Results

By type

          2022-06-06 16:07:44,367 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-06-06 16:07:45,758 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-06-06 16:07:46.451  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jun 06, 2022 4:07:48 PM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jun 06, 2022 4:07:48 PM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 06, 2022 4:07:48 PM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jun 06, 2022 4:07:48 PM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-06-06 16:07:48.986 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-06-06 16:07:49.287  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-06-06 16:07:49.443  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-06-06 16:07:50.141 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-06-06 16:07:50.144 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-06-06 16:07:50.146 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-06-06 16:07:50.151 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-06-06 16:07:50.192 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-06-06 16:07:50.195 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-06-06 16:07:50.328 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-06-06 16:07:50.956 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jun 06, 2022 4:07:51 PM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-06-06 16:07:51.844  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.289 seconds (JVM running for 9.989)
Jun 06, 2022 4:08:18 PM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-06-06 16:08:42.567  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-06 16:08:42.574 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-06 16:08:42.608 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-06 16:08:42.612 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-06 16:08:42.626  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-06 16:08:42.629  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-06 16:08:42.630  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-06 16:08:42.631 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-06 16:08:42.631 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 16:08:42.635 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-06 16:08:42.640 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-06 16:08:42.643 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-06 16:08:42.677 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-06 16:08:42.682 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 16:08:42.682 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 16:08:42.685 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 16:08:43.295  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-06 16:08:43.298  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-06 16:08:43.298 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-06 16:08:43.299 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 16:08:43.308  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-06 16:08:43.309  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-06 16:08:43.309 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 16:08:43.310 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 16:08:43.310 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 16:08:43.321 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 16:08:43.321 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 16:08:43.322 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 16:08:43.327 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 16:08:43.328 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 16:08:43.328 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 16:08:43.330 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-06 16:08:43.359 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 394248379753100478578310106853475322234490396451
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 06 16:05:40 UTC 2022
           Final Date: Sat Jun 05 16:05:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e6:38:2c:1b:61:7a:47:ea:e9:ee:04:1b:2a:c5:06:e8:ac:3d:fe:7c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6b0512f7c1e3d01f01c8c59551a802a217eea70
                       2fc352584e0e401cfa0de643871e9d1c153d4c7c
                       68d5abcc17b9f281f0d45e872f09a86a34e5d053
                       2dc3d145e53edf31fe4d9f77b5d0b4b29c9c137a
                       f0869453f93a86612a213a085d039c3f8a5c4986
                       ca79a8c0aac8ca00bcae0430a4c4711b2644eb30
                       1d7c1011bdec910c0439ee14ab3e5ab93cf7d97a
                       14f2238c760c11a644641098b0c6d73b4e49eef4
                       05978d4529bf756b434261ec091b9ee4d0dbe233
                       d9ba7b28c109abbad75e74aa2531cc7a74a0e690
                       56e517fc61aa8df864736ada83bc2aeefdbc17db
                       5d1f0967abd2ed07f08b9172399f10ca93674229
                       2242e614883c88d41edad81521afdc20e0055f39
                       6a21141e51ccf47444dc0869b83e7e8bb0d79c41
                       eee9c606c3cc1db6d7b303116a778fc6968a840a
                       38d9c2a4624abf94ff333ce44fa989dede31b429
                       c01856ceede7a708f0cd33849a85ff860bd76d55
                       da6f2c275003472ebd5fbd938086d886276b9a7b
                       d71c41198f414ea3e9fe7fd66f005d0a999a7602
                       b86894d5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0d:c7:75:be:10:83:4f:fe:bb:5c:b3:08:09:bd:7e:86:19:2a:c5:23]
            modulus: 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
    public exponent: 10001

