Results

By type

          2022-06-07 10:38:40,443 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-06-07 10:38:41,319 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-06-07 10:38:42.090  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jun 07, 2022 10:38:43 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jun 07, 2022 10:38:43 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 07, 2022 10:38:43 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jun 07, 2022 10:38:43 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-06-07 10:38:44.420 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-06-07 10:38:44.703  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-06-07 10:38:44.854  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-06-07 10:38:45.535 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-06-07 10:38:45.537 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-06-07 10:38:45.539 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-06-07 10:38:45.542 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-06-07 10:38:45.587 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-06-07 10:38:45.590 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-06-07 10:38:45.717 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-06-07 10:38:46.359 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jun 07, 2022 10:38:46 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-06-07 10:38:47.207  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.575 seconds (JVM running for 9.4)
Jun 07, 2022 10:39:11 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-06-07 10:39:28.065  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 10:39:28.074 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 10:39:28.115 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-07 10:39:28.119 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 10:39:28.138  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-07 10:39:28.140  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 10:39:28.141  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 10:39:28.142 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 10:39:28.143 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 10:39:28.147 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 10:39:28.153 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 10:39:28.157 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 10:39:28.202 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 10:39:28.207 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 10:39:28.208 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 10:39:28.211 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 10:39:28.797  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 10:39:28.804  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 10:39:28.805 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 10:39:28.807 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 10:39:28.819  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 10:39:28.821  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 10:39:28.822 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 10:39:28.822 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 10:39:28.822 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 10:39:28.839 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 10:39:28.840 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 10:39:28.840 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 10:39:28.846 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 10:39:28.847 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 10:39:28.847 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 10:39:28.849 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 10:39:28.884 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 704065848739395500571375981761368886764035867037
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 10:36:34 UTC 2022
           Final Date: Sun Jun 06 10:36:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ab:b8:cb:96:55:33:71:e2:38:ca:84:1b:3e:5f:5d:ea:a0:3c:08:df]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 02312a13064d276550c0a9bc8164d5b036b50dcb
                       55e339228232264f75b3af4d633a6db354898edc
                       7de79d308ea405723ffeecdd0ae06f45b4f262b2
                       554fedfb51f66a0eff53b1360fc03b31c131fb69
                       d65923c2d9ebce868d5423a1df60d1f8393da128
                       e9640e802cc54698e5a61277c520e8e4a731ec7d
                       ffe8108464f0e305b229175bbd97d1227c222f5a
                       4548469241ee12a30c74f7de27696d65aa4e707e
                       83a5798e0c48f46392831774f599f5ce6605fe01
                       55d83d85b793868b5dbc49d917f9bc6edabe9050
                       4722caee18c458a97bf18a120c1c2a183b600e4f
                       9f3e823af81d7b28ceaca1c4413e7e1cf7578fe4
                       b5b8bffba81176abc4b66e217817f725071873c1
                       90caa91f73edc8bcbb41f37cf6d2346f7ffb58b5
                       4ab6e22dc9d86fc0c86435b8e030f2fd1769d1e6
                       1c3dc0abb19d46748e0d7294b6216d20d4eef689
                       75791de49afb56b2bcb14e49e629faa5d79850b7
                       d91059881e4d67f305ec9164b15176cea24d36f5
                       e732dd983541c06ab3e6b61fa415f922e3c482ca
                       765e78dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5e:db:3c:59:14:6d:d5:08:d7:7e:a9:79:49:e8:de:a5:8c:ee:a0:8b]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 12:08:12.041  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 12:08:12.044 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 12:08:12.047 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 12:08:12.048 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 12:08:12.049  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 12:08:12.050  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 12:08:12.051  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 12:08:12.052 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 12:08:12.054 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 12:08:12.055 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 12:08:12.062 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 12:08:12.063 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:08:12.064 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:08:12.064 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:08:12.224  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 12:08:12.225  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 12:08:12.225 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 12:08:12.226 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:08:12.229  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 12:08:12.230  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 12:08:12.230 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:08:12.231 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:08:12.232 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:08:12.233 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:08:12.233 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:08:12.234 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:08:12.234 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:08:12.235 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:08:12.235 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:08:12.237 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 12:08:12.241 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 704065848739395500571375981761368886764035867037
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 10:36:34 UTC 2022
           Final Date: Sun Jun 06 10:36:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ab:b8:cb:96:55:33:71:e2:38:ca:84:1b:3e:5f:5d:ea:a0:3c:08:df]
            modulus: c4e1170c27744b389f79e199717c86c20b7fd59985134d5564ea03065f1a831b2c64bc4cb6de6fe475ba20cffacffaa60a3c197324264e9fc2ef1ac21f90bc2d8f35e50f7d02876952d7f23f004c488aadc67e168d2b793a66cd116cd76a1385f1dc0eb05bdcfd3e0ffb24eee0cd4cd99a01c25dfb56d06af6d9a8f43afc1d211b9b386ba66f6d67b9ad89b290c2c2a3d4ef0d02557ac1b989ac5b987b7dc6368699de245c91f5dafe8bea625d5a3f98aa1bfe5933e2bccbd91299be8c3db3ac5bfbb4c114fe6e9f925a87a2d0e4bcbff8bac2ed393baa184ee0d33cf9b0eb7639a630e3aec247abb557d7e2e03e66d59d622a773f974e79c7acfd4272304094a7b851422e9e922c35d75b2509c5f7443b0c57ab2a40ff2561072a3bfb003eac0b2e7a8de4fb2667457dc5e68b3ff01bafe895195a1bcf9ac35cc4e49f19c7f847d68158ad24fb796ee64194ec4f2fefe736b68e9a54212574120c4387533bdf1d4bda11c374a973091dae3bdda4cca2154f2a96ed69f59608bfac38167c8617
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 02312a13064d276550c0a9bc8164d5b036b50dcb
                       55e339228232264f75b3af4d633a6db354898edc
                       7de79d308ea405723ffeecdd0ae06f45b4f262b2
