Results

By type

          2022-06-26 03:15:46,661 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-06-26 03:15:47,548 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-06-26 03:15:48.272  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jun 26, 2022 3:15:50 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jun 26, 2022 3:15:50 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 26, 2022 3:15:50 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jun 26, 2022 3:15:50 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-06-26 03:15:50.745 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-06-26 03:15:51.169  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-06-26 03:15:51.438  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-06-26 03:15:52.244 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-06-26 03:15:52.247 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-06-26 03:15:52.248 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-06-26 03:15:52.252 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-06-26 03:15:52.299 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-06-26 03:15:52.303 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-06-26 03:15:52.430 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-06-26 03:15:53.088 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jun 26, 2022 3:15:53 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-06-26 03:15:54.026  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.214 seconds (JVM running for 10.069)
Jun 26, 2022 3:16:20 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-06-26 03:16:38.944  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-26 03:16:38.953 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-26 03:16:38.992 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-26 03:16:38.996 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-26 03:16:39.013  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-26 03:16:39.016  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-26 03:16:39.017  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-26 03:16:39.018 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 03:16:39.019 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 03:16:39.022 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 03:16:39.028 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-26 03:16:39.032 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-26 03:16:39.081 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-26 03:16:39.086 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 03:16:39.087 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 03:16:39.090 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 03:16:39.694  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-26 03:16:39.697  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-26 03:16:39.698 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-26 03:16:39.699 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 03:16:39.708  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-26 03:16:39.709  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-26 03:16:39.710 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 03:16:39.711 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 03:16:39.711 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 03:16:39.731 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 03:16:39.732 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 03:16:39.733 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 03:16:39.743 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 03:16:39.744 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 03:16:39.745 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 03:16:39.747 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-26 03:16:39.779 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 308903450806963228644516255602566852320633396216
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 26 03:13:42 UTC 2022
           Final Date: Fri Jun 25 03:13:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [13:29:f6:c7:bc:40:d3:fd:df:6f:10:2a:59:18:89:1e:3c:e6:1a:7e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 30f9f7c59da380f83c6222bc65d29489f13b964c
                       b2b652655a665f56d702698d974073bdb23e63c0
                       cd8179b5e933b2a907d73367bb9e4720f61c84b5
                       5bc1323e761da563dcbdea6e95d543944dcc053c
                       03437a57dde80fe3205dc3eb7dc4d609d472742e
                       8b32c6aa42945a1c1688970e1ed3183eb22ceb8b
                       3baa62a82c0e3dfc221a821683192978576920b1
                       4fca96f2f809fb2e2584d56b28f631849df53081
                       81343f930a48eaac19a229715833fc7df0db36b1
                       d3f1f60cc930992c979fc2f7f0971cbefbf80ee2
                       f6415831e23ab897123c2a198c0deac2ed4abc12
                       7a460ecd5dbde1d88f733dfb06fd998113fc0496
                       f241b978e15606a93e365c19af178f37d729cb5e
                       7533cc99348c4964eb5a95cd04ab1dc29061105e
                       9c8d0f03b617fca3c2528b29394cd21ef459c43c
                       dfc795d4b04cc5fc7b22e6acabbeaffea70d6c95
                       e8a2c74ec0ae847b17fda668f593be538b5e3570
                       0e591cab3df15a1a61a3a71e7ab3d0c50fb4a591
                       641128227290294b799fea5558e82e0c85b4aa02
                       524c08f4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2e:74:56:a6:a0:1e:7e:94:e7:32:c1:fa:13:e0:62:90:69:9a:c2:6f]
            modulus: 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
    public exponent: 10001

] 
2022-06-26 04:42:13.638  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-26 04:42:13.641 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-26 04:42:13.645 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 04:42:13.646 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-26 04:42:13.647  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 04:42:13.648  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-26 04:42:13.648  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-26 04:42:13.649 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 04:42:13.649 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-26 04:42:13.649 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-26 04:42:13.661 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-26 04:42:13.662 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 04:42:13.662 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 04:42:13.662 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 04:42:13.904  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-26 04:42:13.905  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-26 04:42:13.906 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-26 04:42:13.906 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 04:42:13.910  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-26 04:42:13.910  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-26 04:42:13.911 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 04:42:13.915 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 04:42:13.915 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 04:42:13.916 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 04:42:13.917 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 04:42:13.917 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 04:42:13.918 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 04:42:13.918 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 04:42:13.922 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 04:42:13.924 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-26 04:42:13.929 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 308903450806963228644516255602566852320633396216
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 26 03:13:42 UTC 2022
           Final Date: Fri Jun 25 03:13:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [13:29:f6:c7:bc:40:d3:fd:df:6f:10:2a:59:18:89:1e:3c:e6:1a:7e]
            modulus: acc4d1e3e8ace15febca38b393c7d3c8fd33a4e6a05a3587e4ab699ee50f5eb1e8064e6a4feca196f286e9e9434cb470b1570a4a8065981e90d03f1dc79a4e2498a15c539b9d3d75deca013ffe95211bb450a330949c928ae13d548a481662119624cf5ffe7842ee54bbbdbdf7d3d87456105ba32ae245f4c3b4932a5d66a16378beda3d61a504c76c401710e58369e39976912ed6c1b5f03bc0a9241726588db2fd16b30cc6412341ed93f152085b6d345a582642c61ccfecfd4bda2d8f5230b4f64701ac1645fa544e620ce2dc4f7ad0376fa7d7f0246de2e5b40fbd284d970b05ed92f0fd42dc32671ed5928bd6478d18cc4394175a5b996fa961cab2bb72eeaa301da08eaa604b7969fdae1c136095ac711708886c30d7de3c85aa2bcf05947e58099ba45309cde8688f6747629cc9156fc5921b29c0eacf7088998cb3459db83448bad6a8ffb922beb3e6294d1be763c8a7c233090cb05697bd2960f23f472c78b1c173a5137fb9becccb257cc45cf87616818564f8cfbc9505c347e243
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 30f9f7c59da380f83c6222bc65d29489f13b964c
                       b2b652655a665f56d702698d974073bdb23e63c0
                       cd8179b5e933b2a907d73367bb9e4720f61c84b5
                       5bc1323e761da563dcbdea6e95d543944dcc053c
                       03437a57dde80fe3205dc3eb7dc4d609d472742e
                       8b32c6aa42945a1c1688970e1ed3183eb22ceb8b
                       3baa62a82c0e3dfc221a821683192978576920b1
                       4fca96f2f809fb2e2584d56b28f631849df53081
                       81343f930a48eaac19a229715833fc7df0db36b1
                       d3f1f60cc930992c979fc2f7f0971cbefbf80ee2
                       f6415831e23ab897123c2a198c0deac2ed4abc12
                       7a460ecd5dbde1d88f733dfb06fd998113fc0496
                       f241b978e15606a93e365c19af178f37d729cb5e
                       7533cc99348c4964eb5a95cd04ab1dc29061105e
                       9c8d0f03b617fca3c2528b29394cd21ef459c43c
                       dfc795d4b04cc5fc7b22e6acabbeaffea70d6c95
                       e8a2c74ec0ae847b17fda668f593be538b5e3570
                       0e591cab3df15a1a61a3a71e7ab3d0c50fb4a591
                       641128227290294b799fea5558e82e0c85b4aa02
                       524c08f4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [70:1e:af:a0:38:f7:10:4f:20:8b:7e:b9:5b:d7:05:c1:11:a3:53:e3]
            modulus: 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
    public exponent: 10001