] 
2022-06-06 17:27:32.593  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-06 17:27:32.596 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-06 17:27:32.599 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-06 17:27:32.601 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-06 17:27:32.602  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-06 17:27:32.602  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-06 17:27:32.603  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-06 17:27:32.603 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-06 17:27:32.604 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-06 17:27:32.604 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-06 17:27:32.616 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-06 17:27:32.618 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 17:27:32.618 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 17:27:32.619 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 17:27:32.789  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-06 17:27:32.790  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-06 17:27:32.791 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-06 17:27:32.792 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 17:27:32.794  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-06 17:27:32.795  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-06 17:27:32.795 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 17:27:32.796 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 17:27:32.796 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 17:27:32.797 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 17:27:32.798 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 17:27:32.798 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 17:27:32.799 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 17:27:32.799 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 17:27:32.799 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 17:27:32.800 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-06 17:27:32.805 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 394248379753100478578310106853475322234490396451
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 06 16:05:40 UTC 2022
           Final Date: Sat Jun 05 16:05:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e6:38:2c:1b:61:7a:47:ea:e9:ee:04:1b:2a:c5:06:e8:ac:3d:fe:7c]
            modulus: dea44ea35cbda5e620817e99302e28ea328054e6ed2b58f0c660ec4822608f9adcd4fe3e9b39b91b050ee8f5be4c39422da7e3e28438a8eb8fb3a635c3858f530a019e7f65a67fe04b430d0f8bcc3121222eb99ce7b9bbbe326ee0ee9f5da22926f9f755fec991b6aaca64319a67a4793ae6b3417333bdef0460665726f22035721e3acd06caa986e953f5a5e1990646d401eb24d6710933d4faed1a734e0eef4ce3c714f8004dcdb4db9388991538bf1744efdbbaca156b63b8eb52d824999ec0b64cbf35934c38058369a99866525c88458108f01013dd7cc2daff48ea481cb024bba8b8e00a39f778b601be973084c9ecb99ba1cc1b52285087c923e72638c93c7c8ddfd9cca95a0027e251e836e98a7ec981b9f3b4f202bf65c0ee06b4551143ff45b93451beeb94db53e3fb6122fe0e4a9cdd164c92a59045fb3ea8c838a9b8d5224d13b72d3da581eb49fdb491dc19c12c3bc736e6ac479db6b6da9ecc52658f3f3fafcf2073e4b8d40e0ef5d1e0f7a35e56d572821f8ad7e5ae674357
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6b0512f7c1e3d01f01c8c59551a802a217eea70
                       2fc352584e0e401cfa0de643871e9d1c153d4c7c
                       68d5abcc17b9f281f0d45e872f09a86a34e5d053
                       2dc3d145e53edf31fe4d9f77b5d0b4b29c9c137a
                       f0869453f93a86612a213a085d039c3f8a5c4986
                       ca79a8c0aac8ca00bcae0430a4c4711b2644eb30
                       1d7c1011bdec910c0439ee14ab3e5ab93cf7d97a
                       14f2238c760c11a644641098b0c6d73b4e49eef4
                       05978d4529bf756b434261ec091b9ee4d0dbe233
                       d9ba7b28c109abbad75e74aa2531cc7a74a0e690
                       56e517fc61aa8df864736ada83bc2aeefdbc17db
                       5d1f0967abd2ed07f08b9172399f10ca93674229
                       2242e614883c88d41edad81521afdc20e0055f39
                       6a21141e51ccf47444dc0869b83e7e8bb0d79c41
                       eee9c606c3cc1db6d7b303116a778fc6968a840a
                       38d9c2a4624abf94ff333ce44fa989dede31b429
                       c01856ceede7a708f0cd33849a85ff860bd76d55
                       da6f2c275003472ebd5fbd938086d886276b9a7b
                       d71c41198f414ea3e9fe7fd66f005d0a999a7602
                       b86894d5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5c:89:df:9a:4a:02:c4:eb:0c:58:21:fe:ee:7e:4b:6c:b2:ce:c0:f5]
            modulus: 9cfe136424b991d2250c316c28d6b84d9d9a6672c8d4ab55a58d66d5b15b597fb84d78c78eca8702238c7745e6364b049945825dfa65af0ab9ad3c91c94981c503a75f7848439d8fd5cc2b90e210264ad3a2a1a2d09404b31b85615fb3f80b2b14536cf8f5a7d55323a8d088eebcba197c174b52f7e39d20da717577eca4f0c0085e74cdcec52d69cf75d9ceade34ae5067947c58c993d17762e4f49d716b03f76c5b9bd89f39a8289dc307ef6dd051876f9373546151559bf68d658183e8eefc439d327f125251f2ff4fb6ab1cf8d2470e3c6359f3067513cf48eb2a8a645aaad5d94d0f1746743be1e6565651e8f80e03a682c1c446a88bf4f8f81099962ab
    public exponent: 10001

] 
2022-06-06 17:29:21.002  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-06 17:29:21.004 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-06 17:29:21.006 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-06 17:29:21.007 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-06 17:29:21.008  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-06 17:29:21.009  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-06 17:29:21.010  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-06 17:29:21.011 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-06 17:29:21.011 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-06 17:29:21.012 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-06 17:29:21.024 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-06 17:29:21.025 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 17:29:21.025 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 17:29:21.026 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 17:29:21.189  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-06 17:29:21.190  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-06 17:29:21.190 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-06 17:29:21.191 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 17:29:21.194  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-06 17:29:21.195  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-06 17:29:21.195 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 17:29:21.196 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 17:29:21.196 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 17:29:21.197 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 17:29:21.198 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 17:29:21.198 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 17:29:21.199 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 17:29:21.199 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 17:29:21.200 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 17:29:21.201 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-06 17:29:21.205 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 394248379753100478578310106853475322234490396451
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 06 16:05:40 UTC 2022
           Final Date: Sat Jun 05 16:05:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e6:38:2c:1b:61:7a:47:ea:e9:ee:04:1b:2a:c5:06:e8:ac:3d:fe:7c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6b0512f7c1e3d01f01c8c59551a802a217eea70
                       2fc352584e0e401cfa0de643871e9d1c153d4c7c
                       68d5abcc17b9f281f0d45e872f09a86a34e5d053
                       2dc3d145e53edf31fe4d9f77b5d0b4b29c9c137a
                       f0869453f93a86612a213a085d039c3f8a5c4986
                       ca79a8c0aac8ca00bcae0430a4c4711b2644eb30
                       1d7c1011bdec910c0439ee14ab3e5ab93cf7d97a
                       14f2238c760c11a644641098b0c6d73b4e49eef4
                       05978d4529bf756b434261ec091b9ee4d0dbe233
                       d9ba7b28c109abbad75e74aa2531cc7a74a0e690
                       56e517fc61aa8df864736ada83bc2aeefdbc17db
                       5d1f0967abd2ed07f08b9172399f10ca93674229
                       2242e614883c88d41edad81521afdc20e0055f39
                       6a21141e51ccf47444dc0869b83e7e8bb0d79c41
                       eee9c606c3cc1db6d7b303116a778fc6968a840a
                       38d9c2a4624abf94ff333ce44fa989dede31b429
                       c01856ceede7a708f0cd33849a85ff860bd76d55
                       da6f2c275003472ebd5fbd938086d886276b9a7b
                       d71c41198f414ea3e9fe7fd66f005d0a999a7602
                       b86894d5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6d:b5:a6:d0:e7:a9:78:02:b2:fc:86:75:01:e1:8f:93:f6:de:aa:99]
            modulus: f3f433f4ba7ddd4394691ed369c51f2d2835e6e93b21dd51a9edab02acd3fe5e6550f8c555cc234126b03afaf2399bac2bd06559404350bfc42ba88b7bb91f16c67e62d8ffa62fc2255f7cfb595ab2602465d60a268dacba2d8ea84a4e037e4ff4c0332d17ea44daa0293658887675745ecf245c573132a91f1648a707360dea9ba547647c1757da1110aef614b3f0c17e7be7dd56a0be5241c8ffced59110eb52542fcc31b747023f4b768ae4c0c454fa7015b5ea30ef99dcad82c4b813b8eb04d4e06d779c3bccb22fabb4dc573a84499b043f99e872200ea6ddf1ee683308ba9391a7b0cd48d444ebd097ffb2d81a60d365c16a1f8678c2d234bc66e7d009
    public exponent: 10001