                       554fedfb51f66a0eff53b1360fc03b31c131fb69
                       d65923c2d9ebce868d5423a1df60d1f8393da128
                       e9640e802cc54698e5a61277c520e8e4a731ec7d
                       ffe8108464f0e305b229175bbd97d1227c222f5a
                       4548469241ee12a30c74f7de27696d65aa4e707e
                       83a5798e0c48f46392831774f599f5ce6605fe01
                       55d83d85b793868b5dbc49d917f9bc6edabe9050
                       4722caee18c458a97bf18a120c1c2a183b600e4f
                       9f3e823af81d7b28ceaca1c4413e7e1cf7578fe4
                       b5b8bffba81176abc4b66e217817f725071873c1
                       90caa91f73edc8bcbb41f37cf6d2346f7ffb58b5
                       4ab6e22dc9d86fc0c86435b8e030f2fd1769d1e6
                       1c3dc0abb19d46748e0d7294b6216d20d4eef689
                       75791de49afb56b2bcb14e49e629faa5d79850b7
                       d91059881e4d67f305ec9164b15176cea24d36f5
                       e732dd983541c06ab3e6b61fa415f922e3c482ca
                       765e78dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4d:10:a0:a6:eb:be:f3:7d:31:e1:e9:19:af:84:a0:96:18:0e:5f:08]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 12:10:00.697  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 12:10:00.701 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 12:10:00.704 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-07 12:10:00.705 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 12:10:00.706  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-07 12:10:00.706  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 12:10:00.707  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 12:10:00.707 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 12:10:00.708 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 12:10:00.709 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 12:10:00.716 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 12:10:00.717 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:10:00.717 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:10:00.717 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:10:00.855  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 12:10:00.856  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 12:10:00.856 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 12:10:00.857 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:10:00.860  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 12:10:00.861  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 12:10:00.861 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:10:00.862 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:10:00.862 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:10:00.865 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:10:00.865 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:10:00.866 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:10:00.867 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:10:00.868 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:10:00.868 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:10:00.870 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 12:10:00.876 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 704065848739395500571375981761368886764035867037
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 10:36:34 UTC 2022
           Final Date: Sun Jun 06 10:36:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ab:b8:cb:96:55:33:71:e2:38:ca:84:1b:3e:5f:5d:ea:a0:3c:08:df]
            modulus: c4e1170c27744b389f79e199717c86c20b7fd59985134d5564ea03065f1a831b2c64bc4cb6de6fe475ba20cffacffaa60a3c197324264e9fc2ef1ac21f90bc2d8f35e50f7d02876952d7f23f004c488aadc67e168d2b793a66cd116cd76a1385f1dc0eb05bdcfd3e0ffb24eee0cd4cd99a01c25dfb56d06af6d9a8f43afc1d211b9b386ba66f6d67b9ad89b290c2c2a3d4ef0d02557ac1b989ac5b987b7dc6368699de245c91f5dafe8bea625d5a3f98aa1bfe5933e2bccbd91299be8c3db3ac5bfbb4c114fe6e9f925a87a2d0e4bcbff8bac2ed393baa184ee0d33cf9b0eb7639a630e3aec247abb557d7e2e03e66d59d622a773f974e79c7acfd4272304094a7b851422e9e922c35d75b2509c5f7443b0c57ab2a40ff2561072a3bfb003eac0b2e7a8de4fb2667457dc5e68b3ff01bafe895195a1bcf9ac35cc4e49f19c7f847d68158ad24fb796ee64194ec4f2fefe736b68e9a54212574120c4387533bdf1d4bda11c374a973091dae3bdda4cca2154f2a96ed69f59608bfac38167c8617
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 02312a13064d276550c0a9bc8164d5b036b50dcb
                       55e339228232264f75b3af4d633a6db354898edc
                       7de79d308ea405723ffeecdd0ae06f45b4f262b2
                       554fedfb51f66a0eff53b1360fc03b31c131fb69
                       d65923c2d9ebce868d5423a1df60d1f8393da128
                       e9640e802cc54698e5a61277c520e8e4a731ec7d
                       ffe8108464f0e305b229175bbd97d1227c222f5a
                       4548469241ee12a30c74f7de27696d65aa4e707e
                       83a5798e0c48f46392831774f599f5ce6605fe01
                       55d83d85b793868b5dbc49d917f9bc6edabe9050
                       4722caee18c458a97bf18a120c1c2a183b600e4f
                       9f3e823af81d7b28ceaca1c4413e7e1cf7578fe4
                       b5b8bffba81176abc4b66e217817f725071873c1
                       90caa91f73edc8bcbb41f37cf6d2346f7ffb58b5
                       4ab6e22dc9d86fc0c86435b8e030f2fd1769d1e6
                       1c3dc0abb19d46748e0d7294b6216d20d4eef689
                       75791de49afb56b2bcb14e49e629faa5d79850b7
                       d91059881e4d67f305ec9164b15176cea24d36f5
                       e732dd983541c06ab3e6b61fa415f922e3c482ca
                       765e78dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b9:65:cf:c0:f6:32:01:d6:38:67:3a:37:44:1a:64:01:a2:64:b7:61]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 12:11:30.326  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 12:11:30.327 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 12:11:30.328 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-07 12:11:30.329 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 12:11:30.329  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-07 12:11:30.330  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 12:11:30.330  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 12:11:30.331 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 12:11:30.331 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 12:11:30.331 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 12:11:30.336 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 12:11:30.336 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:11:30.336 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:11:30.337 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:11:30.501  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 12:11:30.502  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 12:11:30.502 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 12:11:30.503 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:11:30.505  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 12:11:30.505  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 12:11:30.506 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:11:30.506 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:11:30.506 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:11:30.507 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:11:30.507 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:11:30.508 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:11:30.509 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:11:30.509 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:11:30.509 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:11:30.510 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 12:11:30.515 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 704065848739395500571375981761368886764035867037
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 10:36:34 UTC 2022
           Final Date: Sun Jun 06 10:36:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ab:b8:cb:96:55:33:71:e2:38:ca:84:1b:3e:5f:5d:ea:a0:3c:08:df]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 02312a13064d276550c0a9bc8164d5b036b50dcb
                       55e339228232264f75b3af4d633a6db354898edc
                       7de79d308ea405723ffeecdd0ae06f45b4f262b2
                       554fedfb51f66a0eff53b1360fc03b31c131fb69
                       d65923c2d9ebce868d5423a1df60d1f8393da128
                       e9640e802cc54698e5a61277c520e8e4a731ec7d
                       ffe8108464f0e305b229175bbd97d1227c222f5a
                       4548469241ee12a30c74f7de27696d65aa4e707e
                       83a5798e0c48f46392831774f599f5ce6605fe01
                       55d83d85b793868b5dbc49d917f9bc6edabe9050
                       4722caee18c458a97bf18a120c1c2a183b600e4f
                       9f3e823af81d7b28ceaca1c4413e7e1cf7578fe4
