Results

By type

          2022-06-24 03:15:31,996 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-06-24 03:15:32,899 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-06-24 03:15:33.722  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jun 24, 2022 3:15:35 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jun 24, 2022 3:15:35 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 24, 2022 3:15:35 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jun 24, 2022 3:15:35 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-06-24 03:15:36.227 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-06-24 03:15:36.507  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-06-24 03:15:36.672  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-06-24 03:15:37.351 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-06-24 03:15:37.354 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-06-24 03:15:37.356 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-06-24 03:15:37.360 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-06-24 03:15:37.404 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-06-24 03:15:37.407 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-06-24 03:15:37.527 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-06-24 03:15:38.130 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jun 24, 2022 3:15:38 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-06-24 03:15:38.939  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.698 seconds (JVM running for 9.454)
Jun 24, 2022 3:16:03 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-06-24 03:16:22.128  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-24 03:16:22.136 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-24 03:16:22.177 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-24 03:16:22.181 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-24 03:16:22.197  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-24 03:16:22.200  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-24 03:16:22.201  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-24 03:16:22.203 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-24 03:16:22.203 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 03:16:22.207 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-24 03:16:22.213 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-24 03:16:22.216 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-24 03:16:22.253 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-24 03:16:22.257 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 03:16:22.257 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 03:16:22.260 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 03:16:22.919  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-24 03:16:22.921  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-24 03:16:22.922 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-24 03:16:22.924 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 03:16:22.934  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-24 03:16:22.935  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-24 03:16:22.936 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 03:16:22.936 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 03:16:22.937 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 03:16:22.948 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 03:16:22.948 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 03:16:22.948 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 03:16:22.954 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 03:16:22.955 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 03:16:22.955 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 03:16:22.957 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-24 03:16:22.987 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 565790796685939140766899435461766468650556024320
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 24 03:13:21 UTC 2022
           Final Date: Wed Jun 23 03:13:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:a8:2c:2e:8e:60:99:d6:be:b1:10:18:0a:b7:f9:97:7c:6e:11:05]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a03e7bbab7dd894123b73ac2eb43e48d6d8d8aa5
                       ae1f6813762f4e511d37de1b97d4088ae7ad396a
                       3ada3d04e1efc516d968f2c1fcdedd7fb0ac1fc7
                       c8d294927d4be1422444e072c40bb5686a7d2295
                       0efa7d996e132eca51b3163b69ae39d923bdf3dc
                       bbcc8a0ea66d327b9b86992af5072138bb6a412a
                       6b6a6eb43a65db5635d2d08f9a4fa90b169e28bb
                       1baa966a3174c4cc78485dec32b73a66b4e463f8
                       c735fb9de8083e04bc51432c8c0ec4c6ab6d5628
                       ba2bafdda70e0b9bd86df5e36b438aa54cad8255
                       dbe53b000824818eca71f04d6b739df6ef3106f1
                       e8ef6b052d6e498d468106ada54afe8fe66a8bed
                       8622dfacf40ef74e889ed3da50e693b33867d426
                       13d8358dd6c85031e0214a688cf14bdbdf94fb32
                       eba8903fe08292755176116e7fe1eac923e00760
                       cf9433acb958934a5a4d324230ea4fa1461cc93b
                       a875dfe6cccbb056e77bdfa62ec40c57cf8a1a7e
                       93cb92edf67a354a1eb719538dc566f1fe3b1647
                       5f8e51c26a14adcca7fc3af6a251531cc32e3e90
                       0d9d3bdd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c2:f4:d2:4c:5b:fa:ac:44:38:3f:7d:ba:d3:96:84:df:2f:7f:89:8f]
            modulus: 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
    public exponent: 10001

] 
2022-06-24 04:48:31.823  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-24 04:48:31.827 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-24 04:48:31.830 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-24 04:48:31.831 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-24 04:48:31.832  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-24 04:48:31.833  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-24 04:48:31.834  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-24 04:48:31.835 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-24 04:48:31.836 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-24 04:48:31.837 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-24 04:48:31.844 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-24 04:48:31.845 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 04:48:31.845 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 04:48:31.846 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 04:48:32.063  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-24 04:48:32.064  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-24 04:48:32.065 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-24 04:48:32.065 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 04:48:32.068  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-24 04:48:32.069  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-24 04:48:32.069 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 04:48:32.070 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 04:48:32.070 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 04:48:32.072 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 04:48:32.073 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 04:48:32.073 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 04:48:32.074 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 04:48:32.074 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 04:48:32.075 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 04:48:32.076 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-24 04:48:32.081 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 565790796685939140766899435461766468650556024320
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 24 03:13:21 UTC 2022
           Final Date: Wed Jun 23 03:13:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:a8:2c:2e:8e:60:99:d6:be:b1:10:18:0a:b7:f9:97:7c:6e:11:05]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a03e7bbab7dd894123b73ac2eb43e48d6d8d8aa5
                       ae1f6813762f4e511d37de1b97d4088ae7ad396a
                       3ada3d04e1efc516d968f2c1fcdedd7fb0ac1fc7
                       c8d294927d4be1422444e072c40bb5686a7d2295
                       0efa7d996e132eca51b3163b69ae39d923bdf3dc
                       bbcc8a0ea66d327b9b86992af5072138bb6a412a
                       6b6a6eb43a65db5635d2d08f9a4fa90b169e28bb
                       1baa966a3174c4cc78485dec32b73a66b4e463f8
                       c735fb9de8083e04bc51432c8c0ec4c6ab6d5628
                       ba2bafdda70e0b9bd86df5e36b438aa54cad8255
                       dbe53b000824818eca71f04d6b739df6ef3106f1
                       e8ef6b052d6e498d468106ada54afe8fe66a8bed
                       8622dfacf40ef74e889ed3da50e693b33867d426
                       13d8358dd6c85031e0214a688cf14bdbdf94fb32
                       eba8903fe08292755176116e7fe1eac923e00760
                       cf9433acb958934a5a4d324230ea4fa1461cc93b
                       a875dfe6cccbb056e77bdfa62ec40c57cf8a1a7e
                       93cb92edf67a354a1eb719538dc566f1fe3b1647
                       5f8e51c26a14adcca7fc3af6a251531cc32e3e90
                       0d9d3bdd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d5:ef:e6:d0:61:ef:b9:6c:08:d1:73:72:2c:57:6c:23:80:0b:dc:d0]
            modulus: bed07d1a171816498419015702cd5fa3cb72e85baf8a0df52d8ec7c3e42ac7cd1c72ac96d8e210df52b9434ed0ebc4c300f13491e36e373127706ec99bcacff4617e18350624a4e4e48c639e638cb4e5314c5d92789996bd8ddfd2b5d8b39facfa1c4697dd847845e880083c23805e639562ddc2381b6a33757ca1d710caab8dc0625014065b0e57de6bd97a1859307be99d47793c29084edab1ad3f5d315c2c51b43c61700871c70fed9aa1a28cc86b2678ac105874a16416c9b4b15250bafbde6b1ad3770ae0630027e782646ab089c274458ca6b490572c31cce7dafbc92119d161650e0016067ca49a3549656bcb82a7dfa817eb2612b064b3297c98c263
    public exponent: 10001