] 
2022-06-06 17:30:45.251  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-06 17:30:45.252 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-06 17:30:45.253 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-06 17:30:45.254 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-06 17:30:45.255  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-06 17:30:45.256  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-06 17:30:45.256  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-06 17:30:45.257 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-06 17:30:45.257 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-06 17:30:45.258 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-06 17:30:45.262 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-06 17:30:45.263 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 17:30:45.264 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 17:30:45.264 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 17:30:45.413  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-06 17:30:45.414  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-06 17:30:45.414 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-06 17:30:45.415 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 17:30:45.416  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-06 17:30:45.417  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-06 17:30:45.417 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 17:30:45.418 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 17:30:45.418 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 17:30:45.419 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 17:30:45.419 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 17:30:45.420 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 17:30:45.420 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 17:30:45.421 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 17:30:45.421 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 17:30:45.422 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-06 17:30:45.426 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 394248379753100478578310106853475322234490396451
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 06 16:05:40 UTC 2022
           Final Date: Sat Jun 05 16:05:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e6:38:2c:1b:61:7a:47:ea:e9:ee:04:1b:2a:c5:06:e8:ac:3d:fe:7c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6b0512f7c1e3d01f01c8c59551a802a217eea70
                       2fc352584e0e401cfa0de643871e9d1c153d4c7c
                       68d5abcc17b9f281f0d45e872f09a86a34e5d053
                       2dc3d145e53edf31fe4d9f77b5d0b4b29c9c137a
                       f0869453f93a86612a213a085d039c3f8a5c4986
                       ca79a8c0aac8ca00bcae0430a4c4711b2644eb30
                       1d7c1011bdec910c0439ee14ab3e5ab93cf7d97a
                       14f2238c760c11a644641098b0c6d73b4e49eef4
                       05978d4529bf756b434261ec091b9ee4d0dbe233
                       d9ba7b28c109abbad75e74aa2531cc7a74a0e690
                       56e517fc61aa8df864736ada83bc2aeefdbc17db
                       5d1f0967abd2ed07f08b9172399f10ca93674229
                       2242e614883c88d41edad81521afdc20e0055f39
                       6a21141e51ccf47444dc0869b83e7e8bb0d79c41
                       eee9c606c3cc1db6d7b303116a778fc6968a840a
                       38d9c2a4624abf94ff333ce44fa989dede31b429
                       c01856ceede7a708f0cd33849a85ff860bd76d55
                       da6f2c275003472ebd5fbd938086d886276b9a7b
                       d71c41198f414ea3e9fe7fd66f005d0a999a7602
                       b86894d5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2a:86:73:37:18:f6:68:bb:80:4b:a4:48:d2:d8:40:cb:46:ee:f1:2d]
            modulus: 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
    public exponent: 10001

] 
2022-06-06 17:32:33.859  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-06 17:32:33.861 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-06 17:32:33.863 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-06 17:32:33.864 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-06 17:32:33.865  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-06 17:32:33.866  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-06 17:32:33.866  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-06 17:32:33.867 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-06 17:32:33.867 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-06 17:32:33.868 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-06 17:32:33.873 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-06 17:32:33.873 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 17:32:33.874 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 17:32:33.874 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 17:32:33.988  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-06 17:32:33.988  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-06 17:32:33.989 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-06 17:32:33.989 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 17:32:33.990  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-06 17:32:33.991  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-06 17:32:33.991 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 17:32:33.992 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 17:32:33.992 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 17:32:33.993 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 17:32:33.993 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 17:32:33.994 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 17:32:33.994 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 17:32:33.995 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 17:32:33.995 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 17:32:33.996 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-06 17:32:34.000 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 394248379753100478578310106853475322234490396451
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 06 16:05:40 UTC 2022
           Final Date: Sat Jun 05 16:05:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e6:38:2c:1b:61:7a:47:ea:e9:ee:04:1b:2a:c5:06:e8:ac:3d:fe:7c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6b0512f7c1e3d01f01c8c59551a802a217eea70
                       2fc352584e0e401cfa0de643871e9d1c153d4c7c
                       68d5abcc17b9f281f0d45e872f09a86a34e5d053
                       2dc3d145e53edf31fe4d9f77b5d0b4b29c9c137a
                       f0869453f93a86612a213a085d039c3f8a5c4986
                       ca79a8c0aac8ca00bcae0430a4c4711b2644eb30
                       1d7c1011bdec910c0439ee14ab3e5ab93cf7d97a
                       14f2238c760c11a644641098b0c6d73b4e49eef4
                       05978d4529bf756b434261ec091b9ee4d0dbe233
                       d9ba7b28c109abbad75e74aa2531cc7a74a0e690
                       56e517fc61aa8df864736ada83bc2aeefdbc17db
                       5d1f0967abd2ed07f08b9172399f10ca93674229
                       2242e614883c88d41edad81521afdc20e0055f39
                       6a21141e51ccf47444dc0869b83e7e8bb0d79c41
                       eee9c606c3cc1db6d7b303116a778fc6968a840a
                       38d9c2a4624abf94ff333ce44fa989dede31b429
                       c01856ceede7a708f0cd33849a85ff860bd76d55
                       da6f2c275003472ebd5fbd938086d886276b9a7b
                       d71c41198f414ea3e9fe7fd66f005d0a999a7602
                       b86894d5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7c:ca:11:6a:8c:4a:48:60:5c:aa:36:62:d4:4c:25:9d:eb:18:7e:5b]
            modulus: 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
    public exponent: 10001