                       b5b8bffba81176abc4b66e217817f725071873c1
                       90caa91f73edc8bcbb41f37cf6d2346f7ffb58b5
                       4ab6e22dc9d86fc0c86435b8e030f2fd1769d1e6
                       1c3dc0abb19d46748e0d7294b6216d20d4eef689
                       75791de49afb56b2bcb14e49e629faa5d79850b7
                       d91059881e4d67f305ec9164b15176cea24d36f5
                       e732dd983541c06ab3e6b61fa415f922e3c482ca
                       765e78dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f6:a3:fd:09:bc:32:83:f8:a5:58:30:4e:74:15:eb:4d:ca:c0:db:23]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 12:13:17.205  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 12:13:17.206 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 12:13:17.208 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 12:13:17.209 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 12:13:17.209  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 12:13:17.210  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 12:13:17.210  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 12:13:17.211 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 12:13:17.211 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 12:13:17.212 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 12:13:17.216 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 12:13:17.217 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:13:17.217 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:13:17.217 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:13:17.354  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 12:13:17.355  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 12:13:17.355 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 12:13:17.356 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:13:17.357  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 12:13:17.358  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 12:13:17.358 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:13:17.359 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:13:17.359 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:13:17.360 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:13:17.360 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:13:17.360 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:13:17.361 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:13:17.361 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:13:17.362 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:13:17.362 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 12:13:17.367 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 704065848739395500571375981761368886764035867037
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 10:36:34 UTC 2022
           Final Date: Sun Jun 06 10:36:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ab:b8:cb:96:55:33:71:e2:38:ca:84:1b:3e:5f:5d:ea:a0:3c:08:df]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 02312a13064d276550c0a9bc8164d5b036b50dcb
                       55e339228232264f75b3af4d633a6db354898edc
                       7de79d308ea405723ffeecdd0ae06f45b4f262b2
                       554fedfb51f66a0eff53b1360fc03b31c131fb69
                       d65923c2d9ebce868d5423a1df60d1f8393da128
                       e9640e802cc54698e5a61277c520e8e4a731ec7d
                       ffe8108464f0e305b229175bbd97d1227c222f5a
                       4548469241ee12a30c74f7de27696d65aa4e707e
                       83a5798e0c48f46392831774f599f5ce6605fe01
                       55d83d85b793868b5dbc49d917f9bc6edabe9050
                       4722caee18c458a97bf18a120c1c2a183b600e4f
                       9f3e823af81d7b28ceaca1c4413e7e1cf7578fe4
                       b5b8bffba81176abc4b66e217817f725071873c1
                       90caa91f73edc8bcbb41f37cf6d2346f7ffb58b5
                       4ab6e22dc9d86fc0c86435b8e030f2fd1769d1e6
                       1c3dc0abb19d46748e0d7294b6216d20d4eef689
                       75791de49afb56b2bcb14e49e629faa5d79850b7
                       d91059881e4d67f305ec9164b15176cea24d36f5
                       e732dd983541c06ab3e6b61fa415f922e3c482ca
                       765e78dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a7:e3:14:35:a2:7f:58:fb:05:e6:ee:23:f2:0a:19:bb:79:09:38:69]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 12:17:14.901  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 12:17:14.904 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 12:17:14.906 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 12:17:14.908 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 12:17:14.908  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 12:17:14.910  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 12:17:14.910  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 12:17:14.911 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 12:17:14.911 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 12:17:14.912 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 12:17:14.918 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 12:17:14.919 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:17:14.919 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:17:14.919 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:17:15.070  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 12:17:15.071  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 12:17:15.071 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 12:17:15.072 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:17:15.073  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 12:17:15.074  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 12:17:15.074 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:17:15.075 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:17:15.075 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:17:15.076 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:17:15.076 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:17:15.077 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:17:15.078 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:17:15.078 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:17:15.078 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:17:15.079 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 12:17:15.083 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 704065848739395500571375981761368886764035867037
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 10:36:34 UTC 2022
           Final Date: Sun Jun 06 10:36:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ab:b8:cb:96:55:33:71:e2:38:ca:84:1b:3e:5f:5d:ea:a0:3c:08:df]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 02312a13064d276550c0a9bc8164d5b036b50dcb
                       55e339228232264f75b3af4d633a6db354898edc
                       7de79d308ea405723ffeecdd0ae06f45b4f262b2
                       554fedfb51f66a0eff53b1360fc03b31c131fb69
                       d65923c2d9ebce868d5423a1df60d1f8393da128
                       e9640e802cc54698e5a61277c520e8e4a731ec7d
                       ffe8108464f0e305b229175bbd97d1227c222f5a
                       4548469241ee12a30c74f7de27696d65aa4e707e
                       83a5798e0c48f46392831774f599f5ce6605fe01
                       55d83d85b793868b5dbc49d917f9bc6edabe9050
                       4722caee18c458a97bf18a120c1c2a183b600e4f
                       9f3e823af81d7b28ceaca1c4413e7e1cf7578fe4
                       b5b8bffba81176abc4b66e217817f725071873c1
                       90caa91f73edc8bcbb41f37cf6d2346f7ffb58b5
                       4ab6e22dc9d86fc0c86435b8e030f2fd1769d1e6
                       1c3dc0abb19d46748e0d7294b6216d20d4eef689
                       75791de49afb56b2bcb14e49e629faa5d79850b7
                       d91059881e4d67f305ec9164b15176cea24d36f5
                       e732dd983541c06ab3e6b61fa415f922e3c482ca