] 
2022-06-24 04:50:34.553  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-24 04:50:34.554 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-24 04:50:34.556 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-24 04:50:34.557 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-24 04:50:34.557  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-24 04:50:34.558  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-24 04:50:34.559  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-24 04:50:34.559 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-24 04:50:34.559 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-24 04:50:34.560 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-24 04:50:34.572 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-24 04:50:34.573 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 04:50:34.573 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 04:50:34.574 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 04:50:34.752  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-24 04:50:34.752  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-24 04:50:34.752 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-24 04:50:34.753 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 04:50:34.755  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-24 04:50:34.756  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-24 04:50:34.756 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 04:50:34.757 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 04:50:34.757 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 04:50:34.758 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 04:50:34.758 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 04:50:34.759 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 04:50:34.759 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 04:50:34.760 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 04:50:34.760 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 04:50:34.761 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-24 04:50:34.764 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 565790796685939140766899435461766468650556024320
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 24 03:13:21 UTC 2022
           Final Date: Wed Jun 23 03:13:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:a8:2c:2e:8e:60:99:d6:be:b1:10:18:0a:b7:f9:97:7c:6e:11:05]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a03e7bbab7dd894123b73ac2eb43e48d6d8d8aa5
                       ae1f6813762f4e511d37de1b97d4088ae7ad396a
                       3ada3d04e1efc516d968f2c1fcdedd7fb0ac1fc7
                       c8d294927d4be1422444e072c40bb5686a7d2295
                       0efa7d996e132eca51b3163b69ae39d923bdf3dc
                       bbcc8a0ea66d327b9b86992af5072138bb6a412a
                       6b6a6eb43a65db5635d2d08f9a4fa90b169e28bb
                       1baa966a3174c4cc78485dec32b73a66b4e463f8
                       c735fb9de8083e04bc51432c8c0ec4c6ab6d5628
                       ba2bafdda70e0b9bd86df5e36b438aa54cad8255
                       dbe53b000824818eca71f04d6b739df6ef3106f1
                       e8ef6b052d6e498d468106ada54afe8fe66a8bed
                       8622dfacf40ef74e889ed3da50e693b33867d426
                       13d8358dd6c85031e0214a688cf14bdbdf94fb32
                       eba8903fe08292755176116e7fe1eac923e00760
                       cf9433acb958934a5a4d324230ea4fa1461cc93b
                       a875dfe6cccbb056e77bdfa62ec40c57cf8a1a7e
                       93cb92edf67a354a1eb719538dc566f1fe3b1647
                       5f8e51c26a14adcca7fc3af6a251531cc32e3e90
                       0d9d3bdd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f6:6b:5b:76:2f:de:de:a6:80:1d:93:c1:89:91:a6:13:2f:7f:5c:cc]
            modulus: c12efdf9aae89a9425694f4244a706a08e377fe910ad7fd28f8a89e0375a3fa511c2d1482d4fedc7bba8099cd6345e2bbf33a6fa3da4950e99aa93c31cf3145f20bb18d5055859b2578c8b51448fb53cda7376d1a79a2c6bb24f3040666e88eb186963881ec079dfba040619b175a39693403cbb108b48f003b5f3e5d0e4b5ff3c92cdb2cd2c27914c073ad7260c21ce09bf44efe8f344dae0cb160e662a7eb13d0f95b4f7549621f4b7dd6e6b0c61280fcd8927c665d9c9ad7d21ad98adf071b63986700e2ef70879efc1c54ce6e3a63ea7bea386c37d706394bc64db597f633abb27ba00bd6fbb7f10e4fa3e632d96ad41c75d6dff627e93f1d56c4ac75db3
    public exponent: 10001

] 
2022-06-24 04:52:17.414  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-24 04:52:17.416 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-24 04:52:17.419 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-24 04:52:17.420 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-24 04:52:17.422  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-24 04:52:17.423  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-24 04:52:17.423  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-24 04:52:17.424 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-24 04:52:17.424 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-24 04:52:17.425 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-24 04:52:17.431 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-24 04:52:17.432 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 04:52:17.432 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 04:52:17.432 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 04:52:17.586  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-24 04:52:17.587  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-24 04:52:17.587 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-24 04:52:17.587 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 04:52:17.590  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-24 04:52:17.590  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-24 04:52:17.591 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 04:52:17.591 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 04:52:17.592 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 04:52:17.593 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 04:52:17.593 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 04:52:17.593 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 04:52:17.594 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 04:52:17.594 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 04:52:17.595 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 04:52:17.595 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-24 04:52:17.600 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 565790796685939140766899435461766468650556024320
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 24 03:13:21 UTC 2022
           Final Date: Wed Jun 23 03:13:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:a8:2c:2e:8e:60:99:d6:be:b1:10:18:0a:b7:f9:97:7c:6e:11:05]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a03e7bbab7dd894123b73ac2eb43e48d6d8d8aa5
                       ae1f6813762f4e511d37de1b97d4088ae7ad396a
                       3ada3d04e1efc516d968f2c1fcdedd7fb0ac1fc7
                       c8d294927d4be1422444e072c40bb5686a7d2295
                       0efa7d996e132eca51b3163b69ae39d923bdf3dc
                       bbcc8a0ea66d327b9b86992af5072138bb6a412a
                       6b6a6eb43a65db5635d2d08f9a4fa90b169e28bb
                       1baa966a3174c4cc78485dec32b73a66b4e463f8
                       c735fb9de8083e04bc51432c8c0ec4c6ab6d5628
                       ba2bafdda70e0b9bd86df5e36b438aa54cad8255
                       dbe53b000824818eca71f04d6b739df6ef3106f1
                       e8ef6b052d6e498d468106ada54afe8fe66a8bed
                       8622dfacf40ef74e889ed3da50e693b33867d426
                       13d8358dd6c85031e0214a688cf14bdbdf94fb32
                       eba8903fe08292755176116e7fe1eac923e00760
                       cf9433acb958934a5a4d324230ea4fa1461cc93b
                       a875dfe6cccbb056e77bdfa62ec40c57cf8a1a7e
                       93cb92edf67a354a1eb719538dc566f1fe3b1647
                       5f8e51c26a14adcca7fc3af6a251531cc32e3e90
                       0d9d3bdd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [42:1f:bf:37:bc:72:a6:12:f6:0b:be:06:69:06:4b:94:7e:33:de:dc]
            modulus: 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
    public exponent: 10001