] 
2022-06-26 04:44:16.692  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-26 04:44:16.693 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-26 04:44:16.694 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-26 04:44:16.695 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-26 04:44:16.696  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-26 04:44:16.696  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-26 04:44:16.697  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-26 04:44:16.697 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 04:44:16.698 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-26 04:44:16.698 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-26 04:44:16.703 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-26 04:44:16.704 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 04:44:16.704 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 04:44:16.705 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 04:44:16.915  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-26 04:44:16.916  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-26 04:44:16.916 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-26 04:44:16.917 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 04:44:16.920  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-26 04:44:16.920  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-26 04:44:16.921 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 04:44:16.922 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 04:44:16.922 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 04:44:16.923 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 04:44:16.924 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 04:44:16.924 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 04:44:16.925 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 04:44:16.925 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 04:44:16.926 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 04:44:16.927 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-26 04:44:16.931 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 308903450806963228644516255602566852320633396216
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 26 03:13:42 UTC 2022
           Final Date: Fri Jun 25 03:13:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [13:29:f6:c7:bc:40:d3:fd:df:6f:10:2a:59:18:89:1e:3c:e6:1a:7e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 30f9f7c59da380f83c6222bc65d29489f13b964c
                       b2b652655a665f56d702698d974073bdb23e63c0
                       cd8179b5e933b2a907d73367bb9e4720f61c84b5
                       5bc1323e761da563dcbdea6e95d543944dcc053c
                       03437a57dde80fe3205dc3eb7dc4d609d472742e
                       8b32c6aa42945a1c1688970e1ed3183eb22ceb8b
                       3baa62a82c0e3dfc221a821683192978576920b1
                       4fca96f2f809fb2e2584d56b28f631849df53081
                       81343f930a48eaac19a229715833fc7df0db36b1
                       d3f1f60cc930992c979fc2f7f0971cbefbf80ee2
                       f6415831e23ab897123c2a198c0deac2ed4abc12
                       7a460ecd5dbde1d88f733dfb06fd998113fc0496
                       f241b978e15606a93e365c19af178f37d729cb5e
                       7533cc99348c4964eb5a95cd04ab1dc29061105e
                       9c8d0f03b617fca3c2528b29394cd21ef459c43c
                       dfc795d4b04cc5fc7b22e6acabbeaffea70d6c95
                       e8a2c74ec0ae847b17fda668f593be538b5e3570
                       0e591cab3df15a1a61a3a71e7ab3d0c50fb4a591
                       641128227290294b799fea5558e82e0c85b4aa02
                       524c08f4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c1:a8:46:05:bd:0e:d8:33:83:ff:65:8f:e7:b6:99:0f:fe:33:44:e6]
            modulus: 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
    public exponent: 10001

] 
2022-06-26 04:45:57.297  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-26 04:45:57.300 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-26 04:45:57.302 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-26 04:45:57.304 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-26 04:45:57.304  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-26 04:45:57.306  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-26 04:45:57.306  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-26 04:45:57.307 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 04:45:57.307 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-26 04:45:57.309 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-26 04:45:57.316 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-26 04:45:57.317 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 04:45:57.318 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 04:45:57.318 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 04:45:57.478  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-26 04:45:57.479  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-26 04:45:57.479 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-26 04:45:57.479 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 04:45:57.482  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-26 04:45:57.483  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-26 04:45:57.483 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 04:45:57.484 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 04:45:57.484 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 04:45:57.485 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 04:45:57.486 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 04:45:57.486 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 04:45:57.487 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 04:45:57.487 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 04:45:57.488 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 04:45:57.489 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-26 04:45:57.493 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 308903450806963228644516255602566852320633396216
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 26 03:13:42 UTC 2022
           Final Date: Fri Jun 25 03:13:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [13:29:f6:c7:bc:40:d3:fd:df:6f:10:2a:59:18:89:1e:3c:e6:1a:7e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 30f9f7c59da380f83c6222bc65d29489f13b964c
                       b2b652655a665f56d702698d974073bdb23e63c0
                       cd8179b5e933b2a907d73367bb9e4720f61c84b5
                       5bc1323e761da563dcbdea6e95d543944dcc053c
                       03437a57dde80fe3205dc3eb7dc4d609d472742e
                       8b32c6aa42945a1c1688970e1ed3183eb22ceb8b
                       3baa62a82c0e3dfc221a821683192978576920b1
                       4fca96f2f809fb2e2584d56b28f631849df53081
                       81343f930a48eaac19a229715833fc7df0db36b1
                       d3f1f60cc930992c979fc2f7f0971cbefbf80ee2
                       f6415831e23ab897123c2a198c0deac2ed4abc12
                       7a460ecd5dbde1d88f733dfb06fd998113fc0496
                       f241b978e15606a93e365c19af178f37d729cb5e
                       7533cc99348c4964eb5a95cd04ab1dc29061105e
                       9c8d0f03b617fca3c2528b29394cd21ef459c43c
                       dfc795d4b04cc5fc7b22e6acabbeaffea70d6c95
                       e8a2c74ec0ae847b17fda668f593be538b5e3570
                       0e591cab3df15a1a61a3a71e7ab3d0c50fb4a591
                       641128227290294b799fea5558e82e0c85b4aa02
                       524c08f4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ba:37:a1:bf:88:60:c5:00:3a:46:7d:4d:0b:5e:dd:87:dc:a1:3b:8b]
            modulus: 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
    public exponent: 10001