] 
2022-06-06 17:36:19.444  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-06 17:36:19.447 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-06 17:36:19.449 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-06 17:36:19.450 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-06 17:36:19.450  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-06 17:36:19.451  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-06 17:36:19.451  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-06 17:36:19.451 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-06 17:36:19.452 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-06 17:36:19.453 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-06 17:36:19.459 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-06 17:36:19.460 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 17:36:19.460 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 17:36:19.460 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 17:36:19.620  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-06 17:36:19.620  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-06 17:36:19.621 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-06 17:36:19.621 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 17:36:19.623  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-06 17:36:19.623  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-06 17:36:19.623 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 17:36:19.624 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 17:36:19.624 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 17:36:19.625 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 17:36:19.625 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 17:36:19.625 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 17:36:19.626 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 17:36:19.626 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 17:36:19.627 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 17:36:19.628 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-06 17:36:19.631 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 394248379753100478578310106853475322234490396451
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 06 16:05:40 UTC 2022
           Final Date: Sat Jun 05 16:05:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e6:38:2c:1b:61:7a:47:ea:e9:ee:04:1b:2a:c5:06:e8:ac:3d:fe:7c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6b0512f7c1e3d01f01c8c59551a802a217eea70
                       2fc352584e0e401cfa0de643871e9d1c153d4c7c
                       68d5abcc17b9f281f0d45e872f09a86a34e5d053
                       2dc3d145e53edf31fe4d9f77b5d0b4b29c9c137a
                       f0869453f93a86612a213a085d039c3f8a5c4986
                       ca79a8c0aac8ca00bcae0430a4c4711b2644eb30
                       1d7c1011bdec910c0439ee14ab3e5ab93cf7d97a
                       14f2238c760c11a644641098b0c6d73b4e49eef4
                       05978d4529bf756b434261ec091b9ee4d0dbe233
                       d9ba7b28c109abbad75e74aa2531cc7a74a0e690
                       56e517fc61aa8df864736ada83bc2aeefdbc17db
                       5d1f0967abd2ed07f08b9172399f10ca93674229
                       2242e614883c88d41edad81521afdc20e0055f39
                       6a21141e51ccf47444dc0869b83e7e8bb0d79c41
                       eee9c606c3cc1db6d7b303116a778fc6968a840a
                       38d9c2a4624abf94ff333ce44fa989dede31b429
                       c01856ceede7a708f0cd33849a85ff860bd76d55
                       da6f2c275003472ebd5fbd938086d886276b9a7b
                       d71c41198f414ea3e9fe7fd66f005d0a999a7602
                       b86894d5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f0:fc:f0:09:1c:9d:fd:93:e5:ab:3f:35:c8:9d:5e:6b:d2:8c:08:dc]
            modulus: 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
    public exponent: 10001