] 
2022-06-24 04:54:28.762  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-24 04:54:28.763 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-24 04:54:28.765 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-24 04:54:28.766 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-24 04:54:28.767  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-24 04:54:28.768  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-24 04:54:28.769  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-24 04:54:28.769 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-24 04:54:28.769 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-24 04:54:28.770 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-24 04:54:28.778 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-24 04:54:28.778 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 04:54:28.779 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 04:54:28.779 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 04:54:28.910  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-24 04:54:28.911  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-24 04:54:28.912 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-24 04:54:28.912 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 04:54:28.919  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-24 04:54:28.919  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-24 04:54:28.920 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 04:54:28.921 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 04:54:28.921 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 04:54:28.922 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 04:54:28.922 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 04:54:28.923 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 04:54:28.924 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 04:54:28.924 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 04:54:28.925 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 04:54:28.926 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-24 04:54:28.929 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 565790796685939140766899435461766468650556024320
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 24 03:13:21 UTC 2022
           Final Date: Wed Jun 23 03:13:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:a8:2c:2e:8e:60:99:d6:be:b1:10:18:0a:b7:f9:97:7c:6e:11:05]
            modulus: b568312e2fe6d7455696e65d91f1201ff437b385201ac8e64dc54da56512dbe4310f8112958b6603a35f03f7d87f5e8ba6d562cf85cbaa5d67234b4540f4a81a618cb2c2f47e5429ef6fdf4180b509a63f94f546705c6143c8b6526d9ade02ff38d40515a41fdd79016f2b6ef609b2822801cf4fefe0a8788c63c67891553b57a28257e0f2b62744b4bb36554016b4b99d9e4ba7eb5ceaf2fc2c8624f4afb0d50bc9597f67a4712067398e6d17de29babfb03bcba2decbfb4b3ee093d00d0a48e389c51797ec1291265f2486e50f9f94e0584183cda6992a3afbdef889e9b7dee4997e24ac67609c87829dcd8b38d5b6946b0be593822be992931ac73aa9380166da327013718ce8a1971dd1ab91d9215dfee0b981198c9a55c93a863b9e3672e238032ace872de2e5db7a93c3a9bfbaedc6d1a84d2f9a0615ec02d842dda8b1ea22ff3a0cdd8537efd81f3a45d33a267f8bb5f49caa89cb3c441dd0a3f56baafcf2689e761cc61745f37f54fd1a0fa88202cf2d09aefd09f5eabcdd65d8d625
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a03e7bbab7dd894123b73ac2eb43e48d6d8d8aa5
                       ae1f6813762f4e511d37de1b97d4088ae7ad396a
                       3ada3d04e1efc516d968f2c1fcdedd7fb0ac1fc7
                       c8d294927d4be1422444e072c40bb5686a7d2295
                       0efa7d996e132eca51b3163b69ae39d923bdf3dc
                       bbcc8a0ea66d327b9b86992af5072138bb6a412a
                       6b6a6eb43a65db5635d2d08f9a4fa90b169e28bb
                       1baa966a3174c4cc78485dec32b73a66b4e463f8
                       c735fb9de8083e04bc51432c8c0ec4c6ab6d5628
                       ba2bafdda70e0b9bd86df5e36b438aa54cad8255
                       dbe53b000824818eca71f04d6b739df6ef3106f1
                       e8ef6b052d6e498d468106ada54afe8fe66a8bed
                       8622dfacf40ef74e889ed3da50e693b33867d426
                       13d8358dd6c85031e0214a688cf14bdbdf94fb32
                       eba8903fe08292755176116e7fe1eac923e00760
                       cf9433acb958934a5a4d324230ea4fa1461cc93b
                       a875dfe6cccbb056e77bdfa62ec40c57cf8a1a7e
                       93cb92edf67a354a1eb719538dc566f1fe3b1647
                       5f8e51c26a14adcca7fc3af6a251531cc32e3e90
                       0d9d3bdd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [22:9e:b7:ca:ee:7b:66:cb:b4:b5:30:03:f0:3f:85:46:e3:c3:a5:ed]
            modulus: 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
    public exponent: 10001

] 
2022-06-24 04:58:07.271  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-24 04:58:07.275 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-24 04:58:07.278 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-24 04:58:07.279 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-24 04:58:07.280  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-24 04:58:07.281  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-24 04:58:07.282  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-24 04:58:07.282 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-24 04:58:07.283 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-24 04:58:07.283 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-24 04:58:07.290 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-24 04:58:07.291 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 04:58:07.292 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 04:58:07.292 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 04:58:07.456  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-24 04:58:07.457  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-24 04:58:07.457 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-24 04:58:07.457 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 04:58:07.459  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-24 04:58:07.459  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-24 04:58:07.460 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 04:58:07.460 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 04:58:07.460 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 04:58:07.461 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 04:58:07.461 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 04:58:07.462 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 04:58:07.463 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 04:58:07.463 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 04:58:07.463 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 04:58:07.464 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-24 04:58:07.469 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 565790796685939140766899435461766468650556024320
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 24 03:13:21 UTC 2022
           Final Date: Wed Jun 23 03:13:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:a8:2c:2e:8e:60:99:d6:be:b1:10:18:0a:b7:f9:97:7c:6e:11:05]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a03e7bbab7dd894123b73ac2eb43e48d6d8d8aa5
                       ae1f6813762f4e511d37de1b97d4088ae7ad396a
                       3ada3d04e1efc516d968f2c1fcdedd7fb0ac1fc7
                       c8d294927d4be1422444e072c40bb5686a7d2295
                       0efa7d996e132eca51b3163b69ae39d923bdf3dc
                       bbcc8a0ea66d327b9b86992af5072138bb6a412a
                       6b6a6eb43a65db5635d2d08f9a4fa90b169e28bb
                       1baa966a3174c4cc78485dec32b73a66b4e463f8
                       c735fb9de8083e04bc51432c8c0ec4c6ab6d5628
                       ba2bafdda70e0b9bd86df5e36b438aa54cad8255
                       dbe53b000824818eca71f04d6b739df6ef3106f1
                       e8ef6b052d6e498d468106ada54afe8fe66a8bed
                       8622dfacf40ef74e889ed3da50e693b33867d426
                       13d8358dd6c85031e0214a688cf14bdbdf94fb32
                       eba8903fe08292755176116e7fe1eac923e00760
                       cf9433acb958934a5a4d324230ea4fa1461cc93b
                       a875dfe6cccbb056e77bdfa62ec40c57cf8a1a7e
                       93cb92edf67a354a1eb719538dc566f1fe3b1647
                       5f8e51c26a14adcca7fc3af6a251531cc32e3e90
                       0d9d3bdd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f9:46:39:4b:84:eb:d0:67:3d:a8:94:0e:67:d7:ee:72:f6:a6:2a:7f]
            modulus: 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
    public exponent: 10001