] 
2022-06-26 04:47:50.536  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-26 04:47:50.539 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-26 04:47:50.541 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 04:47:50.542 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-26 04:47:50.543  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 04:47:50.544  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-26 04:47:50.545  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-26 04:47:50.546 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 04:47:50.546 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-26 04:47:50.547 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-26 04:47:50.552 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-26 04:47:50.553 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 04:47:50.553 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 04:47:50.553 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 04:47:50.705  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-26 04:47:50.706  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-26 04:47:50.707 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-26 04:47:50.707 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 04:47:50.710  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-26 04:47:50.711  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-26 04:47:50.712 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 04:47:50.713 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 04:47:50.713 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 04:47:50.714 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 04:47:50.715 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 04:47:50.721 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 04:47:50.722 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 04:47:50.722 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 04:47:50.722 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 04:47:50.723 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-26 04:47:50.735 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 308903450806963228644516255602566852320633396216
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 26 03:13:42 UTC 2022
           Final Date: Fri Jun 25 03:13:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [13:29:f6:c7:bc:40:d3:fd:df:6f:10:2a:59:18:89:1e:3c:e6:1a:7e]
            modulus: acc4d1e3e8ace15febca38b393c7d3c8fd33a4e6a05a3587e4ab699ee50f5eb1e8064e6a4feca196f286e9e9434cb470b1570a4a8065981e90d03f1dc79a4e2498a15c539b9d3d75deca013ffe95211bb450a330949c928ae13d548a481662119624cf5ffe7842ee54bbbdbdf7d3d87456105ba32ae245f4c3b4932a5d66a16378beda3d61a504c76c401710e58369e39976912ed6c1b5f03bc0a9241726588db2fd16b30cc6412341ed93f152085b6d345a582642c61ccfecfd4bda2d8f5230b4f64701ac1645fa544e620ce2dc4f7ad0376fa7d7f0246de2e5b40fbd284d970b05ed92f0fd42dc32671ed5928bd6478d18cc4394175a5b996fa961cab2bb72eeaa301da08eaa604b7969fdae1c136095ac711708886c30d7de3c85aa2bcf05947e58099ba45309cde8688f6747629cc9156fc5921b29c0eacf7088998cb3459db83448bad6a8ffb922beb3e6294d1be763c8a7c233090cb05697bd2960f23f472c78b1c173a5137fb9becccb257cc45cf87616818564f8cfbc9505c347e243
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 30f9f7c59da380f83c6222bc65d29489f13b964c
                       b2b652655a665f56d702698d974073bdb23e63c0
                       cd8179b5e933b2a907d73367bb9e4720f61c84b5
                       5bc1323e761da563dcbdea6e95d543944dcc053c
                       03437a57dde80fe3205dc3eb7dc4d609d472742e
                       8b32c6aa42945a1c1688970e1ed3183eb22ceb8b
                       3baa62a82c0e3dfc221a821683192978576920b1
                       4fca96f2f809fb2e2584d56b28f631849df53081
                       81343f930a48eaac19a229715833fc7df0db36b1
                       d3f1f60cc930992c979fc2f7f0971cbefbf80ee2
                       f6415831e23ab897123c2a198c0deac2ed4abc12
                       7a460ecd5dbde1d88f733dfb06fd998113fc0496
                       f241b978e15606a93e365c19af178f37d729cb5e
                       7533cc99348c4964eb5a95cd04ab1dc29061105e
                       9c8d0f03b617fca3c2528b29394cd21ef459c43c
                       dfc795d4b04cc5fc7b22e6acabbeaffea70d6c95
                       e8a2c74ec0ae847b17fda668f593be538b5e3570
                       0e591cab3df15a1a61a3a71e7ab3d0c50fb4a591
                       641128227290294b799fea5558e82e0c85b4aa02
                       524c08f4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [07:59:86:9a:89:87:b0:d8:ce:19:57:ee:ca:eb:f2:4e:b7:1f:b3:f9]
            modulus: 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
    public exponent: 10001

] 
2022-06-26 04:51:29.423  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-26 04:51:29.427 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-26 04:51:29.433 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 04:51:29.434 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-26 04:51:29.435  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 04:51:29.436  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-26 04:51:29.436  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-26 04:51:29.436 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 04:51:29.437 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-26 04:51:29.437 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-26 04:51:29.446 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-26 04:51:29.448 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 04:51:29.448 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 04:51:29.448 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 04:51:29.643  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-26 04:51:29.644  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-26 04:51:29.644 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-26 04:51:29.644 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 04:51:29.647  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-26 04:51:29.647  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-26 04:51:29.648 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 04:51:29.648 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 04:51:29.648 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 04:51:29.649 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 04:51:29.649 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 04:51:29.649 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 04:51:29.650 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 04:51:29.651 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 04:51:29.651 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 04:51:29.652 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-26 04:51:29.656 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 308903450806963228644516255602566852320633396216
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 26 03:13:42 UTC 2022
           Final Date: Fri Jun 25 03:13:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [13:29:f6:c7:bc:40:d3:fd:df:6f:10:2a:59:18:89:1e:3c:e6:1a:7e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 30f9f7c59da380f83c6222bc65d29489f13b964c
                       b2b652655a665f56d702698d974073bdb23e63c0
                       cd8179b5e933b2a907d73367bb9e4720f61c84b5
                       5bc1323e761da563dcbdea6e95d543944dcc053c
                       03437a57dde80fe3205dc3eb7dc4d609d472742e
                       8b32c6aa42945a1c1688970e1ed3183eb22ceb8b
                       3baa62a82c0e3dfc221a821683192978576920b1
                       4fca96f2f809fb2e2584d56b28f631849df53081
                       81343f930a48eaac19a229715833fc7df0db36b1
                       d3f1f60cc930992c979fc2f7f0971cbefbf80ee2
                       f6415831e23ab897123c2a198c0deac2ed4abc12
                       7a460ecd5dbde1d88f733dfb06fd998113fc0496
                       f241b978e15606a93e365c19af178f37d729cb5e
                       7533cc99348c4964eb5a95cd04ab1dc29061105e
                       9c8d0f03b617fca3c2528b29394cd21ef459c43c
                       dfc795d4b04cc5fc7b22e6acabbeaffea70d6c95
                       e8a2c74ec0ae847b17fda668f593be538b5e3570
                       0e591cab3df15a1a61a3a71e7ab3d0c50fb4a591
                       641128227290294b799fea5558e82e0c85b4aa02
                       524c08f4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d5:f5:1c:87:2a:f3:71:e0:e0:91:88:53:93:d5:05:5f:39:2b:b0:48]
            modulus: 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
    public exponent: 10001