] 
2022-06-06 17:41:06.390  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-06 17:41:06.391 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-06 17:41:06.392 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-06 17:41:06.393 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-06 17:41:06.393  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-06 17:41:06.394  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-06 17:41:06.394  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-06 17:41:06.394 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-06 17:41:06.395 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-06 17:41:06.395 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-06 17:41:06.399 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-06 17:41:06.400 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 17:41:06.400 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 17:41:06.401 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 17:41:06.572  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-06 17:41:06.573  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-06 17:41:06.573 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-06 17:41:06.574 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 17:41:06.575  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-06 17:41:06.575  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-06 17:41:06.576 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 17:41:06.576 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 17:41:06.576 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 17:41:06.577 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 17:41:06.577 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 17:41:06.578 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 17:41:06.578 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 17:41:06.578 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 17:41:06.579 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 17:41:06.579 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-06 17:41:06.582 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 394248379753100478578310106853475322234490396451
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 06 16:05:40 UTC 2022
           Final Date: Sat Jun 05 16:05:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e6:38:2c:1b:61:7a:47:ea:e9:ee:04:1b:2a:c5:06:e8:ac:3d:fe:7c]
            modulus: dea44ea35cbda5e620817e99302e28ea328054e6ed2b58f0c660ec4822608f9adcd4fe3e9b39b91b050ee8f5be4c39422da7e3e28438a8eb8fb3a635c3858f530a019e7f65a67fe04b430d0f8bcc3121222eb99ce7b9bbbe326ee0ee9f5da22926f9f755fec991b6aaca64319a67a4793ae6b3417333bdef0460665726f22035721e3acd06caa986e953f5a5e1990646d401eb24d6710933d4faed1a734e0eef4ce3c714f8004dcdb4db9388991538bf1744efdbbaca156b63b8eb52d824999ec0b64cbf35934c38058369a99866525c88458108f01013dd7cc2daff48ea481cb024bba8b8e00a39f778b601be973084c9ecb99ba1cc1b52285087c923e72638c93c7c8ddfd9cca95a0027e251e836e98a7ec981b9f3b4f202bf65c0ee06b4551143ff45b93451beeb94db53e3fb6122fe0e4a9cdd164c92a59045fb3ea8c838a9b8d5224d13b72d3da581eb49fdb491dc19c12c3bc736e6ac479db6b6da9ecc52658f3f3fafcf2073e4b8d40e0ef5d1e0f7a35e56d572821f8ad7e5ae674357
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6b0512f7c1e3d01f01c8c59551a802a217eea70
                       2fc352584e0e401cfa0de643871e9d1c153d4c7c
                       68d5abcc17b9f281f0d45e872f09a86a34e5d053
                       2dc3d145e53edf31fe4d9f77b5d0b4b29c9c137a
                       f0869453f93a86612a213a085d039c3f8a5c4986
                       ca79a8c0aac8ca00bcae0430a4c4711b2644eb30
                       1d7c1011bdec910c0439ee14ab3e5ab93cf7d97a
                       14f2238c760c11a644641098b0c6d73b4e49eef4
                       05978d4529bf756b434261ec091b9ee4d0dbe233
                       d9ba7b28c109abbad75e74aa2531cc7a74a0e690
                       56e517fc61aa8df864736ada83bc2aeefdbc17db
                       5d1f0967abd2ed07f08b9172399f10ca93674229
                       2242e614883c88d41edad81521afdc20e0055f39
                       6a21141e51ccf47444dc0869b83e7e8bb0d79c41
                       eee9c606c3cc1db6d7b303116a778fc6968a840a
                       38d9c2a4624abf94ff333ce44fa989dede31b429
                       c01856ceede7a708f0cd33849a85ff860bd76d55
                       da6f2c275003472ebd5fbd938086d886276b9a7b
                       d71c41198f414ea3e9fe7fd66f005d0a999a7602
                       b86894d5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5f:57:a4:11:6e:cf:7d:35:ea:b2:23:94:c5:59:22:b1:af:3f:8d:b2]
            modulus: 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
    public exponent: 10001

] 
2022-06-06 17:44:00.749  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-06 17:44:00.752 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-06 17:44:00.754 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-06 17:44:00.755 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-06 17:44:00.757  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-06 17:44:00.759  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-06 17:44:00.759  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-06 17:44:00.759 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-06 17:44:00.760 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-06 17:44:00.760 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-06 17:44:00.766 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-06 17:44:00.768 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 17:44:00.768 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 17:44:00.768 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 17:44:00.938  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-06 17:44:00.939  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-06 17:44:00.939 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-06 17:44:00.939 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 17:44:00.941  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-06 17:44:00.941  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-06 17:44:00.941 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 17:44:00.942 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 17:44:00.942 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 17:44:00.943 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 17:44:00.943 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 17:44:00.943 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 17:44:00.944 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 17:44:00.944 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 17:44:00.945 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 17:44:00.946 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-06 17:44:00.949 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 394248379753100478578310106853475322234490396451
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 06 16:05:40 UTC 2022
           Final Date: Sat Jun 05 16:05:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e6:38:2c:1b:61:7a:47:ea:e9:ee:04:1b:2a:c5:06:e8:ac:3d:fe:7c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6b0512f7c1e3d01f01c8c59551a802a217eea70
                       2fc352584e0e401cfa0de643871e9d1c153d4c7c
                       68d5abcc17b9f281f0d45e872f09a86a34e5d053
                       2dc3d145e53edf31fe4d9f77b5d0b4b29c9c137a
                       f0869453f93a86612a213a085d039c3f8a5c4986
                       ca79a8c0aac8ca00bcae0430a4c4711b2644eb30
                       1d7c1011bdec910c0439ee14ab3e5ab93cf7d97a
                       14f2238c760c11a644641098b0c6d73b4e49eef4
                       05978d4529bf756b434261ec091b9ee4d0dbe233
                       d9ba7b28c109abbad75e74aa2531cc7a74a0e690
                       56e517fc61aa8df864736ada83bc2aeefdbc17db
                       5d1f0967abd2ed07f08b9172399f10ca93674229
                       2242e614883c88d41edad81521afdc20e0055f39
                       6a21141e51ccf47444dc0869b83e7e8bb0d79c41
                       eee9c606c3cc1db6d7b303116a778fc6968a840a
                       38d9c2a4624abf94ff333ce44fa989dede31b429
                       c01856ceede7a708f0cd33849a85ff860bd76d55
                       da6f2c275003472ebd5fbd938086d886276b9a7b
                       d71c41198f414ea3e9fe7fd66f005d0a999a7602
                       b86894d5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d0:79:b9:be:8c:4d:2d:fd:a0:fc:53:c0:e5:95:65:69:85:38:ec:ea]
            modulus: ac6d0c9fac6b6de09583a4afd047abe49d29c6f0d38375509f547357b542e2d62f47fc40c8d0bdf42325cba6aeca54322e532839f8480c624bc9fbefb378aa0aa2c266c26098dce6239fd3ee47eb4ddbeee8695cae635107899d0cfb6602b77304447adb99b8a4a77dc2bdf265d723f6603700852c93b86e31f3324025fb257a20cf8543821b9ee43c1c8b6ee7b25da9986d7c7cf861863dad287cd3bb98fe6de6e0b7078904fb44413bef47fbbae0ba664bf4f5d9df9cd8bbcadeea5b1f96e61624c3c5cb90f3a8b757986dd94286a2a36b4b86d3bf417d2c528cfabc147979d7ff23e595240a7b69e13c822bf939f406ebe835dc9e1a3a5bdee3db212ec76b
    public exponent: 10001