] 
2022-06-24 05:02:10.479  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-24 05:02:10.481 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-24 05:02:10.483 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-24 05:02:10.484 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-24 05:02:10.484  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-24 05:02:10.485  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-24 05:02:10.485  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-24 05:02:10.486 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-24 05:02:10.486 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-24 05:02:10.487 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-24 05:02:10.495 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-24 05:02:10.496 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 05:02:10.496 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 05:02:10.497 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 05:02:10.703  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-24 05:02:10.703  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-24 05:02:10.704 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-24 05:02:10.704 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 05:02:10.705  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-24 05:02:10.705  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-24 05:02:10.706 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:02:10.706 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:02:10.706 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:02:10.707 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:02:10.707 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:02:10.708 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:02:10.708 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:02:10.709 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:02:10.709 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:02:10.709 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-24 05:02:10.713 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 565790796685939140766899435461766468650556024320
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 24 03:13:21 UTC 2022
           Final Date: Wed Jun 23 03:13:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:a8:2c:2e:8e:60:99:d6:be:b1:10:18:0a:b7:f9:97:7c:6e:11:05]
            modulus: b568312e2fe6d7455696e65d91f1201ff437b385201ac8e64dc54da56512dbe4310f8112958b6603a35f03f7d87f5e8ba6d562cf85cbaa5d67234b4540f4a81a618cb2c2f47e5429ef6fdf4180b509a63f94f546705c6143c8b6526d9ade02ff38d40515a41fdd79016f2b6ef609b2822801cf4fefe0a8788c63c67891553b57a28257e0f2b62744b4bb36554016b4b99d9e4ba7eb5ceaf2fc2c8624f4afb0d50bc9597f67a4712067398e6d17de29babfb03bcba2decbfb4b3ee093d00d0a48e389c51797ec1291265f2486e50f9f94e0584183cda6992a3afbdef889e9b7dee4997e24ac67609c87829dcd8b38d5b6946b0be593822be992931ac73aa9380166da327013718ce8a1971dd1ab91d9215dfee0b981198c9a55c93a863b9e3672e238032ace872de2e5db7a93c3a9bfbaedc6d1a84d2f9a0615ec02d842dda8b1ea22ff3a0cdd8537efd81f3a45d33a267f8bb5f49caa89cb3c441dd0a3f56baafcf2689e761cc61745f37f54fd1a0fa88202cf2d09aefd09f5eabcdd65d8d625
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a03e7bbab7dd894123b73ac2eb43e48d6d8d8aa5
                       ae1f6813762f4e511d37de1b97d4088ae7ad396a
                       3ada3d04e1efc516d968f2c1fcdedd7fb0ac1fc7
                       c8d294927d4be1422444e072c40bb5686a7d2295
                       0efa7d996e132eca51b3163b69ae39d923bdf3dc
                       bbcc8a0ea66d327b9b86992af5072138bb6a412a
                       6b6a6eb43a65db5635d2d08f9a4fa90b169e28bb
                       1baa966a3174c4cc78485dec32b73a66b4e463f8
                       c735fb9de8083e04bc51432c8c0ec4c6ab6d5628
                       ba2bafdda70e0b9bd86df5e36b438aa54cad8255
                       dbe53b000824818eca71f04d6b739df6ef3106f1
                       e8ef6b052d6e498d468106ada54afe8fe66a8bed
                       8622dfacf40ef74e889ed3da50e693b33867d426
                       13d8358dd6c85031e0214a688cf14bdbdf94fb32
                       eba8903fe08292755176116e7fe1eac923e00760
                       cf9433acb958934a5a4d324230ea4fa1461cc93b
                       a875dfe6cccbb056e77bdfa62ec40c57cf8a1a7e
                       93cb92edf67a354a1eb719538dc566f1fe3b1647
                       5f8e51c26a14adcca7fc3af6a251531cc32e3e90
                       0d9d3bdd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [52:db:79:a1:a6:e8:a2:2a:df:84:a8:bb:db:82:ad:4f:90:4d:38:06]
            modulus: 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
    public exponent: 10001

] 
2022-06-24 05:04:09.358  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-24 05:04:09.360 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-24 05:04:09.361 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-24 05:04:09.362 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-24 05:04:09.363  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-24 05:04:09.364  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-24 05:04:09.364  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-24 05:04:09.365 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-24 05:04:09.365 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-24 05:04:09.366 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-24 05:04:09.371 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-24 05:04:09.371 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 05:04:09.372 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 05:04:09.372 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 05:04:09.524  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-24 05:04:09.525  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-24 05:04:09.525 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-24 05:04:09.526 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 05:04:09.527  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-24 05:04:09.527  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-24 05:04:09.528 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:04:09.528 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:04:09.528 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:04:09.529 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:04:09.529 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:04:09.530 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:04:09.530 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:04:09.531 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:04:09.531 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:04:09.532 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-24 05:04:09.537 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 565790796685939140766899435461766468650556024320
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 24 03:13:21 UTC 2022
           Final Date: Wed Jun 23 03:13:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:a8:2c:2e:8e:60:99:d6:be:b1:10:18:0a:b7:f9:97:7c:6e:11:05]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a03e7bbab7dd894123b73ac2eb43e48d6d8d8aa5
                       ae1f6813762f4e511d37de1b97d4088ae7ad396a
                       3ada3d04e1efc516d968f2c1fcdedd7fb0ac1fc7
                       c8d294927d4be1422444e072c40bb5686a7d2295
                       0efa7d996e132eca51b3163b69ae39d923bdf3dc
                       bbcc8a0ea66d327b9b86992af5072138bb6a412a
                       6b6a6eb43a65db5635d2d08f9a4fa90b169e28bb
                       1baa966a3174c4cc78485dec32b73a66b4e463f8
                       c735fb9de8083e04bc51432c8c0ec4c6ab6d5628
                       ba2bafdda70e0b9bd86df5e36b438aa54cad8255
                       dbe53b000824818eca71f04d6b739df6ef3106f1
                       e8ef6b052d6e498d468106ada54afe8fe66a8bed
                       8622dfacf40ef74e889ed3da50e693b33867d426
                       13d8358dd6c85031e0214a688cf14bdbdf94fb32
                       eba8903fe08292755176116e7fe1eac923e00760
                       cf9433acb958934a5a4d324230ea4fa1461cc93b
                       a875dfe6cccbb056e77bdfa62ec40c57cf8a1a7e
                       93cb92edf67a354a1eb719538dc566f1fe3b1647
                       5f8e51c26a14adcca7fc3af6a251531cc32e3e90
                       0d9d3bdd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f8:e3:c9:d6:11:39:6d:a7:6c:77:a5:63:79:d8:db:85:90:75:5b:60]
            modulus: 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
    public exponent: 10001

] 
2022-06-24 05:06:36.232  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-24 05:06:36.234 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-24 05:06:36.235 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-24 05:06:36.235 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-24 05:06:36.236  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-24 05:06:36.236  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-24 05:06:36.237  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-24 05:06:36.237 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-24 05:06:36.237 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-24 05:06:36.237 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-24 05:06:36.242 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-24 05:06:36.242 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 05:06:36.243 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 05:06:36.243 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 05:06:36.371  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-24 05:06:36.372  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-24 05:06:36.372 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-24 05:06:36.372 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 05:06:36.373  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-24 05:06:36.374  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-24 05:06:36.374 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:06:36.375 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:06:36.375 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:06:36.375 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:06:36.376 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:06:36.376 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:06:36.377 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:06:36.377 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:06:36.378 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:06:36.379 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-24 05:06:36.381 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 565790796685939140766899435461766468650556024320
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 24 03:13:21 UTC 2022
           Final Date: Wed Jun 23 03:13:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:a8:2c:2e:8e:60:99:d6:be:b1:10:18:0a:b7:f9:97:7c:6e:11:05]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a03e7bbab7dd894123b73ac2eb43e48d6d8d8aa5
                       ae1f6813762f4e511d37de1b97d4088ae7ad396a
                       3ada3d04e1efc516d968f2c1fcdedd7fb0ac1fc7
                       c8d294927d4be1422444e072c40bb5686a7d2295
                       0efa7d996e132eca51b3163b69ae39d923bdf3dc
                       bbcc8a0ea66d327b9b86992af5072138bb6a412a
                       6b6a6eb43a65db5635d2d08f9a4fa90b169e28bb
                       1baa966a3174c4cc78485dec32b73a66b4e463f8
                       c735fb9de8083e04bc51432c8c0ec4c6ab6d5628
                       ba2bafdda70e0b9bd86df5e36b438aa54cad8255
                       dbe53b000824818eca71f04d6b739df6ef3106f1
                       e8ef6b052d6e498d468106ada54afe8fe66a8bed
                       8622dfacf40ef74e889ed3da50e693b33867d426
                       13d8358dd6c85031e0214a688cf14bdbdf94fb32
                       eba8903fe08292755176116e7fe1eac923e00760
                       cf9433acb958934a5a4d324230ea4fa1461cc93b
                       a875dfe6cccbb056e77bdfa62ec40c57cf8a1a7e
                       93cb92edf67a354a1eb719538dc566f1fe3b1647
                       5f8e51c26a14adcca7fc3af6a251531cc32e3e90
                       0d9d3bdd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [43:eb:d8:51:be:90:2e:9d:20:92:02:28:b7:90:df:97:d5:80:44:67]
            modulus: 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
    public exponent: 10001