] 
2022-06-26 04:55:05.816  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-26 04:55:05.817 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-26 04:55:05.819 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 04:55:05.819 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-26 04:55:05.820  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 04:55:05.820  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-26 04:55:05.821  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-26 04:55:05.821 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 04:55:05.821 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-26 04:55:05.822 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-26 04:55:05.828 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-26 04:55:05.829 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 04:55:05.829 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 04:55:05.830 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 04:55:05.982  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-26 04:55:05.983  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-26 04:55:05.984 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-26 04:55:05.984 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 04:55:05.985  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-26 04:55:05.986  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-26 04:55:05.986 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 04:55:05.987 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 04:55:05.987 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 04:55:05.988 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 04:55:05.988 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 04:55:05.988 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 04:55:05.990 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 04:55:05.990 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 04:55:05.990 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 04:55:05.991 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-26 04:55:05.995 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 308903450806963228644516255602566852320633396216
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 26 03:13:42 UTC 2022
           Final Date: Fri Jun 25 03:13:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [13:29:f6:c7:bc:40:d3:fd:df:6f:10:2a:59:18:89:1e:3c:e6:1a:7e]
            modulus: acc4d1e3e8ace15febca38b393c7d3c8fd33a4e6a05a3587e4ab699ee50f5eb1e8064e6a4feca196f286e9e9434cb470b1570a4a8065981e90d03f1dc79a4e2498a15c539b9d3d75deca013ffe95211bb450a330949c928ae13d548a481662119624cf5ffe7842ee54bbbdbdf7d3d87456105ba32ae245f4c3b4932a5d66a16378beda3d61a504c76c401710e58369e39976912ed6c1b5f03bc0a9241726588db2fd16b30cc6412341ed93f152085b6d345a582642c61ccfecfd4bda2d8f5230b4f64701ac1645fa544e620ce2dc4f7ad0376fa7d7f0246de2e5b40fbd284d970b05ed92f0fd42dc32671ed5928bd6478d18cc4394175a5b996fa961cab2bb72eeaa301da08eaa604b7969fdae1c136095ac711708886c30d7de3c85aa2bcf05947e58099ba45309cde8688f6747629cc9156fc5921b29c0eacf7088998cb3459db83448bad6a8ffb922beb3e6294d1be763c8a7c233090cb05697bd2960f23f472c78b1c173a5137fb9becccb257cc45cf87616818564f8cfbc9505c347e243
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 30f9f7c59da380f83c6222bc65d29489f13b964c
                       b2b652655a665f56d702698d974073bdb23e63c0
                       cd8179b5e933b2a907d73367bb9e4720f61c84b5
                       5bc1323e761da563dcbdea6e95d543944dcc053c
                       03437a57dde80fe3205dc3eb7dc4d609d472742e
                       8b32c6aa42945a1c1688970e1ed3183eb22ceb8b
                       3baa62a82c0e3dfc221a821683192978576920b1
                       4fca96f2f809fb2e2584d56b28f631849df53081
                       81343f930a48eaac19a229715833fc7df0db36b1
                       d3f1f60cc930992c979fc2f7f0971cbefbf80ee2
                       f6415831e23ab897123c2a198c0deac2ed4abc12
                       7a460ecd5dbde1d88f733dfb06fd998113fc0496
                       f241b978e15606a93e365c19af178f37d729cb5e
                       7533cc99348c4964eb5a95cd04ab1dc29061105e
                       9c8d0f03b617fca3c2528b29394cd21ef459c43c
                       dfc795d4b04cc5fc7b22e6acabbeaffea70d6c95
                       e8a2c74ec0ae847b17fda668f593be538b5e3570
                       0e591cab3df15a1a61a3a71e7ab3d0c50fb4a591
                       641128227290294b799fea5558e82e0c85b4aa02
                       524c08f4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c2:a5:e6:80:f4:f3:06:1c:86:af:81:42:6b:4b:64:88:94:33:7a:55]
            modulus: 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
    public exponent: 10001

] 
2022-06-26 04:57:05.829  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-26 04:57:05.831 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-26 04:57:05.833 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 04:57:05.833 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-26 04:57:05.834  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 04:57:05.834  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-26 04:57:05.835  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-26 04:57:05.835 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 04:57:05.835 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-26 04:57:05.836 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-26 04:57:05.840 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-26 04:57:05.841 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 04:57:05.841 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 04:57:05.841 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 04:57:06.010  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-26 04:57:06.010  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-26 04:57:06.011 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-26 04:57:06.011 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 04:57:06.013  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-26 04:57:06.013  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-26 04:57:06.014 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 04:57:06.014 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 04:57:06.014 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 04:57:06.015 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 04:57:06.015 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 04:57:06.016 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 04:57:06.016 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 04:57:06.017 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 04:57:06.017 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 04:57:06.018 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-26 04:57:06.021 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 308903450806963228644516255602566852320633396216
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 26 03:13:42 UTC 2022
           Final Date: Fri Jun 25 03:13:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [13:29:f6:c7:bc:40:d3:fd:df:6f:10:2a:59:18:89:1e:3c:e6:1a:7e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 30f9f7c59da380f83c6222bc65d29489f13b964c
                       b2b652655a665f56d702698d974073bdb23e63c0
                       cd8179b5e933b2a907d73367bb9e4720f61c84b5
                       5bc1323e761da563dcbdea6e95d543944dcc053c
                       03437a57dde80fe3205dc3eb7dc4d609d472742e
                       8b32c6aa42945a1c1688970e1ed3183eb22ceb8b
                       3baa62a82c0e3dfc221a821683192978576920b1
                       4fca96f2f809fb2e2584d56b28f631849df53081
                       81343f930a48eaac19a229715833fc7df0db36b1
                       d3f1f60cc930992c979fc2f7f0971cbefbf80ee2
                       f6415831e23ab897123c2a198c0deac2ed4abc12
                       7a460ecd5dbde1d88f733dfb06fd998113fc0496
                       f241b978e15606a93e365c19af178f37d729cb5e
                       7533cc99348c4964eb5a95cd04ab1dc29061105e
                       9c8d0f03b617fca3c2528b29394cd21ef459c43c
                       dfc795d4b04cc5fc7b22e6acabbeaffea70d6c95
                       e8a2c74ec0ae847b17fda668f593be538b5e3570
                       0e591cab3df15a1a61a3a71e7ab3d0c50fb4a591
                       641128227290294b799fea5558e82e0c85b4aa02
                       524c08f4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c1:0b:16:7c:2f:7b:05:a9:06:83:53:ab:6b:d4:6d:73:36:30:2e:de]
            modulus: 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
    public exponent: 10001

] 
2022-06-26 04:59:23.663  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-26 04:59:23.666 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-26 04:59:23.672 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 04:59:23.673 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-26 04:59:23.674  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 04:59:23.675  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-26 04:59:23.675  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-26 04:59:23.676 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 04:59:23.676 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-26 04:59:23.676 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-26 04:59:23.682 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-26 04:59:23.683 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 04:59:23.684 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 04:59:23.684 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 04:59:23.925  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-26 04:59:23.926  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-26 04:59:23.926 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-26 04:59:23.926 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 04:59:23.928  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-26 04:59:23.928  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-26 04:59:23.929 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 04:59:23.929 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 04:59:23.929 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 04:59:23.930 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 04:59:23.930 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 04:59:23.930 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 04:59:23.931 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 04:59:23.931 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 04:59:23.931 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 04:59:23.932 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-26 04:59:23.935 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 308903450806963228644516255602566852320633396216
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 26 03:13:42 UTC 2022
           Final Date: Fri Jun 25 03:13:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [13:29:f6:c7:bc:40:d3:fd:df:6f:10:2a:59:18:89:1e:3c:e6:1a:7e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 30f9f7c59da380f83c6222bc65d29489f13b964c
                       b2b652655a665f56d702698d974073bdb23e63c0
                       cd8179b5e933b2a907d73367bb9e4720f61c84b5
                       5bc1323e761da563dcbdea6e95d543944dcc053c
                       03437a57dde80fe3205dc3eb7dc4d609d472742e
                       8b32c6aa42945a1c1688970e1ed3183eb22ceb8b
                       3baa62a82c0e3dfc221a821683192978576920b1
                       4fca96f2f809fb2e2584d56b28f631849df53081
                       81343f930a48eaac19a229715833fc7df0db36b1
                       d3f1f60cc930992c979fc2f7f0971cbefbf80ee2
                       f6415831e23ab897123c2a198c0deac2ed4abc12
                       7a460ecd5dbde1d88f733dfb06fd998113fc0496
                       f241b978e15606a93e365c19af178f37d729cb5e
                       7533cc99348c4964eb5a95cd04ab1dc29061105e
                       9c8d0f03b617fca3c2528b29394cd21ef459c43c
                       dfc795d4b04cc5fc7b22e6acabbeaffea70d6c95
                       e8a2c74ec0ae847b17fda668f593be538b5e3570
                       0e591cab3df15a1a61a3a71e7ab3d0c50fb4a591
                       641128227290294b799fea5558e82e0c85b4aa02
                       524c08f4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a4:63:ad:32:d7:46:d9:44:9f:4a:20:be:7a:5e:1b:7c:08:6b:82:7e]
            modulus: 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
    public exponent: 10001