] 
2022-06-06 17:45:03.300  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-06 17:45:03.301 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-06 17:45:03.303 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-06 17:45:03.303 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-06 17:45:03.303  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-06 17:45:03.304  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-06 17:45:03.304  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-06 17:45:03.304 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-06 17:45:03.305 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-06 17:45:03.305 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-06 17:45:03.310 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-06 17:45:03.310 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 17:45:03.311 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 17:45:03.311 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 17:45:03.435  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-06 17:45:03.435  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-06 17:45:03.436 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-06 17:45:03.436 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 17:45:03.437  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-06 17:45:03.437  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-06 17:45:03.438 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 17:45:03.438 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 17:45:03.438 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 17:45:03.439 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 17:45:03.439 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 17:45:03.439 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 17:45:03.440 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 17:45:03.440 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 17:45:03.440 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 17:45:03.441 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-06 17:45:03.444 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 394248379753100478578310106853475322234490396451
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 06 16:05:40 UTC 2022
           Final Date: Sat Jun 05 16:05:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e6:38:2c:1b:61:7a:47:ea:e9:ee:04:1b:2a:c5:06:e8:ac:3d:fe:7c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6b0512f7c1e3d01f01c8c59551a802a217eea70
                       2fc352584e0e401cfa0de643871e9d1c153d4c7c
                       68d5abcc17b9f281f0d45e872f09a86a34e5d053
                       2dc3d145e53edf31fe4d9f77b5d0b4b29c9c137a
                       f0869453f93a86612a213a085d039c3f8a5c4986
                       ca79a8c0aac8ca00bcae0430a4c4711b2644eb30
                       1d7c1011bdec910c0439ee14ab3e5ab93cf7d97a
                       14f2238c760c11a644641098b0c6d73b4e49eef4
                       05978d4529bf756b434261ec091b9ee4d0dbe233
                       d9ba7b28c109abbad75e74aa2531cc7a74a0e690
                       56e517fc61aa8df864736ada83bc2aeefdbc17db
                       5d1f0967abd2ed07f08b9172399f10ca93674229
                       2242e614883c88d41edad81521afdc20e0055f39
                       6a21141e51ccf47444dc0869b83e7e8bb0d79c41
                       eee9c606c3cc1db6d7b303116a778fc6968a840a
                       38d9c2a4624abf94ff333ce44fa989dede31b429
                       c01856ceede7a708f0cd33849a85ff860bd76d55
                       da6f2c275003472ebd5fbd938086d886276b9a7b
                       d71c41198f414ea3e9fe7fd66f005d0a999a7602
                       b86894d5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7d:40:f2:15:75:6c:4f:b3:7d:f9:d1:31:48:8c:69:ca:e4:98:d3:27]
            modulus: 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
    public exponent: 10001

] 
2022-06-06 17:48:47.230  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-06 17:48:47.234 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-06 17:48:47.236 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-06 17:48:47.236 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-06 17:48:47.236  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-06 17:48:47.237  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-06 17:48:47.237  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-06 17:48:47.238 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-06 17:48:47.238 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-06 17:48:47.238 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-06 17:48:47.246 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-06 17:48:47.248 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 17:48:47.248 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 17:48:47.249 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 17:48:47.426  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-06 17:48:47.427  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-06 17:48:47.427 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-06 17:48:47.427 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 17:48:47.428  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-06 17:48:47.428  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-06 17:48:47.429 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 17:48:47.429 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 17:48:47.429 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 17:48:47.430 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 17:48:47.430 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 17:48:47.430 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 17:48:47.431 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 17:48:47.431 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 17:48:47.431 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 17:48:47.432 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-06 17:48:47.435 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 394248379753100478578310106853475322234490396451
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 06 16:05:40 UTC 2022
           Final Date: Sat Jun 05 16:05:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e6:38:2c:1b:61:7a:47:ea:e9:ee:04:1b:2a:c5:06:e8:ac:3d:fe:7c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6b0512f7c1e3d01f01c8c59551a802a217eea70
                       2fc352584e0e401cfa0de643871e9d1c153d4c7c
                       68d5abcc17b9f281f0d45e872f09a86a34e5d053
                       2dc3d145e53edf31fe4d9f77b5d0b4b29c9c137a
                       f0869453f93a86612a213a085d039c3f8a5c4986
                       ca79a8c0aac8ca00bcae0430a4c4711b2644eb30
                       1d7c1011bdec910c0439ee14ab3e5ab93cf7d97a
                       14f2238c760c11a644641098b0c6d73b4e49eef4
                       05978d4529bf756b434261ec091b9ee4d0dbe233
                       d9ba7b28c109abbad75e74aa2531cc7a74a0e690
                       56e517fc61aa8df864736ada83bc2aeefdbc17db
                       5d1f0967abd2ed07f08b9172399f10ca93674229
                       2242e614883c88d41edad81521afdc20e0055f39
                       6a21141e51ccf47444dc0869b83e7e8bb0d79c41
                       eee9c606c3cc1db6d7b303116a778fc6968a840a
                       38d9c2a4624abf94ff333ce44fa989dede31b429
                       c01856ceede7a708f0cd33849a85ff860bd76d55
                       da6f2c275003472ebd5fbd938086d886276b9a7b
                       d71c41198f414ea3e9fe7fd66f005d0a999a7602
                       b86894d5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a3:31:10:f4:e2:c2:e2:ee:d4:d5:ff:bf:26:20:81:b7:e6:69:5a:f7]
            modulus: dd3eafe6321ab37f116f9e5bd77abf3a457a46d1d89ea61a6f70479b98ad383163722cbd7fad671626ebcebf7807cb0ec91256ceba280eacb54771d9a2e0c695fc2e65c9e6954e385706e050fee0783e5e5e8b9464886a62f1d8dbaf7515f56321d3eef04918965286f53e1db6f1e41dd52ed250b4d63788fe1c319660fbfbf95a741b814e0a2249fb6e49132f6ae09a0d5cd459584cc9166def2943a7dbb98ac90faee63ccef4e3b34b0a45cfe42dc641f1e7a22e0d72e296dbcc571d3b81f582b558285c349a13bc320b61a32b76e8d5d7b2f7fc20c41a798dc71f4c6f40a8dc78a99a2c3acbd808ec5d917a281e1df45731fb4aa0e394a949300052f2514b
    public exponent: 10001