                       765e78dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d2:90:1d:7c:9f:19:94:92:6d:6f:92:ea:75:91:91:fc:84:f5:51:03]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 12:23:00.463  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 12:23:00.465 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 12:23:00.468 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 12:23:00.468 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 12:23:00.469  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 12:23:00.470  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 12:23:00.470  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 12:23:00.470 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 12:23:00.471 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 12:23:00.471 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 12:23:00.476 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 12:23:00.477 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:23:00.477 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:23:00.477 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:23:00.698  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 12:23:00.698  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 12:23:00.699 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 12:23:00.699 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:23:00.700  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 12:23:00.701  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 12:23:00.701 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:23:00.702 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:23:00.702 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:23:00.703 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:23:00.703 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:23:00.704 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:23:00.705 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:23:00.706 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:23:00.706 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:23:00.707 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 12:23:00.711 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 704065848739395500571375981761368886764035867037
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 10:36:34 UTC 2022
           Final Date: Sun Jun 06 10:36:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ab:b8:cb:96:55:33:71:e2:38:ca:84:1b:3e:5f:5d:ea:a0:3c:08:df]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 02312a13064d276550c0a9bc8164d5b036b50dcb
                       55e339228232264f75b3af4d633a6db354898edc
                       7de79d308ea405723ffeecdd0ae06f45b4f262b2
                       554fedfb51f66a0eff53b1360fc03b31c131fb69
                       d65923c2d9ebce868d5423a1df60d1f8393da128
                       e9640e802cc54698e5a61277c520e8e4a731ec7d
                       ffe8108464f0e305b229175bbd97d1227c222f5a
                       4548469241ee12a30c74f7de27696d65aa4e707e
                       83a5798e0c48f46392831774f599f5ce6605fe01
                       55d83d85b793868b5dbc49d917f9bc6edabe9050
                       4722caee18c458a97bf18a120c1c2a183b600e4f
                       9f3e823af81d7b28ceaca1c4413e7e1cf7578fe4
                       b5b8bffba81176abc4b66e217817f725071873c1
                       90caa91f73edc8bcbb41f37cf6d2346f7ffb58b5
                       4ab6e22dc9d86fc0c86435b8e030f2fd1769d1e6
                       1c3dc0abb19d46748e0d7294b6216d20d4eef689
                       75791de49afb56b2bcb14e49e629faa5d79850b7
                       d91059881e4d67f305ec9164b15176cea24d36f5
                       e732dd983541c06ab3e6b61fa415f922e3c482ca
                       765e78dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b1:ed:4b:d1:26:d5:0c:be:ca:4c:6a:df:d8:fe:f2:d0:a5:26:8f:c5]
            modulus: bb09ce0fad51221b9a88762d5d668649e96b6962098abad4de62ea78644b195c01f68afd725b10e2326a6d0f76c7c84ca870e9fd6cbeea973d3e61108b2cfa84a99f81358a8b03428fd830cafc49207081993f2ce29964d379bddc3f78bd27c3e4e0a4b06e718e547af446cd50844999f8320fa58f848812be1dc9b74a9ebb89d12271e9f32ef435a2c3053b7c0f7ee16479ff8e323a14c084a46d69777667e2bccc10d6709ee76664cd98503a3616415c3338846414106d79b3fe295a67e1697ae52f8a94b6bfb7e1037352144fa4be0830c409cc0bf39a1948d9d888fb0ac81a3c490300e713dcda696262b827a64891b1d76a48f590893c54e87df6bf1289
    public exponent: 10001

] 
2022-06-07 12:26:58.126  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 12:26:58.131 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 12:26:58.135 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 12:26:58.136 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 12:26:58.137  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 12:26:58.138  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 12:26:58.139  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 12:26:58.139 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 12:26:58.140 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 12:26:58.141 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 12:26:58.148 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 12:26:58.149 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:26:58.149 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:26:58.150 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:26:58.341  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 12:26:58.342  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 12:26:58.342 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 12:26:58.342 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:26:58.344  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 12:26:58.344  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 12:26:58.345 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:26:58.345 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:26:58.345 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:26:58.347 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:26:58.347 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:26:58.347 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:26:58.348 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:26:58.349 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:26:58.349 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:26:58.350 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 12:26:58.355 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 704065848739395500571375981761368886764035867037
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 10:36:34 UTC 2022
           Final Date: Sun Jun 06 10:36:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ab:b8:cb:96:55:33:71:e2:38:ca:84:1b:3e:5f:5d:ea:a0:3c:08:df]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 02312a13064d276550c0a9bc8164d5b036b50dcb
                       55e339228232264f75b3af4d633a6db354898edc
                       7de79d308ea405723ffeecdd0ae06f45b4f262b2
                       554fedfb51f66a0eff53b1360fc03b31c131fb69
                       d65923c2d9ebce868d5423a1df60d1f8393da128
                       e9640e802cc54698e5a61277c520e8e4a731ec7d
                       ffe8108464f0e305b229175bbd97d1227c222f5a
                       4548469241ee12a30c74f7de27696d65aa4e707e
                       83a5798e0c48f46392831774f599f5ce6605fe01
                       55d83d85b793868b5dbc49d917f9bc6edabe9050
                       4722caee18c458a97bf18a120c1c2a183b600e4f
                       9f3e823af81d7b28ceaca1c4413e7e1cf7578fe4
                       b5b8bffba81176abc4b66e217817f725071873c1
                       90caa91f73edc8bcbb41f37cf6d2346f7ffb58b5
                       4ab6e22dc9d86fc0c86435b8e030f2fd1769d1e6
                       1c3dc0abb19d46748e0d7294b6216d20d4eef689
                       75791de49afb56b2bcb14e49e629faa5d79850b7
                       d91059881e4d67f305ec9164b15176cea24d36f5
                       e732dd983541c06ab3e6b61fa415f922e3c482ca
                       765e78dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [78:51:ee:63:b9:4b:9e:16:c5:0e:2d:8e:6b:76:bf:d3:b9:a8:04:38]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 12:28:50.186  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 12:28:50.188 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 12:28:50.190 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-07 12:28:50.191 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 12:28:50.191  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-07 12:28:50.192  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 12:28:50.193  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 12:28:50.193 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 12:28:50.193 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 12:28:50.194 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 12:28:50.199 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 12:28:50.199 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:28:50.200 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:28:50.200 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:28:50.384  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 12:28:50.385  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 12:28:50.385 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 12:28:50.386 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:28:50.387  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 12:28:50.388  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 12:28:50.388 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:28:50.389 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:28:50.389 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:28:50.390 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:28:50.390 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:28:50.391 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:28:50.392 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:28:50.392 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:28:50.392 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:28:50.393 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 12:28:50.397 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 704065848739395500571375981761368886764035867037