] 
2022-06-26 05:03:33.825  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-26 05:03:33.828 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-26 05:03:33.831 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 05:03:33.832 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-26 05:03:33.832  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 05:03:33.833  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-26 05:03:33.834  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-26 05:03:33.834 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 05:03:33.835 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-26 05:03:33.835 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-26 05:03:33.842 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-26 05:03:33.843 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 05:03:33.843 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 05:03:33.843 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 05:03:34.029  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-26 05:03:34.030  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-26 05:03:34.030 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-26 05:03:34.031 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 05:03:34.032  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-26 05:03:34.033  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-26 05:03:34.033 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 05:03:34.033 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 05:03:34.034 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 05:03:34.034 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 05:03:34.035 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 05:03:34.035 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 05:03:34.035 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 05:03:34.036 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 05:03:34.036 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 05:03:34.037 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-26 05:03:34.041 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 308903450806963228644516255602566852320633396216
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 26 03:13:42 UTC 2022
           Final Date: Fri Jun 25 03:13:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [13:29:f6:c7:bc:40:d3:fd:df:6f:10:2a:59:18:89:1e:3c:e6:1a:7e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 30f9f7c59da380f83c6222bc65d29489f13b964c
                       b2b652655a665f56d702698d974073bdb23e63c0
                       cd8179b5e933b2a907d73367bb9e4720f61c84b5
                       5bc1323e761da563dcbdea6e95d543944dcc053c
                       03437a57dde80fe3205dc3eb7dc4d609d472742e
                       8b32c6aa42945a1c1688970e1ed3183eb22ceb8b
                       3baa62a82c0e3dfc221a821683192978576920b1
                       4fca96f2f809fb2e2584d56b28f631849df53081
                       81343f930a48eaac19a229715833fc7df0db36b1
                       d3f1f60cc930992c979fc2f7f0971cbefbf80ee2
                       f6415831e23ab897123c2a198c0deac2ed4abc12
                       7a460ecd5dbde1d88f733dfb06fd998113fc0496
                       f241b978e15606a93e365c19af178f37d729cb5e
                       7533cc99348c4964eb5a95cd04ab1dc29061105e
                       9c8d0f03b617fca3c2528b29394cd21ef459c43c
                       dfc795d4b04cc5fc7b22e6acabbeaffea70d6c95
                       e8a2c74ec0ae847b17fda668f593be538b5e3570
                       0e591cab3df15a1a61a3a71e7ab3d0c50fb4a591
                       641128227290294b799fea5558e82e0c85b4aa02
                       524c08f4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8f:1f:54:2a:6d:4c:ac:66:f4:80:7f:91:05:83:ec:af:ef:6b:95:e9]
            modulus: b67a2047caa0ceb4ea73638d3583db9f2edf33d74865ce7f65e116ea4ef4f99df6c92f269d402d4b597f024a42b878c838ae7e2a37a1be81b8312974ea3cb60f70a2ca0e706cbaa738053b0a2dcd52c3923a5b44c2098bc37e7210eef4f2fe9608222c6a760cd8d7098328e558405f936a3cbe9630747b72319c9b2dee336f5600e7565210316ad12454378f54d13d16c039df19541fe7343fd9fbfcf9ad95c310e509e3bbcad72fa34d3806952fb6dd4d0c35f456a24f6e7dcdff7b69825abd938a231bcc0ca991b678e02706888bb5d81b3c34e77057cccbe5e6f09aadbec03b1c01ce6e31d8a698e74b7a6ca8e18230baea4f681a9193072882e8a8c0b71b
    public exponent: 10001

] 
2022-06-26 05:06:55.292  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-26 05:06:55.293 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-26 05:06:55.295 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-26 05:06:55.295 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-26 05:06:55.296  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-26 05:06:55.297  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-26 05:06:55.297  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-26 05:06:55.298 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 05:06:55.298 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-26 05:06:55.298 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-26 05:06:55.303 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-26 05:06:55.304 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 05:06:55.304 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 05:06:55.304 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 05:06:55.476  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-26 05:06:55.477  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-26 05:06:55.477 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-26 05:06:55.477 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 05:06:55.479  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-26 05:06:55.479  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-26 05:06:55.480 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 05:06:55.480 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 05:06:55.480 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 05:06:55.481 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 05:06:55.481 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 05:06:55.482 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 05:06:55.482 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 05:06:55.483 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 05:06:55.483 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 05:06:55.484 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-26 05:06:55.488 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 308903450806963228644516255602566852320633396216
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 26 03:13:42 UTC 2022
           Final Date: Fri Jun 25 03:13:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [13:29:f6:c7:bc:40:d3:fd:df:6f:10:2a:59:18:89:1e:3c:e6:1a:7e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 30f9f7c59da380f83c6222bc65d29489f13b964c
                       b2b652655a665f56d702698d974073bdb23e63c0
                       cd8179b5e933b2a907d73367bb9e4720f61c84b5
                       5bc1323e761da563dcbdea6e95d543944dcc053c
                       03437a57dde80fe3205dc3eb7dc4d609d472742e
                       8b32c6aa42945a1c1688970e1ed3183eb22ceb8b
                       3baa62a82c0e3dfc221a821683192978576920b1
                       4fca96f2f809fb2e2584d56b28f631849df53081
                       81343f930a48eaac19a229715833fc7df0db36b1
                       d3f1f60cc930992c979fc2f7f0971cbefbf80ee2
                       f6415831e23ab897123c2a198c0deac2ed4abc12
                       7a460ecd5dbde1d88f733dfb06fd998113fc0496
                       f241b978e15606a93e365c19af178f37d729cb5e
                       7533cc99348c4964eb5a95cd04ab1dc29061105e
                       9c8d0f03b617fca3c2528b29394cd21ef459c43c
                       dfc795d4b04cc5fc7b22e6acabbeaffea70d6c95
                       e8a2c74ec0ae847b17fda668f593be538b5e3570
                       0e591cab3df15a1a61a3a71e7ab3d0c50fb4a591
                       641128227290294b799fea5558e82e0c85b4aa02
                       524c08f4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [12:b4:c5:a3:e9:c7:c8:bd:57:63:93:5c:da:94:33:54:fe:28:e1:04]
            modulus: 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
    public exponent: 10001