] 
2022-06-24 05:09:24.448  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-24 05:09:24.450 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-24 05:09:24.452 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-24 05:09:24.453 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-24 05:09:24.453  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-24 05:09:24.454  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-24 05:09:24.454  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-24 05:09:24.454 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-24 05:09:24.455 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-24 05:09:24.455 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-24 05:09:24.460 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-24 05:09:24.461 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 05:09:24.462 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 05:09:24.462 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 05:09:24.603  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-24 05:09:24.604  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-24 05:09:24.604 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-24 05:09:24.604 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 05:09:24.605  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-24 05:09:24.606  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-24 05:09:24.606 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:09:24.606 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:09:24.607 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:09:24.607 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:09:24.608 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:09:24.608 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:09:24.608 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:09:24.609 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:09:24.609 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:09:24.610 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-24 05:09:24.613 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 565790796685939140766899435461766468650556024320
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 24 03:13:21 UTC 2022
           Final Date: Wed Jun 23 03:13:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:a8:2c:2e:8e:60:99:d6:be:b1:10:18:0a:b7:f9:97:7c:6e:11:05]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a03e7bbab7dd894123b73ac2eb43e48d6d8d8aa5
                       ae1f6813762f4e511d37de1b97d4088ae7ad396a
                       3ada3d04e1efc516d968f2c1fcdedd7fb0ac1fc7
                       c8d294927d4be1422444e072c40bb5686a7d2295
                       0efa7d996e132eca51b3163b69ae39d923bdf3dc
                       bbcc8a0ea66d327b9b86992af5072138bb6a412a
                       6b6a6eb43a65db5635d2d08f9a4fa90b169e28bb
                       1baa966a3174c4cc78485dec32b73a66b4e463f8
                       c735fb9de8083e04bc51432c8c0ec4c6ab6d5628
                       ba2bafdda70e0b9bd86df5e36b438aa54cad8255
                       dbe53b000824818eca71f04d6b739df6ef3106f1
                       e8ef6b052d6e498d468106ada54afe8fe66a8bed
                       8622dfacf40ef74e889ed3da50e693b33867d426
                       13d8358dd6c85031e0214a688cf14bdbdf94fb32
                       eba8903fe08292755176116e7fe1eac923e00760
                       cf9433acb958934a5a4d324230ea4fa1461cc93b
                       a875dfe6cccbb056e77bdfa62ec40c57cf8a1a7e
                       93cb92edf67a354a1eb719538dc566f1fe3b1647
                       5f8e51c26a14adcca7fc3af6a251531cc32e3e90
                       0d9d3bdd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5e:37:a8:b6:9f:c8:0b:fd:40:81:dc:06:bc:0b:9e:27:12:fb:3e:ad]
            modulus: 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
    public exponent: 10001

] 
2022-06-24 05:11:13.816  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-24 05:11:13.817 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-24 05:11:13.819 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-24 05:11:13.819 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-24 05:11:13.820  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-24 05:11:13.821  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-24 05:11:13.821  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-24 05:11:13.821 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-24 05:11:13.822 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-24 05:11:13.822 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-24 05:11:13.826 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-24 05:11:13.827 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 05:11:13.827 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 05:11:13.828 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 05:11:13.970  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-24 05:11:13.971  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-24 05:11:13.971 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-24 05:11:13.971 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 05:11:13.973  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-24 05:11:13.974  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-24 05:11:13.975 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:11:13.975 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:11:13.975 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:11:13.976 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:11:13.976 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:11:13.977 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:11:13.977 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:11:13.978 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:11:13.978 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:11:13.979 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-24 05:11:13.983 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 565790796685939140766899435461766468650556024320
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 24 03:13:21 UTC 2022
           Final Date: Wed Jun 23 03:13:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:a8:2c:2e:8e:60:99:d6:be:b1:10:18:0a:b7:f9:97:7c:6e:11:05]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a03e7bbab7dd894123b73ac2eb43e48d6d8d8aa5
                       ae1f6813762f4e511d37de1b97d4088ae7ad396a
                       3ada3d04e1efc516d968f2c1fcdedd7fb0ac1fc7
                       c8d294927d4be1422444e072c40bb5686a7d2295
                       0efa7d996e132eca51b3163b69ae39d923bdf3dc
                       bbcc8a0ea66d327b9b86992af5072138bb6a412a
                       6b6a6eb43a65db5635d2d08f9a4fa90b169e28bb
                       1baa966a3174c4cc78485dec32b73a66b4e463f8
                       c735fb9de8083e04bc51432c8c0ec4c6ab6d5628
                       ba2bafdda70e0b9bd86df5e36b438aa54cad8255
                       dbe53b000824818eca71f04d6b739df6ef3106f1
                       e8ef6b052d6e498d468106ada54afe8fe66a8bed
                       8622dfacf40ef74e889ed3da50e693b33867d426
                       13d8358dd6c85031e0214a688cf14bdbdf94fb32
                       eba8903fe08292755176116e7fe1eac923e00760
                       cf9433acb958934a5a4d324230ea4fa1461cc93b
                       a875dfe6cccbb056e77bdfa62ec40c57cf8a1a7e
                       93cb92edf67a354a1eb719538dc566f1fe3b1647
                       5f8e51c26a14adcca7fc3af6a251531cc32e3e90
                       0d9d3bdd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bb:da:30:5a:c7:82:65:44:f7:91:63:20:df:2e:72:5c:86:1d:0f:e5]
            modulus: c4d35a453fdc5757a7d3c72d97cbd132ecf3f84dcf7a44222326e2b301d3c8baefe99960e3210f53a085e8c7bb9962b2bde929aef14096e29c81095b1e8648cc84b2c0ee727c001632f60b80424632e57123d474f81918f696e7ff7de9463b72fab5cc79422457ef0df616bb80b0e9b1596dad34cd4d3bdb8017f4d25de96e44869043c4f655cfc9e9266d8619eb2fdb66b9596fbaaff1115027cf55217434e423762b943855dea4ba2dc6791cc154d25d0b0b5bddb1a4a6245629b01090cfd3219344008fb164901e76d94e03c6caf5f6a3668b1ef207284ad53ccf8b4046ef842665f206bd70b8749c42379202792916f25b233ae9f200cc9a6e8bae92144b
    public exponent: 10001