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 10:36:34 UTC 2022
           Final Date: Sun Jun 06 10:36:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ab:b8:cb:96:55:33:71:e2:38:ca:84:1b:3e:5f:5d:ea:a0:3c:08:df]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 02312a13064d276550c0a9bc8164d5b036b50dcb
                       55e339228232264f75b3af4d633a6db354898edc
                       7de79d308ea405723ffeecdd0ae06f45b4f262b2
                       554fedfb51f66a0eff53b1360fc03b31c131fb69
                       d65923c2d9ebce868d5423a1df60d1f8393da128
                       e9640e802cc54698e5a61277c520e8e4a731ec7d
                       ffe8108464f0e305b229175bbd97d1227c222f5a
                       4548469241ee12a30c74f7de27696d65aa4e707e
                       83a5798e0c48f46392831774f599f5ce6605fe01
                       55d83d85b793868b5dbc49d917f9bc6edabe9050
                       4722caee18c458a97bf18a120c1c2a183b600e4f
                       9f3e823af81d7b28ceaca1c4413e7e1cf7578fe4
                       b5b8bffba81176abc4b66e217817f725071873c1
                       90caa91f73edc8bcbb41f37cf6d2346f7ffb58b5
                       4ab6e22dc9d86fc0c86435b8e030f2fd1769d1e6
                       1c3dc0abb19d46748e0d7294b6216d20d4eef689
                       75791de49afb56b2bcb14e49e629faa5d79850b7
                       d91059881e4d67f305ec9164b15176cea24d36f5
                       e732dd983541c06ab3e6b61fa415f922e3c482ca
                       765e78dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [10:0a:eb:90:6a:93:4b:5f:9f:7c:07:d5:fa:d2:41:9d:36:f2:c7:39]
            modulus: b28891ba925305a5d8b67316c703404df2dae2aad792e20f6f441485aba0baf7fb6172a5c8fb32a2c2142ef5b9eed28c64092795b0df3e581bfefe041c58177abfdb7120c7b852d9bf43dbdfdba5382b07a4a3509586193582d8741ce8afd65df9aa353e2c85c0e7f65ae275ed06c1ee3353ba86230d487ddea57d94bfeedd80de47dfaab50f2c19b9c3a1a84d05a7882f13247ccd6c781be98bc1c3980bb5d12adcc740358f442b151a36e24d2939dcdee8d57fcb7e70e5b84a69fe5521103b7923f003d93ba489cabaffac4a5671f5b7191a99d0201aa96acd6776735d7fbe5ab47d24d207694a5eac6688bdcc049c339dbde459dd564ab50edf305bf07bcd
    public exponent: 10001

] 
2022-06-07 12:30:49.930  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 12:30:49.933 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 12:30:49.934 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 12:30:49.935 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 12:30:49.935  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 12:30:49.936  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 12:30:49.938  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 12:30:49.939 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 12:30:49.940 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 12:30:49.940 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 12:30:49.949 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 12:30:49.949 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:30:49.949 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:30:49.950 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:30:50.151  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 12:30:50.152  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 12:30:50.152 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 12:30:50.152 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:30:50.153  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 12:30:50.154  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 12:30:50.154 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:30:50.154 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:30:50.155 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:30:50.156 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:30:50.156 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:30:50.156 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:30:50.157 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:30:50.157 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:30:50.158 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:30:50.158 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 12:30:50.176 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 704065848739395500571375981761368886764035867037
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 10:36:34 UTC 2022
           Final Date: Sun Jun 06 10:36:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ab:b8:cb:96:55:33:71:e2:38:ca:84:1b:3e:5f:5d:ea:a0:3c:08:df]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 02312a13064d276550c0a9bc8164d5b036b50dcb
                       55e339228232264f75b3af4d633a6db354898edc
                       7de79d308ea405723ffeecdd0ae06f45b4f262b2
                       554fedfb51f66a0eff53b1360fc03b31c131fb69
                       d65923c2d9ebce868d5423a1df60d1f8393da128
                       e9640e802cc54698e5a61277c520e8e4a731ec7d
                       ffe8108464f0e305b229175bbd97d1227c222f5a
                       4548469241ee12a30c74f7de27696d65aa4e707e
                       83a5798e0c48f46392831774f599f5ce6605fe01
                       55d83d85b793868b5dbc49d917f9bc6edabe9050
                       4722caee18c458a97bf18a120c1c2a183b600e4f
                       9f3e823af81d7b28ceaca1c4413e7e1cf7578fe4
                       b5b8bffba81176abc4b66e217817f725071873c1
                       90caa91f73edc8bcbb41f37cf6d2346f7ffb58b5
                       4ab6e22dc9d86fc0c86435b8e030f2fd1769d1e6
                       1c3dc0abb19d46748e0d7294b6216d20d4eef689
                       75791de49afb56b2bcb14e49e629faa5d79850b7
                       d91059881e4d67f305ec9164b15176cea24d36f5
                       e732dd983541c06ab3e6b61fa415f922e3c482ca
                       765e78dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ff:a3:f7:64:da:73:37:df:09:e5:11:e9:88:ad:04:a7:cf:45:9c:ad]
            modulus: e28715c841751caeff0eb82449b1da0b6fab7708632cfff21f811ac87bc4905d435cc034751174c911a87fff89e026bf12122a183101a90e0af45782b582a706242f60df2a068d822c68c6cad1e7f1b28d3c09513002c6ad89645a4398fa79a4aad4e5ae739173ae501139f08395f0d2628fd6c8ac314855b0288c2865237e457ad027f9489bc0198068be12a9a1999353c7208493e367cd378da46ac1c103083663653783737fd1622b631140ae6a575d831aab81877bd94f553c27efa83786d65626e029c0f905f8ca14f683711fb64a30b9bee445c10aa9b0489e43cf77481d4044bf14fea158c15787c9f9a4a330530ec84150c99980e40f84b90ea055c7
    public exponent: 10001

] 
2022-06-07 12:34:51.465  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 12:34:51.468 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 12:34:51.470 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-07 12:34:51.471 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 12:34:51.471  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-07 12:34:51.472  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 12:34:51.473  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 12:34:51.482 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 12:34:51.482 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 12:34:51.483 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 12:34:51.495 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 12:34:51.496 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:34:51.496 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:34:51.497 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:34:51.669  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 12:34:51.669  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 12:34:51.670 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 12:34:51.670 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:34:51.671  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 12:34:51.671  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 12:34:51.672 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:34:51.672 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:34:51.672 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:34:51.675 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:34:51.675 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:34:51.676 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:34:51.676 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:34:51.676 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:34:51.677 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:34:51.678 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 12:34:51.684 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 704065848739395500571375981761368886764035867037