] 
2022-06-26 05:07:55.097  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-26 05:07:55.098 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-26 05:07:55.100 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 05:07:55.101 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-26 05:07:55.101  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 05:07:55.102  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-26 05:07:55.103  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-26 05:07:55.103 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 05:07:55.103 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-26 05:07:55.104 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-26 05:07:55.109 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-26 05:07:55.109 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 05:07:55.110 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 05:07:55.110 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 05:07:55.250  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-26 05:07:55.251  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-26 05:07:55.252 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-26 05:07:55.252 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 05:07:55.253  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-26 05:07:55.253  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-26 05:07:55.254 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 05:07:55.254 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 05:07:55.255 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 05:07:55.255 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 05:07:55.256 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 05:07:55.256 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 05:07:55.257 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 05:07:55.257 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 05:07:55.258 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 05:07:55.258 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-26 05:07:55.261 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 308903450806963228644516255602566852320633396216
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 26 03:13:42 UTC 2022
           Final Date: Fri Jun 25 03:13:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [13:29:f6:c7:bc:40:d3:fd:df:6f:10:2a:59:18:89:1e:3c:e6:1a:7e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 30f9f7c59da380f83c6222bc65d29489f13b964c
                       b2b652655a665f56d702698d974073bdb23e63c0
                       cd8179b5e933b2a907d73367bb9e4720f61c84b5
                       5bc1323e761da563dcbdea6e95d543944dcc053c
                       03437a57dde80fe3205dc3eb7dc4d609d472742e
                       8b32c6aa42945a1c1688970e1ed3183eb22ceb8b
                       3baa62a82c0e3dfc221a821683192978576920b1
                       4fca96f2f809fb2e2584d56b28f631849df53081
                       81343f930a48eaac19a229715833fc7df0db36b1
                       d3f1f60cc930992c979fc2f7f0971cbefbf80ee2
                       f6415831e23ab897123c2a198c0deac2ed4abc12
                       7a460ecd5dbde1d88f733dfb06fd998113fc0496
                       f241b978e15606a93e365c19af178f37d729cb5e
                       7533cc99348c4964eb5a95cd04ab1dc29061105e
                       9c8d0f03b617fca3c2528b29394cd21ef459c43c
                       dfc795d4b04cc5fc7b22e6acabbeaffea70d6c95
                       e8a2c74ec0ae847b17fda668f593be538b5e3570
                       0e591cab3df15a1a61a3a71e7ab3d0c50fb4a591
                       641128227290294b799fea5558e82e0c85b4aa02
                       524c08f4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [17:02:dc:6e:05:43:5e:35:4f:a2:82:39:9f:68:82:40:c3:77:09:81]
            modulus: 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
    public exponent: 10001

] 
2022-06-26 05:13:15.766  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-26 05:13:15.769 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-26 05:13:15.772 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 05:13:15.773 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-26 05:13:15.773  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 05:13:15.774  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-26 05:13:15.774  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-26 05:13:15.775 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 05:13:15.775 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-26 05:13:15.775 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-26 05:13:15.781 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-26 05:13:15.782 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 05:13:15.782 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 05:13:15.782 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 05:13:16.075  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-26 05:13:16.076  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-26 05:13:16.076 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-26 05:13:16.077 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 05:13:16.078  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-26 05:13:16.079  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-26 05:13:16.079 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 05:13:16.080 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 05:13:16.080 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 05:13:16.080 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 05:13:16.081 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 05:13:16.081 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 05:13:16.082 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 05:13:16.082 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 05:13:16.083 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 05:13:16.083 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-26 05:13:16.088 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 308903450806963228644516255602566852320633396216
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 26 03:13:42 UTC 2022
           Final Date: Fri Jun 25 03:13:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [13:29:f6:c7:bc:40:d3:fd:df:6f:10:2a:59:18:89:1e:3c:e6:1a:7e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 30f9f7c59da380f83c6222bc65d29489f13b964c
                       b2b652655a665f56d702698d974073bdb23e63c0
                       cd8179b5e933b2a907d73367bb9e4720f61c84b5
                       5bc1323e761da563dcbdea6e95d543944dcc053c
                       03437a57dde80fe3205dc3eb7dc4d609d472742e
                       8b32c6aa42945a1c1688970e1ed3183eb22ceb8b
                       3baa62a82c0e3dfc221a821683192978576920b1
                       4fca96f2f809fb2e2584d56b28f631849df53081
                       81343f930a48eaac19a229715833fc7df0db36b1
                       d3f1f60cc930992c979fc2f7f0971cbefbf80ee2
                       f6415831e23ab897123c2a198c0deac2ed4abc12
                       7a460ecd5dbde1d88f733dfb06fd998113fc0496
                       f241b978e15606a93e365c19af178f37d729cb5e
                       7533cc99348c4964eb5a95cd04ab1dc29061105e
                       9c8d0f03b617fca3c2528b29394cd21ef459c43c
                       dfc795d4b04cc5fc7b22e6acabbeaffea70d6c95
                       e8a2c74ec0ae847b17fda668f593be538b5e3570
                       0e591cab3df15a1a61a3a71e7ab3d0c50fb4a591
                       641128227290294b799fea5558e82e0c85b4aa02
                       524c08f4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [87:74:25:20:98:4f:57:8c:1b:87:67:1b:f1:9a:a0:b4:31:0a:10:c5]
            modulus: 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
    public exponent: 10001

] 
2022-06-26 05:13:50.114  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-26 05:13:50.115 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-26 05:13:50.116 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-26 05:13:50.117 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-26 05:13:50.117  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-26 05:13:50.117  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-26 05:13:50.118  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-26 05:13:50.118 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 05:13:50.118 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-26 05:13:50.119 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-26 05:13:50.124 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-26 05:13:50.124 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 05:13:50.124 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 05:13:50.124 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 05:13:50.309  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-26 05:13:50.310  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-26 05:13:50.310 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-26 05:13:50.310 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 05:13:50.311  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-26 05:13:50.312  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-26 05:13:50.312 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 05:13:50.312 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 05:13:50.313 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 05:13:50.313 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 05:13:50.313 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 05:13:50.314 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 05:13:50.314 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 05:13:50.314 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 05:13:50.314 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 05:13:50.315 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-26 05:13:50.318 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 308903450806963228644516255602566852320633396216
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 26 03:13:42 UTC 2022
           Final Date: Fri Jun 25 03:13:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [13:29:f6:c7:bc:40:d3:fd:df:6f:10:2a:59:18:89:1e:3c:e6:1a:7e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 30f9f7c59da380f83c6222bc65d29489f13b964c
                       b2b652655a665f56d702698d974073bdb23e63c0
                       cd8179b5e933b2a907d73367bb9e4720f61c84b5
                       5bc1323e761da563dcbdea6e95d543944dcc053c
                       03437a57dde80fe3205dc3eb7dc4d609d472742e
                       8b32c6aa42945a1c1688970e1ed3183eb22ceb8b
                       3baa62a82c0e3dfc221a821683192978576920b1
                       4fca96f2f809fb2e2584d56b28f631849df53081
                       81343f930a48eaac19a229715833fc7df0db36b1
                       d3f1f60cc930992c979fc2f7f0971cbefbf80ee2
                       f6415831e23ab897123c2a198c0deac2ed4abc12
                       7a460ecd5dbde1d88f733dfb06fd998113fc0496
                       f241b978e15606a93e365c19af178f37d729cb5e
                       7533cc99348c4964eb5a95cd04ab1dc29061105e
                       9c8d0f03b617fca3c2528b29394cd21ef459c43c
                       dfc795d4b04cc5fc7b22e6acabbeaffea70d6c95
                       e8a2c74ec0ae847b17fda668f593be538b5e3570
                       0e591cab3df15a1a61a3a71e7ab3d0c50fb4a591
                       641128227290294b799fea5558e82e0c85b4aa02
                       524c08f4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e8:ea:23:84:30:ae:1c:6d:0f:b6:72:1f:67:d5:18:38:05:09:d4:32]
            modulus: ca6d06a4ceb5d3247f6b0cd0c1a4913f20922d500e125551b8a5d07e3c882873b923483dcee73129e1c7d0c356ba429fde1a28e68c92dda0f16ec7be9506f3dd48bbb02d723c304bf66f334846093665431156acc4959038d99209a516abefa3419156edfda36a650bc866b1a6c43fa563817867cdea4cf6ac8c7887ac68718aa13847ec11bcd9dfc8ed12a7e75c0334367ea30880b9dd4306fe16865b14a119db84113a2fa344d5f72a5ff43ec4e0c229b87c5cb0e7e7fdaae5b0d56eb1ca52734220ae1de68efc1119590db69f9d92e8e9f9da3e7a458df217db3e9a5f1199ebffabedcdbfbad623d1b25bf505f2563c8fad82a2254ca4d54d199b699221bd
    public exponent: 10001