] 
2022-06-24 05:14:42.563  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-24 05:14:42.569 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-24 05:14:42.572 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-24 05:14:42.576 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-24 05:14:42.577  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-24 05:14:42.577  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-24 05:14:42.578  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-24 05:14:42.578 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-24 05:14:42.579 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-24 05:14:42.579 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-24 05:14:42.585 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-24 05:14:42.586 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 05:14:42.587 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 05:14:42.587 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 05:14:42.755  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-24 05:14:42.756  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-24 05:14:42.756 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-24 05:14:42.756 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 05:14:42.760  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-24 05:14:42.760  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-24 05:14:42.761 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:14:42.762 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:14:42.762 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:14:42.766 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:14:42.766 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:14:42.766 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:14:42.767 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:14:42.767 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:14:42.767 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:14:42.768 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-24 05:14:42.772 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 565790796685939140766899435461766468650556024320
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 24 03:13:21 UTC 2022
           Final Date: Wed Jun 23 03:13:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:a8:2c:2e:8e:60:99:d6:be:b1:10:18:0a:b7:f9:97:7c:6e:11:05]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a03e7bbab7dd894123b73ac2eb43e48d6d8d8aa5
                       ae1f6813762f4e511d37de1b97d4088ae7ad396a
                       3ada3d04e1efc516d968f2c1fcdedd7fb0ac1fc7
                       c8d294927d4be1422444e072c40bb5686a7d2295
                       0efa7d996e132eca51b3163b69ae39d923bdf3dc
                       bbcc8a0ea66d327b9b86992af5072138bb6a412a
                       6b6a6eb43a65db5635d2d08f9a4fa90b169e28bb
                       1baa966a3174c4cc78485dec32b73a66b4e463f8
                       c735fb9de8083e04bc51432c8c0ec4c6ab6d5628
                       ba2bafdda70e0b9bd86df5e36b438aa54cad8255
                       dbe53b000824818eca71f04d6b739df6ef3106f1
                       e8ef6b052d6e498d468106ada54afe8fe66a8bed
                       8622dfacf40ef74e889ed3da50e693b33867d426
                       13d8358dd6c85031e0214a688cf14bdbdf94fb32
                       eba8903fe08292755176116e7fe1eac923e00760
                       cf9433acb958934a5a4d324230ea4fa1461cc93b
                       a875dfe6cccbb056e77bdfa62ec40c57cf8a1a7e
                       93cb92edf67a354a1eb719538dc566f1fe3b1647
                       5f8e51c26a14adcca7fc3af6a251531cc32e3e90
                       0d9d3bdd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fd:45:21:b0:04:1c:ea:b3:28:26:3b:b5:08:57:df:69:f7:c0:2e:c0]
            modulus: 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
    public exponent: 10001

] 
2022-06-24 05:14:59.854  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-24 05:14:59.856 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-24 05:14:59.857 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-24 05:14:59.857 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-24 05:14:59.858  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-24 05:14:59.858  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-24 05:14:59.859  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-24 05:14:59.859 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-24 05:14:59.859 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-24 05:14:59.860 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-24 05:14:59.864 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-24 05:14:59.865 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 05:14:59.865 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 05:14:59.866 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 05:14:59.982  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-24 05:14:59.983  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-24 05:14:59.983 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-24 05:14:59.984 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 05:14:59.985  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-24 05:14:59.986  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-24 05:14:59.986 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:14:59.986 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:14:59.987 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:14:59.987 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:14:59.988 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:14:59.988 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:14:59.989 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:14:59.989 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:14:59.989 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:14:59.990 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-24 05:14:59.993 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 565790796685939140766899435461766468650556024320
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 24 03:13:21 UTC 2022
           Final Date: Wed Jun 23 03:13:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:a8:2c:2e:8e:60:99:d6:be:b1:10:18:0a:b7:f9:97:7c:6e:11:05]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a03e7bbab7dd894123b73ac2eb43e48d6d8d8aa5
                       ae1f6813762f4e511d37de1b97d4088ae7ad396a
                       3ada3d04e1efc516d968f2c1fcdedd7fb0ac1fc7
                       c8d294927d4be1422444e072c40bb5686a7d2295
                       0efa7d996e132eca51b3163b69ae39d923bdf3dc
                       bbcc8a0ea66d327b9b86992af5072138bb6a412a
                       6b6a6eb43a65db5635d2d08f9a4fa90b169e28bb
                       1baa966a3174c4cc78485dec32b73a66b4e463f8
                       c735fb9de8083e04bc51432c8c0ec4c6ab6d5628
                       ba2bafdda70e0b9bd86df5e36b438aa54cad8255
                       dbe53b000824818eca71f04d6b739df6ef3106f1
                       e8ef6b052d6e498d468106ada54afe8fe66a8bed
                       8622dfacf40ef74e889ed3da50e693b33867d426
                       13d8358dd6c85031e0214a688cf14bdbdf94fb32
                       eba8903fe08292755176116e7fe1eac923e00760
                       cf9433acb958934a5a4d324230ea4fa1461cc93b
                       a875dfe6cccbb056e77bdfa62ec40c57cf8a1a7e
                       93cb92edf67a354a1eb719538dc566f1fe3b1647
                       5f8e51c26a14adcca7fc3af6a251531cc32e3e90
                       0d9d3bdd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [04:93:d7:59:f9:90:6b:14:16:d3:9b:5d:c8:ff:3a:e6:ee:e7:e7:b9]
            modulus: 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
    public exponent: 10001