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 10:36:34 UTC 2022
           Final Date: Sun Jun 06 10:36:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ab:b8:cb:96:55:33:71:e2:38:ca:84:1b:3e:5f:5d:ea:a0:3c:08:df]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 02312a13064d276550c0a9bc8164d5b036b50dcb
                       55e339228232264f75b3af4d633a6db354898edc
                       7de79d308ea405723ffeecdd0ae06f45b4f262b2
                       554fedfb51f66a0eff53b1360fc03b31c131fb69
                       d65923c2d9ebce868d5423a1df60d1f8393da128
                       e9640e802cc54698e5a61277c520e8e4a731ec7d
                       ffe8108464f0e305b229175bbd97d1227c222f5a
                       4548469241ee12a30c74f7de27696d65aa4e707e
                       83a5798e0c48f46392831774f599f5ce6605fe01
                       55d83d85b793868b5dbc49d917f9bc6edabe9050
                       4722caee18c458a97bf18a120c1c2a183b600e4f
                       9f3e823af81d7b28ceaca1c4413e7e1cf7578fe4
                       b5b8bffba81176abc4b66e217817f725071873c1
                       90caa91f73edc8bcbb41f37cf6d2346f7ffb58b5
                       4ab6e22dc9d86fc0c86435b8e030f2fd1769d1e6
                       1c3dc0abb19d46748e0d7294b6216d20d4eef689
                       75791de49afb56b2bcb14e49e629faa5d79850b7
                       d91059881e4d67f305ec9164b15176cea24d36f5
                       e732dd983541c06ab3e6b61fa415f922e3c482ca
                       765e78dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [74:9c:a8:3a:24:fe:43:1b:9e:d9:19:d3:f4:b2:08:37:e7:72:73:8e]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 12:35:09.088  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 12:35:09.089 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 12:35:09.091 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-07 12:35:09.091 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 12:35:09.093  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-07 12:35:09.094  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 12:35:09.094  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 12:35:09.094 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 12:35:09.095 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 12:35:09.095 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 12:35:09.100 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 12:35:09.100 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:35:09.100 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:35:09.100 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:35:09.227  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 12:35:09.228  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 12:35:09.229 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 12:35:09.229 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:35:09.231  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 12:35:09.231  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 12:35:09.231 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:35:09.232 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:35:09.232 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:35:09.233 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:35:09.233 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:35:09.233 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:35:09.234 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:35:09.234 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:35:09.234 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:35:09.235 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 12:35:09.238 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 704065848739395500571375981761368886764035867037
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 10:36:34 UTC 2022
           Final Date: Sun Jun 06 10:36:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ab:b8:cb:96:55:33:71:e2:38:ca:84:1b:3e:5f:5d:ea:a0:3c:08:df]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 02312a13064d276550c0a9bc8164d5b036b50dcb
                       55e339228232264f75b3af4d633a6db354898edc
                       7de79d308ea405723ffeecdd0ae06f45b4f262b2
                       554fedfb51f66a0eff53b1360fc03b31c131fb69
                       d65923c2d9ebce868d5423a1df60d1f8393da128
                       e9640e802cc54698e5a61277c520e8e4a731ec7d
                       ffe8108464f0e305b229175bbd97d1227c222f5a
                       4548469241ee12a30c74f7de27696d65aa4e707e
                       83a5798e0c48f46392831774f599f5ce6605fe01
                       55d83d85b793868b5dbc49d917f9bc6edabe9050
                       4722caee18c458a97bf18a120c1c2a183b600e4f
                       9f3e823af81d7b28ceaca1c4413e7e1cf7578fe4
                       b5b8bffba81176abc4b66e217817f725071873c1
                       90caa91f73edc8bcbb41f37cf6d2346f7ffb58b5
                       4ab6e22dc9d86fc0c86435b8e030f2fd1769d1e6
                       1c3dc0abb19d46748e0d7294b6216d20d4eef689
                       75791de49afb56b2bcb14e49e629faa5d79850b7
                       d91059881e4d67f305ec9164b15176cea24d36f5
                       e732dd983541c06ab3e6b61fa415f922e3c482ca
                       765e78dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a1:8f:71:e3:3b:cd:c6:7b:a8:30:70:e5:fe:fa:fb:3d:91:cc:fd:73]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 12:35:20.772  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 12:35:20.773 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 12:35:20.774 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 12:35:20.775 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 12:35:20.775  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 12:35:20.776  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 12:35:20.776  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 12:35:20.776 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 12:35:20.777 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 12:35:20.777 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 12:35:20.781 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 12:35:20.782 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:35:20.782 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:35:20.782 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:35:20.900  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 12:35:20.901  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 12:35:20.901 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 12:35:20.901 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:35:20.903  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 12:35:20.903  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 12:35:20.903 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:35:20.904 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:35:20.904 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:35:20.904 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:35:20.904 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:35:20.905 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:35:20.905 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:35:20.905 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:35:20.906 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:35:20.906 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 12:35:20.909 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 704065848739395500571375981761368886764035867037
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 10:36:34 UTC 2022
           Final Date: Sun Jun 06 10:36:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ab:b8:cb:96:55:33:71:e2:38:ca:84:1b:3e:5f:5d:ea:a0:3c:08:df]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 02312a13064d276550c0a9bc8164d5b036b50dcb
                       55e339228232264f75b3af4d633a6db354898edc
                       7de79d308ea405723ffeecdd0ae06f45b4f262b2
                       554fedfb51f66a0eff53b1360fc03b31c131fb69
                       d65923c2d9ebce868d5423a1df60d1f8393da128
                       e9640e802cc54698e5a61277c520e8e4a731ec7d
                       ffe8108464f0e305b229175bbd97d1227c222f5a
                       4548469241ee12a30c74f7de27696d65aa4e707e
                       83a5798e0c48f46392831774f599f5ce6605fe01
                       55d83d85b793868b5dbc49d917f9bc6edabe9050
                       4722caee18c458a97bf18a120c1c2a183b600e4f
                       9f3e823af81d7b28ceaca1c4413e7e1cf7578fe4
                       b5b8bffba81176abc4b66e217817f725071873c1