] 
2022-06-06 17:49:46.815  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-06 17:49:46.817 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-06 17:49:46.823 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-06 17:49:46.824 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-06 17:49:46.825  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-06 17:49:46.825  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-06 17:49:46.825  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-06 17:49:46.826 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-06 17:49:46.826 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-06 17:49:46.826 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-06 17:49:46.833 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-06 17:49:46.837 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 17:49:46.838 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 17:49:46.838 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 17:49:47.003  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-06 17:49:47.003  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-06 17:49:47.004 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-06 17:49:47.004 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 17:49:47.006  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-06 17:49:47.007  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-06 17:49:47.007 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 17:49:47.008 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 17:49:47.008 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 17:49:47.009 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 17:49:47.009 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 17:49:47.009 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 17:49:47.011 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 17:49:47.011 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 17:49:47.011 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 17:49:47.012 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-06 17:49:47.018 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 394248379753100478578310106853475322234490396451
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 06 16:05:40 UTC 2022
           Final Date: Sat Jun 05 16:05:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e6:38:2c:1b:61:7a:47:ea:e9:ee:04:1b:2a:c5:06:e8:ac:3d:fe:7c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6b0512f7c1e3d01f01c8c59551a802a217eea70
                       2fc352584e0e401cfa0de643871e9d1c153d4c7c
                       68d5abcc17b9f281f0d45e872f09a86a34e5d053
                       2dc3d145e53edf31fe4d9f77b5d0b4b29c9c137a
                       f0869453f93a86612a213a085d039c3f8a5c4986
                       ca79a8c0aac8ca00bcae0430a4c4711b2644eb30
                       1d7c1011bdec910c0439ee14ab3e5ab93cf7d97a
                       14f2238c760c11a644641098b0c6d73b4e49eef4
                       05978d4529bf756b434261ec091b9ee4d0dbe233
                       d9ba7b28c109abbad75e74aa2531cc7a74a0e690
                       56e517fc61aa8df864736ada83bc2aeefdbc17db
                       5d1f0967abd2ed07f08b9172399f10ca93674229
                       2242e614883c88d41edad81521afdc20e0055f39
                       6a21141e51ccf47444dc0869b83e7e8bb0d79c41
                       eee9c606c3cc1db6d7b303116a778fc6968a840a
                       38d9c2a4624abf94ff333ce44fa989dede31b429
                       c01856ceede7a708f0cd33849a85ff860bd76d55
                       da6f2c275003472ebd5fbd938086d886276b9a7b
                       d71c41198f414ea3e9fe7fd66f005d0a999a7602
                       b86894d5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [05:d8:9f:3d:16:21:f1:f2:dd:b0:54:a0:3a:f9:84:1c:2b:97:bd:36]
            modulus: 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
    public exponent: 10001