] 
2022-06-26 05:14:09.629  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-26 05:14:09.630 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-26 05:14:09.632 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-26 05:14:09.632 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-26 05:14:09.633  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-26 05:14:09.633  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-26 05:14:09.633  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-26 05:14:09.634 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 05:14:09.634 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-26 05:14:09.635 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-26 05:14:09.639 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-26 05:14:09.640 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 05:14:09.640 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 05:14:09.640 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 05:14:10.400  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-26 05:14:10.400  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-26 05:14:10.401 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-26 05:14:10.401 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 05:14:10.402  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-26 05:14:10.402  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-26 05:14:10.403 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 05:14:10.403 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 05:14:10.403 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 05:14:10.404 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 05:14:10.404 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 05:14:10.404 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 05:14:10.405 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 05:14:10.405 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 05:14:10.405 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 05:14:10.407 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-26 05:14:10.411 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 308903450806963228644516255602566852320633396216
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 26 03:13:42 UTC 2022
           Final Date: Fri Jun 25 03:13:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [13:29:f6:c7:bc:40:d3:fd:df:6f:10:2a:59:18:89:1e:3c:e6:1a:7e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 30f9f7c59da380f83c6222bc65d29489f13b964c
                       b2b652655a665f56d702698d974073bdb23e63c0
                       cd8179b5e933b2a907d73367bb9e4720f61c84b5
                       5bc1323e761da563dcbdea6e95d543944dcc053c
                       03437a57dde80fe3205dc3eb7dc4d609d472742e
                       8b32c6aa42945a1c1688970e1ed3183eb22ceb8b
                       3baa62a82c0e3dfc221a821683192978576920b1
                       4fca96f2f809fb2e2584d56b28f631849df53081
                       81343f930a48eaac19a229715833fc7df0db36b1
                       d3f1f60cc930992c979fc2f7f0971cbefbf80ee2
                       f6415831e23ab897123c2a198c0deac2ed4abc12
                       7a460ecd5dbde1d88f733dfb06fd998113fc0496
                       f241b978e15606a93e365c19af178f37d729cb5e
                       7533cc99348c4964eb5a95cd04ab1dc29061105e
                       9c8d0f03b617fca3c2528b29394cd21ef459c43c
                       dfc795d4b04cc5fc7b22e6acabbeaffea70d6c95
                       e8a2c74ec0ae847b17fda668f593be538b5e3570
                       0e591cab3df15a1a61a3a71e7ab3d0c50fb4a591
                       641128227290294b799fea5558e82e0c85b4aa02
                       524c08f4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [dd:a2:88:2a:da:a5:7a:24:23:d8:ad:39:ae:23:36:33:9b:c6:d3:cf]
            modulus: 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
    public exponent: 10001

] 
2022-06-26 05:18:22.661  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-26 05:18:22.662 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-26 05:18:22.664 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 05:18:22.665 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-26 05:18:22.666  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 05:18:22.666  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-26 05:18:22.667  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-26 05:18:22.667 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 05:18:22.668 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-26 05:18:22.668 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-26 05:18:22.673 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-26 05:18:22.674 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 05:18:22.674 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 05:18:22.675 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 05:18:22.906  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-26 05:18:22.907  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-26 05:18:22.908 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-26 05:18:22.908 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 05:18:22.909  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-26 05:18:22.909  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-26 05:18:22.910 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 05:18:22.910 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 05:18:22.910 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 05:18:22.911 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 05:18:22.911 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 05:18:22.911 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 05:18:22.912 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 05:18:22.912 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 05:18:22.912 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 05:18:22.913 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-26 05:18:22.916 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 308903450806963228644516255602566852320633396216
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 26 03:13:42 UTC 2022
           Final Date: Fri Jun 25 03:13:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [13:29:f6:c7:bc:40:d3:fd:df:6f:10:2a:59:18:89:1e:3c:e6:1a:7e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 30f9f7c59da380f83c6222bc65d29489f13b964c
                       b2b652655a665f56d702698d974073bdb23e63c0
                       cd8179b5e933b2a907d73367bb9e4720f61c84b5
                       5bc1323e761da563dcbdea6e95d543944dcc053c
                       03437a57dde80fe3205dc3eb7dc4d609d472742e
                       8b32c6aa42945a1c1688970e1ed3183eb22ceb8b
                       3baa62a82c0e3dfc221a821683192978576920b1
                       4fca96f2f809fb2e2584d56b28f631849df53081
                       81343f930a48eaac19a229715833fc7df0db36b1
                       d3f1f60cc930992c979fc2f7f0971cbefbf80ee2
                       f6415831e23ab897123c2a198c0deac2ed4abc12
                       7a460ecd5dbde1d88f733dfb06fd998113fc0496
                       f241b978e15606a93e365c19af178f37d729cb5e
                       7533cc99348c4964eb5a95cd04ab1dc29061105e
                       9c8d0f03b617fca3c2528b29394cd21ef459c43c
                       dfc795d4b04cc5fc7b22e6acabbeaffea70d6c95
                       e8a2c74ec0ae847b17fda668f593be538b5e3570
                       0e591cab3df15a1a61a3a71e7ab3d0c50fb4a591
                       641128227290294b799fea5558e82e0c85b4aa02
                       524c08f4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [07:40:d8:ff:08:ef:6c:6f:1f:c1:f9:0a:cd:35:66:af:8b:a9:50:b3]
            modulus: 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
    public exponent: 10001