                       90caa91f73edc8bcbb41f37cf6d2346f7ffb58b5
                       4ab6e22dc9d86fc0c86435b8e030f2fd1769d1e6
                       1c3dc0abb19d46748e0d7294b6216d20d4eef689
                       75791de49afb56b2bcb14e49e629faa5d79850b7
                       d91059881e4d67f305ec9164b15176cea24d36f5
                       e732dd983541c06ab3e6b61fa415f922e3c482ca
                       765e78dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cf:26:26:ae:a2:14:3f:86:fb:21:ef:f4:ff:8c:3a:f0:20:20:bf:c4]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 12:40:13.999  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 12:40:14.001 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 12:40:14.003 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 12:40:14.005 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 12:40:14.005  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 12:40:14.006  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 12:40:14.006  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 12:40:14.007 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 12:40:14.007 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 12:40:14.008 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 12:40:14.013 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 12:40:14.014 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:40:14.014 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:40:14.015 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:40:14.180  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 12:40:14.181  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 12:40:14.182 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 12:40:14.182 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:40:14.183  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 12:40:14.184  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 12:40:14.184 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:40:14.184 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:40:14.185 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:40:14.185 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:40:14.186 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:40:14.186 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:40:14.187 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:40:14.187 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:40:14.187 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:40:14.188 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 12:40:14.192 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 704065848739395500571375981761368886764035867037
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 10:36:34 UTC 2022
           Final Date: Sun Jun 06 10:36:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ab:b8:cb:96:55:33:71:e2:38:ca:84:1b:3e:5f:5d:ea:a0:3c:08:df]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 02312a13064d276550c0a9bc8164d5b036b50dcb
                       55e339228232264f75b3af4d633a6db354898edc
                       7de79d308ea405723ffeecdd0ae06f45b4f262b2
                       554fedfb51f66a0eff53b1360fc03b31c131fb69
                       d65923c2d9ebce868d5423a1df60d1f8393da128
                       e9640e802cc54698e5a61277c520e8e4a731ec7d
                       ffe8108464f0e305b229175bbd97d1227c222f5a
                       4548469241ee12a30c74f7de27696d65aa4e707e
                       83a5798e0c48f46392831774f599f5ce6605fe01
                       55d83d85b793868b5dbc49d917f9bc6edabe9050
                       4722caee18c458a97bf18a120c1c2a183b600e4f
                       9f3e823af81d7b28ceaca1c4413e7e1cf7578fe4
                       b5b8bffba81176abc4b66e217817f725071873c1
                       90caa91f73edc8bcbb41f37cf6d2346f7ffb58b5
                       4ab6e22dc9d86fc0c86435b8e030f2fd1769d1e6
                       1c3dc0abb19d46748e0d7294b6216d20d4eef689
                       75791de49afb56b2bcb14e49e629faa5d79850b7
                       d91059881e4d67f305ec9164b15176cea24d36f5
                       e732dd983541c06ab3e6b61fa415f922e3c482ca
                       765e78dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [26:45:9e:28:8e:b9:f7:2b:7a:2b:9c:31:94:a5:96:c3:6f:fc:a9:e6]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 12:44:15.453  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 12:44:15.454 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 12:44:15.456 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 12:44:15.458 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 12:44:15.458  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 12:44:15.459  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 12:44:15.459  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 12:44:15.459 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 12:44:15.460 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 12:44:15.460 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 12:44:15.465 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 12:44:15.465 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:44:15.465 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:44:15.466 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:44:15.624  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 12:44:15.625  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 12:44:15.625 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 12:44:15.625 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:44:15.626  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 12:44:15.626  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 12:44:15.627 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:44:15.627 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:44:15.627 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:44:15.628 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:44:15.628 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:44:15.628 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:44:15.629 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:44:15.629 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:44:15.629 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:44:15.630 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 12:44:15.632 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 704065848739395500571375981761368886764035867037
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 10:36:34 UTC 2022
           Final Date: Sun Jun 06 10:36:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ab:b8:cb:96:55:33:71:e2:38:ca:84:1b:3e:5f:5d:ea:a0:3c:08:df]
            modulus: c4e1170c27744b389f79e199717c86c20b7fd59985134d5564ea03065f1a831b2c64bc4cb6de6fe475ba20cffacffaa60a3c197324264e9fc2ef1ac21f90bc2d8f35e50f7d02876952d7f23f004c488aadc67e168d2b793a66cd116cd76a1385f1dc0eb05bdcfd3e0ffb24eee0cd4cd99a01c25dfb56d06af6d9a8f43afc1d211b9b386ba66f6d67b9ad89b290c2c2a3d4ef0d02557ac1b989ac5b987b7dc6368699de245c91f5dafe8bea625d5a3f98aa1bfe5933e2bccbd91299be8c3db3ac5bfbb4c114fe6e9f925a87a2d0e4bcbff8bac2ed393baa184ee0d33cf9b0eb7639a630e3aec247abb557d7e2e03e66d59d622a773f974e79c7acfd4272304094a7b851422e9e922c35d75b2509c5f7443b0c57ab2a40ff2561072a3bfb003eac0b2e7a8de4fb2667457dc5e68b3ff01bafe895195a1bcf9ac35cc4e49f19c7f847d68158ad24fb796ee64194ec4f2fefe736b68e9a54212574120c4387533bdf1d4bda11c374a973091dae3bdda4cca2154f2a96ed69f59608bfac38167c8617
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 02312a13064d276550c0a9bc8164d5b036b50dcb
                       55e339228232264f75b3af4d633a6db354898edc
                       7de79d308ea405723ffeecdd0ae06f45b4f262b2
                       554fedfb51f66a0eff53b1360fc03b31c131fb69
                       d65923c2d9ebce868d5423a1df60d1f8393da128
                       e9640e802cc54698e5a61277c520e8e4a731ec7d
                       ffe8108464f0e305b229175bbd97d1227c222f5a
                       4548469241ee12a30c74f7de27696d65aa4e707e
                       83a5798e0c48f46392831774f599f5ce6605fe01
                       55d83d85b793868b5dbc49d917f9bc6edabe9050
                       4722caee18c458a97bf18a120c1c2a183b600e4f
                       9f3e823af81d7b28ceaca1c4413e7e1cf7578fe4
                       b5b8bffba81176abc4b66e217817f725071873c1
                       90caa91f73edc8bcbb41f37cf6d2346f7ffb58b5
                       4ab6e22dc9d86fc0c86435b8e030f2fd1769d1e6
                       1c3dc0abb19d46748e0d7294b6216d20d4eef689
                       75791de49afb56b2bcb14e49e629faa5d79850b7
                       d91059881e4d67f305ec9164b15176cea24d36f5
                       e732dd983541c06ab3e6b61fa415f922e3c482ca
                       765e78dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [07:88:f2:d4:d8:00:03:9f:02:8e:df:72:77:4c:63:c4:16:e0:cf:0b]
