939e00b187a9dd36a821ef73c0717d2d52f
                       6003fc5a101ab01bdb79153f6339ca7b205f78e8
                       f1bc24ad021fa80dbae6ec22c0b6c94c5785b4e1
                       595ce1deba8c720e0005675f4c186c497d98f691
                       a5cdcd87d4ee6dd1d7bd32788b0600941abd8c6c
                       74d1d0600af258445d688d605832dfae49c98c32
                       8cb8de7618ec8c6f2bb41332b48d3fdb58a344fb
                       7e1c117e98656932d8f102df858b14c57efa69b6
                       2ba48d8c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3d:de:9e:46:f5:45:da:1f:7f:b1:a2:1b:4c:c3:20:ad:f8:8d:8a:f4]
            modulus: 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
    public exponent: 10001

]