] 
2022-06-24 05:15:40.075  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-24 05:15:40.076 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-24 05:15:40.078 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-24 05:15:40.079 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-24 05:15:40.079  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-24 05:15:40.080  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-24 05:15:40.080  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-24 05:15:40.081 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-24 05:15:40.081 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-24 05:15:40.081 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-24 05:15:40.087 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-24 05:15:40.087 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 05:15:40.087 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 05:15:40.088 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 05:15:40.280  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-24 05:15:40.281  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-24 05:15:40.281 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-24 05:15:40.281 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 05:15:40.282  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-24 05:15:40.283  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-24 05:15:40.283 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:15:40.283 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:15:40.284 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:15:40.285 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:15:40.285 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:15:40.285 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:15:40.286 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:15:40.287 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:15:40.287 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:15:40.288 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-24 05:15:40.290 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 565790796685939140766899435461766468650556024320
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 24 03:13:21 UTC 2022
           Final Date: Wed Jun 23 03:13:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:a8:2c:2e:8e:60:99:d6:be:b1:10:18:0a:b7:f9:97:7c:6e:11:05]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a03e7bbab7dd894123b73ac2eb43e48d6d8d8aa5
                       ae1f6813762f4e511d37de1b97d4088ae7ad396a
                       3ada3d04e1efc516d968f2c1fcdedd7fb0ac1fc7
                       c8d294927d4be1422444e072c40bb5686a7d2295
                       0efa7d996e132eca51b3163b69ae39d923bdf3dc
                       bbcc8a0ea66d327b9b86992af5072138bb6a412a
                       6b6a6eb43a65db5635d2d08f9a4fa90b169e28bb
                       1baa966a3174c4cc78485dec32b73a66b4e463f8
                       c735fb9de8083e04bc51432c8c0ec4c6ab6d5628
                       ba2bafdda70e0b9bd86df5e36b438aa54cad8255
                       dbe53b000824818eca71f04d6b739df6ef3106f1
                       e8ef6b052d6e498d468106ada54afe8fe66a8bed
                       8622dfacf40ef74e889ed3da50e693b33867d426
                       13d8358dd6c85031e0214a688cf14bdbdf94fb32
                       eba8903fe08292755176116e7fe1eac923e00760
                       cf9433acb958934a5a4d324230ea4fa1461cc93b
                       a875dfe6cccbb056e77bdfa62ec40c57cf8a1a7e
                       93cb92edf67a354a1eb719538dc566f1fe3b1647
                       5f8e51c26a14adcca7fc3af6a251531cc32e3e90
                       0d9d3bdd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [50:23:66:22:de:d6:df:34:cb:cf:a4:42:bb:80:d3:24:c0:53:53:3d]
            modulus: b0788b71dd3242040e9d461c66a3d44205e8d28088e8acf0e6775180947ded5e5f689e7e33ab4dd37995c1f455bae563cbdaae6b8bf6980d8e2f8d22bdda75fe33960552131645d057c87c09122c74de8e8e178f97b9d0fd1e95cfa9208ecfbed3939e85870e1b2332403061d9bc0d29cfb89e2547ef3d2dd0a877eeb2610efb36ae0729909907db54af4b3e4132883b6dc85fe3b8e6188d1d238300a43c0a7a049c925f8e27bab48ce1a9a447fc654a5c3c82d7239dd76f4463dc2a82bca676b3058c3c12cfedf9996904cb4df3cd0ca4746bd5809e4421e6c33f93ddde9e1be8e76ea60c5bf139472203a0d2c641408ac06ada20a989450eca60bfef2e7375
    public exponent: 10001

] 
2022-06-24 05:20:03.965  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-24 05:20:03.968 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-24 05:20:03.971 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-24 05:20:03.972 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-24 05:20:03.972  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-24 05:20:03.973  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-24 05:20:03.973  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-24 05:20:03.974 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-24 05:20:03.975 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-24 05:20:03.975 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-24 05:20:03.984 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-24 05:20:03.985 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 05:20:03.985 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 05:20:03.985 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 05:20:04.172  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-24 05:20:04.173  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-24 05:20:04.173 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-24 05:20:04.174 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 05:20:04.175  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-24 05:20:04.176  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-24 05:20:04.176 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:20:04.177 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:20:04.177 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:20:04.179 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:20:04.179 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:20:04.179 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:20:04.180 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:20:04.181 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:20:04.181 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:20:04.182 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-24 05:20:04.188 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 565790796685939140766899435461766468650556024320
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 24 03:13:21 UTC 2022
           Final Date: Wed Jun 23 03:13:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:a8:2c:2e:8e:60:99:d6:be:b1:10:18:0a:b7:f9:97:7c:6e:11:05]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a03e7bbab7dd894123b73ac2eb43e48d6d8d8aa5
                       ae1f6813762f4e511d37de1b97d4088ae7ad396a
                       3ada3d04e1efc516d968f2c1fcdedd7fb0ac1fc7
                       c8d294927d4be1422444e072c40bb5686a7d2295
                       0efa7d996e132eca51b3163b69ae39d923bdf3dc
                       bbcc8a0ea66d327b9b86992af5072138bb6a412a
                       6b6a6eb43a65db5635d2d08f9a4fa90b169e28bb
                       1baa966a3174c4cc78485dec32b73a66b4e463f8
                       c735fb9de8083e04bc51432c8c0ec4c6ab6d5628
                       ba2bafdda70e0b9bd86df5e36b438aa54cad8255
                       dbe53b000824818eca71f04d6b739df6ef3106f1
                       e8ef6b052d6e498d468106ada54afe8fe66a8bed
                       8622dfacf40ef74e889ed3da50e693b33867d426
                       13d8358dd6c85031e0214a688cf14bdbdf94fb32
                       eba8903fe08292755176116e7fe1eac923e00760
                       cf9433acb958934a5a4d324230ea4fa1461cc93b
                       a875dfe6cccbb056e77bdfa62ec40c57cf8a1a7e
                       93cb92edf67a354a1eb719538dc566f1fe3b1647
                       5f8e51c26a14adcca7fc3af6a251531cc32e3e90
                       0d9d3bdd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ef:aa:aa:3f:68:d0:8d:6f:c1:af:00:a7:c7:d3:9b:d7:26:de:03:b8]
            modulus: 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
    public exponent: 10001

] 
2022-06-24 05:25:04.069  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-24 05:25:04.073 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-24 05:25:04.076 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-24 05:25:04.077 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-24 05:25:04.078  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-24 05:25:04.078  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-24 05:25:04.079  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-24 05:25:04.079 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-24 05:25:04.080 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-24 05:25:04.081 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-24 05:25:04.088 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-24 05:25:04.089 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 05:25:04.089 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 05:25:04.090 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 05:25:04.313  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-24 05:25:04.314  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-24 05:25:04.314 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-24 05:25:04.314 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 05:25:04.316  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-24 05:25:04.316  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-24 05:25:04.316 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:25:04.317 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:25:04.317 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:25:04.318 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:25:04.318 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:25:04.318 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:25:04.319 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:25:04.319 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:25:04.320 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:25:04.321 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-24 05:25:04.325 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 565790796685939140766899435461766468650556024320
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 24 03:13:21 UTC 2022
           Final Date: Wed Jun 23 03:13:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:a8:2c:2e:8e:60:99:d6:be:b1:10:18:0a:b7:f9:97:7c:6e:11:05]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a03e7bbab7dd894123b73ac2eb43e48d6d8d8aa5
                       ae1f6813762f4e511d37de1b97d4088ae7ad396a
                       3ada3d04e1efc516d968f2c1fcdedd7fb0ac1fc7
                       c8d294927d4be1422444e072c40bb5686a7d2295
                       0efa7d996e132eca51b3163b69ae39d923bdf3dc
                       bbcc8a0ea66d327b9b86992af5072138bb6a412a
                       6b6a6eb43a65db5635d2d08f9a4fa90b169e28bb
                       1baa966a3174c4cc78485dec32b73a66b4e463f8
                       c735fb9de8083e04bc51432c8c0ec4c6ab6d5628
                       ba2bafdda70e0b9bd86df5e36b438aa54cad8255
                       dbe53b000824818eca71f04d6b739df6ef3106f1
                       e8ef6b052d6e498d468106ada54afe8fe66a8bed
                       8622dfacf40ef74e889ed3da50e693b33867d426
                       13d8358dd6c85031e0214a688cf14bdbdf94fb32
                       eba8903fe08292755176116e7fe1eac923e00760
                       cf9433acb958934a5a4d324230ea4fa1461cc93b
                       a875dfe6cccbb056e77bdfa62ec40c57cf8a1a7e
                       93cb92edf67a354a1eb719538dc566f1fe3b1647
                       5f8e51c26a14adcca7fc3af6a251531cc32e3e90
                       0d9d3bdd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9f:2d:97:67:bf:1a:a9:ba:65:40:25:12:5b:66:e3:8e:a6:f9:c5:7e]
            modulus: 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
    public exponent: 10001