] 
2022-06-06 17:50:02.346  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-06 17:50:02.347 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-06 17:50:02.349 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-06 17:50:02.350 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-06 17:50:02.350  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-06 17:50:02.351  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-06 17:50:02.352  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-06 17:50:02.352 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-06 17:50:02.353 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-06 17:50:02.353 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-06 17:50:02.358 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-06 17:50:02.359 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 17:50:02.359 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 17:50:02.360 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 17:50:02.456  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-06 17:50:02.456  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-06 17:50:02.457 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-06 17:50:02.457 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 17:50:02.459  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-06 17:50:02.460  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-06 17:50:02.461 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 17:50:02.462 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 17:50:02.462 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 17:50:02.463 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 17:50:02.464 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 17:50:02.464 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 17:50:02.465 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 17:50:02.465 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 17:50:02.465 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 17:50:02.466 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-06 17:50:02.470 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 394248379753100478578310106853475322234490396451
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 06 16:05:40 UTC 2022
           Final Date: Sat Jun 05 16:05:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e6:38:2c:1b:61:7a:47:ea:e9:ee:04:1b:2a:c5:06:e8:ac:3d:fe:7c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6b0512f7c1e3d01f01c8c59551a802a217eea70
                       2fc352584e0e401cfa0de643871e9d1c153d4c7c
                       68d5abcc17b9f281f0d45e872f09a86a34e5d053
                       2dc3d145e53edf31fe4d9f77b5d0b4b29c9c137a
                       f0869453f93a86612a213a085d039c3f8a5c4986
                       ca79a8c0aac8ca00bcae0430a4c4711b2644eb30
                       1d7c1011bdec910c0439ee14ab3e5ab93cf7d97a
                       14f2238c760c11a644641098b0c6d73b4e49eef4
                       05978d4529bf756b434261ec091b9ee4d0dbe233
                       d9ba7b28c109abbad75e74aa2531cc7a74a0e690
                       56e517fc61aa8df864736ada83bc2aeefdbc17db
                       5d1f0967abd2ed07f08b9172399f10ca93674229
                       2242e614883c88d41edad81521afdc20e0055f39
                       6a21141e51ccf47444dc0869b83e7e8bb0d79c41
                       eee9c606c3cc1db6d7b303116a778fc6968a840a
                       38d9c2a4624abf94ff333ce44fa989dede31b429
                       c01856ceede7a708f0cd33849a85ff860bd76d55
                       da6f2c275003472ebd5fbd938086d886276b9a7b
                       d71c41198f414ea3e9fe7fd66f005d0a999a7602
                       b86894d5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b0:d2:02:0a:aa:f0:a6:84:bb:4e:bd:b3:04:e4:e3:b1:6b:d3:c0:43]
            modulus: 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
    public exponent: 10001

] 
2022-06-06 17:53:08.438  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-06 17:53:08.439 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-06 17:53:08.440 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-06 17:53:08.441 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-06 17:53:08.441  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-06 17:53:08.442  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-06 17:53:08.442  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-06 17:53:08.442 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-06 17:53:08.443 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-06 17:53:08.443 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-06 17:53:08.448 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-06 17:53:08.449 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 17:53:08.449 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 17:53:08.450 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 17:53:08.609  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-06 17:53:08.609  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-06 17:53:08.610 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-06 17:53:08.610 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 17:53:08.612  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-06 17:53:08.612  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-06 17:53:08.613 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 17:53:08.613 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 17:53:08.613 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 17:53:08.614 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 17:53:08.615 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 17:53:08.615 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 17:53:08.616 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 17:53:08.616 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 17:53:08.616 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 17:53:08.617 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-06 17:53:08.621 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 394248379753100478578310106853475322234490396451
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 06 16:05:40 UTC 2022
           Final Date: Sat Jun 05 16:05:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e6:38:2c:1b:61:7a:47:ea:e9:ee:04:1b:2a:c5:06:e8:ac:3d:fe:7c]
            modulus: dea44ea35cbda5e620817e99302e28ea328054e6ed2b58f0c660ec4822608f9adcd4fe3e9b39b91b050ee8f5be4c39422da7e3e28438a8eb8fb3a635c3858f530a019e7f65a67fe04b430d0f8bcc3121222eb99ce7b9bbbe326ee0ee9f5da22926f9f755fec991b6aaca64319a67a4793ae6b3417333bdef0460665726f22035721e3acd06caa986e953f5a5e1990646d401eb24d6710933d4faed1a734e0eef4ce3c714f8004dcdb4db9388991538bf1744efdbbaca156b63b8eb52d824999ec0b64cbf35934c38058369a99866525c88458108f01013dd7cc2daff48ea481cb024bba8b8e00a39f778b601be973084c9ecb99ba1cc1b52285087c923e72638c93c7c8ddfd9cca95a0027e251e836e98a7ec981b9f3b4f202bf65c0ee06b4551143ff45b93451beeb94db53e3fb6122fe0e4a9cdd164c92a59045fb3ea8c838a9b8d5224d13b72d3da581eb49fdb491dc19c12c3bc736e6ac479db6b6da9ecc52658f3f3fafcf2073e4b8d40e0ef5d1e0f7a35e56d572821f8ad7e5ae674357
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6b0512f7c1e3d01f01c8c59551a802a217eea70
                       2fc352584e0e401cfa0de643871e9d1c153d4c7c
                       68d5abcc17b9f281f0d45e872f09a86a34e5d053
                       2dc3d145e53edf31fe4d9f77b5d0b4b29c9c137a
                       f0869453f93a86612a213a085d039c3f8a5c4986
                       ca79a8c0aac8ca00bcae0430a4c4711b2644eb30
                       1d7c1011bdec910c0439ee14ab3e5ab93cf7d97a
                       14f2238c760c11a644641098b0c6d73b4e49eef4
                       05978d4529bf756b434261ec091b9ee4d0dbe233
                       d9ba7b28c109abbad75e74aa2531cc7a74a0e690
                       56e517fc61aa8df864736ada83bc2aeefdbc17db
                       5d1f0967abd2ed07f08b9172399f10ca93674229
                       2242e614883c88d41edad81521afdc20e0055f39
                       6a21141e51ccf47444dc0869b83e7e8bb0d79c41
                       eee9c606c3cc1db6d7b303116a778fc6968a840a
                       38d9c2a4624abf94ff333ce44fa989dede31b429
                       c01856ceede7a708f0cd33849a85ff860bd76d55
                       da6f2c275003472ebd5fbd938086d886276b9a7b
                       d71c41198f414ea3e9fe7fd66f005d0a999a7602
                       b86894d5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2c:1d:a3:1e:c0:02:83:7d:15:0b:d3:b8:55:02:7c:e3:88:6d:3a:d7]
            modulus: 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
    public exponent: 10001

]