            modulus: b2965456bf490c7e5f3dccb6f2c45aae2311e34837cd4a1dd4dcba5571031a39e08716ddd4ee0f3e027169f5f1cb7a92b2edd6d99bd659ba79291310dba704afb98801c04ffee25cd59a4684e36ad0139fc4d07e38eddab26a845b44e1a27f7a885f37a5f8e3c30afd80be8bf224aad201bb6b0622b05b1c2b0e0ebe4d4b143877f3234d84806db4cb8c90ffe86a78fad2d13068027b50e3fcdc1565c7912b94ee010bf3f5f2c5636c29086c2dede919d48335a990bdce94d2d6fa644f1d556c4404a812020b96d3541c0173b22da6d89c75ece31bc37b97bcf7f0227bc18680de1f7c7e4984cb16f397c8f9a801e9a43d29d18f17cacbc11b93d7451cbba727
    public exponent: 10001

] 
2022-06-07 12:50:27.480  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 12:50:27.483 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 12:50:27.485 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 12:50:27.486 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 12:50:27.487  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 12:50:27.487  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 12:50:27.488  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 12:50:27.489 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 12:50:27.489 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 12:50:27.489 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 12:50:27.495 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 12:50:27.496 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:50:27.496 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:50:27.496 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:50:27.774  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 12:50:27.775  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 12:50:27.775 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 12:50:27.776 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:50:27.777  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 12:50:27.777  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 12:50:27.777 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:50:27.777 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:50:27.778 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:50:27.778 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:50:27.778 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:50:27.778 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:50:27.779 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:50:27.779 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:50:27.779 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:50:27.780 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 12:50:27.784 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 704065848739395500571375981761368886764035867037
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 10:36:34 UTC 2022
           Final Date: Sun Jun 06 10:36:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ab:b8:cb:96:55:33:71:e2:38:ca:84:1b:3e:5f:5d:ea:a0:3c:08:df]
            modulus: c4e1170c27744b389f79e199717c86c20b7fd59985134d5564ea03065f1a831b2c64bc4cb6de6fe475ba20cffacffaa60a3c197324264e9fc2ef1ac21f90bc2d8f35e50f7d02876952d7f23f004c488aadc67e168d2b793a66cd116cd76a1385f1dc0eb05bdcfd3e0ffb24eee0cd4cd99a01c25dfb56d06af6d9a8f43afc1d211b9b386ba66f6d67b9ad89b290c2c2a3d4ef0d02557ac1b989ac5b987b7dc6368699de245c91f5dafe8bea625d5a3f98aa1bfe5933e2bccbd91299be8c3db3ac5bfbb4c114fe6e9f925a87a2d0e4bcbff8bac2ed393baa184ee0d33cf9b0eb7639a630e3aec247abb557d7e2e03e66d59d622a773f974e79c7acfd4272304094a7b851422e9e922c35d75b2509c5f7443b0c57ab2a40ff2561072a3bfb003eac0b2e7a8de4fb2667457dc5e68b3ff01bafe895195a1bcf9ac35cc4e49f19c7f847d68158ad24fb796ee64194ec4f2fefe736b68e9a54212574120c4387533bdf1d4bda11c374a973091dae3bdda4cca2154f2a96ed69f59608bfac38167c8617
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 02312a13064d276550c0a9bc8164d5b036b50dcb
                       55e339228232264f75b3af4d633a6db354898edc
                       7de79d308ea405723ffeecdd0ae06f45b4f262b2
                       554fedfb51f66a0eff53b1360fc03b31c131fb69
                       d65923c2d9ebce868d5423a1df60d1f8393da128
                       e9640e802cc54698e5a61277c520e8e4a731ec7d
                       ffe8108464f0e305b229175bbd97d1227c222f5a
                       4548469241ee12a30c74f7de27696d65aa4e707e
                       83a5798e0c48f46392831774f599f5ce6605fe01
                       55d83d85b793868b5dbc49d917f9bc6edabe9050
                       4722caee18c458a97bf18a120c1c2a183b600e4f
                       9f3e823af81d7b28ceaca1c4413e7e1cf7578fe4
                       b5b8bffba81176abc4b66e217817f725071873c1
                       90caa91f73edc8bcbb41f37cf6d2346f7ffb58b5
                       4ab6e22dc9d86fc0c86435b8e030f2fd1769d1e6
                       1c3dc0abb19d46748e0d7294b6216d20d4eef689
                       75791de49afb56b2bcb14e49e629faa5d79850b7
                       d91059881e4d67f305ec9164b15176cea24d36f5
                       e732dd983541c06ab3e6b61fa415f922e3c482ca
                       765e78dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d1:0f:b3:f3:b9:ad:27:77:ac:c2:33:e4:fd:00:27:60:fc:d0:8e:84]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 12:54:31.373  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 12:54:31.377 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 12:54:31.379 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 12:54:31.380 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 12:54:31.380  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 12:54:31.381  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 12:54:31.381  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 12:54:31.382 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 12:54:31.382 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 12:54:31.382 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 12:54:31.388 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 12:54:31.389 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:54:31.389 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:54:31.389 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:54:31.533  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 12:54:31.533  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 12:54:31.534 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 12:54:31.534 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:54:31.535  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 12:54:31.536  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 12:54:31.536 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:54:31.536 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:54:31.536 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:54:31.537 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:54:31.537 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:54:31.537 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:54:31.538 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:54:31.538 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:54:31.538 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:54:31.539 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 12:54:31.542 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 704065848739395500571375981761368886764035867037
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 10:36:34 UTC 2022
           Final Date: Sun Jun 06 10:36:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ab:b8:cb:96:55:33:71:e2:38:ca:84:1b:3e:5f:5d:ea:a0:3c:08:df]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 02312a13064d276550c0a9bc8164d5b036b50dcb
                       55e339228232264f75b3af4d633a6db354898edc
                       7de79d308ea405723ffeecdd0ae06f45b4f262b2
                       554fedfb51f66a0eff53b1360fc03b31c131fb69
                       d65923c2d9ebce868d5423a1df60d1f8393da128
                       e9640e802cc54698e5a61277c520e8e4a731ec7d
                       ffe8108464f0e305b229175bbd97d1227c222f5a
                       4548469241ee12a30c74f7de27696d65aa4e707e
                       83a5798e0c48f46392831774f599f5ce6605fe01
                       55d83d85b793868b5dbc49d917f9bc6edabe9050
                       4722caee18c458a97bf18a120c1c2a183b600e4f
                       9f3e823af81d7b28ceaca1c4413e7e1cf7578fe4
                       b5b8bffba81176abc4b66e217817f725071873c1
                       90caa91f73edc8bcbb41f37cf6d2346f7ffb58b5
                       4ab6e22dc9d86fc0c86435b8e030f2fd1769d1e6
                       1c3dc0abb19d46748e0d7294b6216d20d4eef689
                       75791de49afb56b2bcb14e49e629faa5d79850b7
                       d91059881e4d67f305ec9164b15176cea24d36f5
                       e732dd983541c06ab3e6b61fa415f922e3c482ca
                       765e78dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [65:33:47:23:b7:c8:a7:2f:34:78:d7:35:af:52:0d:f4:bd:36:f8:25]
            modulus: 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
    public exponent: 10001

]