] 
2022-06-24 05:29:23.590  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-24 05:29:23.594 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-24 05:29:23.596 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-24 05:29:23.597 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-24 05:29:23.597  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-24 05:29:23.598  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-24 05:29:23.598  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-24 05:29:23.598 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-24 05:29:23.599 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-24 05:29:23.599 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-24 05:29:23.605 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-24 05:29:23.606 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 05:29:23.606 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 05:29:23.606 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 05:29:23.715  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-24 05:29:23.716  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-24 05:29:23.716 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-24 05:29:23.716 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 05:29:23.718  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-24 05:29:23.718  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-24 05:29:23.718 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:29:23.719 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:29:23.719 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:29:23.719 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:29:23.719 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:29:23.720 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:29:23.720 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:29:23.720 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:29:23.721 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:29:23.721 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-24 05:29:23.725 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 565790796685939140766899435461766468650556024320
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 24 03:13:21 UTC 2022
           Final Date: Wed Jun 23 03:13:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:a8:2c:2e:8e:60:99:d6:be:b1:10:18:0a:b7:f9:97:7c:6e:11:05]
            modulus: b568312e2fe6d7455696e65d91f1201ff437b385201ac8e64dc54da56512dbe4310f8112958b6603a35f03f7d87f5e8ba6d562cf85cbaa5d67234b4540f4a81a618cb2c2f47e5429ef6fdf4180b509a63f94f546705c6143c8b6526d9ade02ff38d40515a41fdd79016f2b6ef609b2822801cf4fefe0a8788c63c67891553b57a28257e0f2b62744b4bb36554016b4b99d9e4ba7eb5ceaf2fc2c8624f4afb0d50bc9597f67a4712067398e6d17de29babfb03bcba2decbfb4b3ee093d00d0a48e389c51797ec1291265f2486e50f9f94e0584183cda6992a3afbdef889e9b7dee4997e24ac67609c87829dcd8b38d5b6946b0be593822be992931ac73aa9380166da327013718ce8a1971dd1ab91d9215dfee0b981198c9a55c93a863b9e3672e238032ace872de2e5db7a93c3a9bfbaedc6d1a84d2f9a0615ec02d842dda8b1ea22ff3a0cdd8537efd81f3a45d33a267f8bb5f49caa89cb3c441dd0a3f56baafcf2689e761cc61745f37f54fd1a0fa88202cf2d09aefd09f5eabcdd65d8d625
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a03e7bbab7dd894123b73ac2eb43e48d6d8d8aa5
                       ae1f6813762f4e511d37de1b97d4088ae7ad396a
                       3ada3d04e1efc516d968f2c1fcdedd7fb0ac1fc7
                       c8d294927d4be1422444e072c40bb5686a7d2295
                       0efa7d996e132eca51b3163b69ae39d923bdf3dc
                       bbcc8a0ea66d327b9b86992af5072138bb6a412a
                       6b6a6eb43a65db5635d2d08f9a4fa90b169e28bb
                       1baa966a3174c4cc78485dec32b73a66b4e463f8
                       c735fb9de8083e04bc51432c8c0ec4c6ab6d5628
                       ba2bafdda70e0b9bd86df5e36b438aa54cad8255
                       dbe53b000824818eca71f04d6b739df6ef3106f1
                       e8ef6b052d6e498d468106ada54afe8fe66a8bed
                       8622dfacf40ef74e889ed3da50e693b33867d426
                       13d8358dd6c85031e0214a688cf14bdbdf94fb32
                       eba8903fe08292755176116e7fe1eac923e00760
                       cf9433acb958934a5a4d324230ea4fa1461cc93b
                       a875dfe6cccbb056e77bdfa62ec40c57cf8a1a7e
                       93cb92edf67a354a1eb719538dc566f1fe3b1647
                       5f8e51c26a14adcca7fc3af6a251531cc32e3e90
                       0d9d3bdd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e7:04:35:f3:d1:b1:1a:29:c5:a6:e9:2d:da:d0:85:0c:8a:a2:0c:5c]
            modulus: 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
    public exponent: 10001

] 
2022-06-24 05:35:41.902  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-24 05:35:41.904 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-24 05:35:41.906 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-24 05:35:41.907 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-24 05:35:41.908  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-24 05:35:41.909  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-24 05:35:41.909  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-24 05:35:41.909 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-24 05:35:41.911 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-24 05:35:41.911 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-24 05:35:41.916 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-24 05:35:41.918 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 05:35:41.918 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 05:35:41.918 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 05:35:42.118  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-24 05:35:42.119  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-24 05:35:42.120 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-24 05:35:42.120 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 05:35:42.121  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-24 05:35:42.122  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-24 05:35:42.122 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:35:42.123 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:35:42.123 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:35:42.124 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:35:42.124 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:35:42.125 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:35:42.125 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:35:42.126 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:35:42.126 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:35:42.127 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-24 05:35:42.131 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 565790796685939140766899435461766468650556024320
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 24 03:13:21 UTC 2022
           Final Date: Wed Jun 23 03:13:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:a8:2c:2e:8e:60:99:d6:be:b1:10:18:0a:b7:f9:97:7c:6e:11:05]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a03e7bbab7dd894123b73ac2eb43e48d6d8d8aa5
                       ae1f6813762f4e511d37de1b97d4088ae7ad396a
                       3ada3d04e1efc516d968f2c1fcdedd7fb0ac1fc7
                       c8d294927d4be1422444e072c40bb5686a7d2295
                       0efa7d996e132eca51b3163b69ae39d923bdf3dc
                       bbcc8a0ea66d327b9b86992af5072138bb6a412a
                       6b6a6eb43a65db5635d2d08f9a4fa90b169e28bb
                       1baa966a3174c4cc78485dec32b73a66b4e463f8
                       c735fb9de8083e04bc51432c8c0ec4c6ab6d5628
                       ba2bafdda70e0b9bd86df5e36b438aa54cad8255
                       dbe53b000824818eca71f04d6b739df6ef3106f1
                       e8ef6b052d6e498d468106ada54afe8fe66a8bed
                       8622dfacf40ef74e889ed3da50e693b33867d426
                       13d8358dd6c85031e0214a688cf14bdbdf94fb32
                       eba8903fe08292755176116e7fe1eac923e00760
                       cf9433acb958934a5a4d324230ea4fa1461cc93b
                       a875dfe6cccbb056e77bdfa62ec40c57cf8a1a7e
                       93cb92edf67a354a1eb719538dc566f1fe3b1647
                       5f8e51c26a14adcca7fc3af6a251531cc32e3e90
                       0d9d3bdd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [90:46:90:5e:7c:92:77:51:62:ac:8e:e6:22:d7:e5:2b:97:af:5c:96]
            modulus: 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
    public exponent: 10001

]