] 
2022-06-26 05:22:53.447  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-26 05:22:53.449 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-26 05:22:53.452 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 05:22:53.453 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-26 05:22:53.453  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 05:22:53.454  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-26 05:22:53.454  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-26 05:22:53.455 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 05:22:53.455 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-26 05:22:53.456 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-26 05:22:53.460 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-26 05:22:53.461 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 05:22:53.462 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 05:22:53.462 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 05:22:53.668  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-26 05:22:53.669  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-26 05:22:53.670 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-26 05:22:53.670 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 05:22:53.672  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-26 05:22:53.672  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-26 05:22:53.673 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 05:22:53.673 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 05:22:53.673 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 05:22:53.674 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 05:22:53.675 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 05:22:53.675 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 05:22:53.676 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 05:22:53.676 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 05:22:53.676 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 05:22:53.678 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-26 05:22:53.683 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 308903450806963228644516255602566852320633396216
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 26 03:13:42 UTC 2022
           Final Date: Fri Jun 25 03:13:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [13:29:f6:c7:bc:40:d3:fd:df:6f:10:2a:59:18:89:1e:3c:e6:1a:7e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 30f9f7c59da380f83c6222bc65d29489f13b964c
                       b2b652655a665f56d702698d974073bdb23e63c0
                       cd8179b5e933b2a907d73367bb9e4720f61c84b5
                       5bc1323e761da563dcbdea6e95d543944dcc053c
                       03437a57dde80fe3205dc3eb7dc4d609d472742e
                       8b32c6aa42945a1c1688970e1ed3183eb22ceb8b
                       3baa62a82c0e3dfc221a821683192978576920b1
                       4fca96f2f809fb2e2584d56b28f631849df53081
                       81343f930a48eaac19a229715833fc7df0db36b1
                       d3f1f60cc930992c979fc2f7f0971cbefbf80ee2
                       f6415831e23ab897123c2a198c0deac2ed4abc12
                       7a460ecd5dbde1d88f733dfb06fd998113fc0496
                       f241b978e15606a93e365c19af178f37d729cb5e
                       7533cc99348c4964eb5a95cd04ab1dc29061105e
                       9c8d0f03b617fca3c2528b29394cd21ef459c43c
                       dfc795d4b04cc5fc7b22e6acabbeaffea70d6c95
                       e8a2c74ec0ae847b17fda668f593be538b5e3570
                       0e591cab3df15a1a61a3a71e7ab3d0c50fb4a591
                       641128227290294b799fea5558e82e0c85b4aa02
                       524c08f4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e5:97:22:32:11:f3:22:f0:a7:0e:49:28:ff:80:a2:7a:8d:5f:fc:7e]
            modulus: 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
    public exponent: 10001

] 
2022-06-26 05:31:56.465  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-26 05:31:56.466 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-26 05:31:56.468 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 05:31:56.468 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-26 05:31:56.469  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 05:31:56.469  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-26 05:31:56.469  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-26 05:31:56.470 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 05:31:56.470 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-26 05:31:56.471 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-26 05:31:56.475 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-26 05:31:56.476 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 05:31:56.476 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 05:31:56.476 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 05:31:56.659  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-26 05:31:56.660  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-26 05:31:56.660 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-26 05:31:56.660 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 05:31:56.662  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-26 05:31:56.662  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-26 05:31:56.662 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 05:31:56.662 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 05:31:56.663 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 05:31:56.663 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 05:31:56.663 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 05:31:56.664 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 05:31:56.664 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 05:31:56.664 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 05:31:56.664 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 05:31:56.665 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-26 05:31:56.668 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 308903450806963228644516255602566852320633396216
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 26 03:13:42 UTC 2022
           Final Date: Fri Jun 25 03:13:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [13:29:f6:c7:bc:40:d3:fd:df:6f:10:2a:59:18:89:1e:3c:e6:1a:7e]
            modulus: acc4d1e3e8ace15febca38b393c7d3c8fd33a4e6a05a3587e4ab699ee50f5eb1e8064e6a4feca196f286e9e9434cb470b1570a4a8065981e90d03f1dc79a4e2498a15c539b9d3d75deca013ffe95211bb450a330949c928ae13d548a481662119624cf5ffe7842ee54bbbdbdf7d3d87456105ba32ae245f4c3b4932a5d66a16378beda3d61a504c76c401710e58369e39976912ed6c1b5f03bc0a9241726588db2fd16b30cc6412341ed93f152085b6d345a582642c61ccfecfd4bda2d8f5230b4f64701ac1645fa544e620ce2dc4f7ad0376fa7d7f0246de2e5b40fbd284d970b05ed92f0fd42dc32671ed5928bd6478d18cc4394175a5b996fa961cab2bb72eeaa301da08eaa604b7969fdae1c136095ac711708886c30d7de3c85aa2bcf05947e58099ba45309cde8688f6747629cc9156fc5921b29c0eacf7088998cb3459db83448bad6a8ffb922beb3e6294d1be763c8a7c233090cb05697bd2960f23f472c78b1c173a5137fb9becccb257cc45cf87616818564f8cfbc9505c347e243
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 30f9f7c59da380f83c6222bc65d29489f13b964c
                       b2b652655a665f56d702698d974073bdb23e63c0
                       cd8179b5e933b2a907d73367bb9e4720f61c84b5
                       5bc1323e761da563dcbdea6e95d543944dcc053c
                       03437a57dde80fe3205dc3eb7dc4d609d472742e
                       8b32c6aa42945a1c1688970e1ed3183eb22ceb8b
                       3baa62a82c0e3dfc221a821683192978576920b1
                       4fca96f2f809fb2e2584d56b28f631849df53081
                       81343f930a48eaac19a229715833fc7df0db36b1
                       d3f1f60cc930992c979fc2f7f0971cbefbf80ee2
                       f6415831e23ab897123c2a198c0deac2ed4abc12
                       7a460ecd5dbde1d88f733dfb06fd998113fc0496
                       f241b978e15606a93e365c19af178f37d729cb5e
                       7533cc99348c4964eb5a95cd04ab1dc29061105e
                       9c8d0f03b617fca3c2528b29394cd21ef459c43c
                       dfc795d4b04cc5fc7b22e6acabbeaffea70d6c95
                       e8a2c74ec0ae847b17fda668f593be538b5e3570
                       0e591cab3df15a1a61a3a71e7ab3d0c50fb4a591
                       641128227290294b799fea5558e82e0c85b4aa02
                       524c08f4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2a:7e:40:c6:d2:31:63:ef:a8:8c:ee:9b:c0:9e:8b:1b:09:2b:ea:b8]
            modulus: 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
    public exponent: 10001

] 
2022-06-26 05:36:58.265  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-26 05:36:58.267 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-26 05:36:58.269 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 05:36:58.269 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-26 05:36:58.270  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-26 05:36:58.271  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-26 05:36:58.271  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-26 05:36:58.271 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-26 05:36:58.272 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-26 05:36:58.272 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-26 05:36:58.277 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-26 05:36:58.279 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 05:36:58.279 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-26 05:36:58.279 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 05:36:58.489  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-26 05:36:58.490  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-26 05:36:58.490 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-26 05:36:58.490 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-26 05:36:58.492  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-26 05:36:58.492  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-26 05:36:58.492 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 05:36:58.493 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 05:36:58.493 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 05:36:58.493 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 05:36:58.494 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 05:36:58.494 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 05:36:58.494 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-26 05:36:58.495 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-26 05:36:58.495 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-26 05:36:58.496 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-26 05:36:58.499 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 308903450806963228644516255602566852320633396216
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jun 26 03:13:42 UTC 2022
           Final Date: Fri Jun 25 03:13:41 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [13:29:f6:c7:bc:40:d3:fd:df:6f:10:2a:59:18:89:1e:3c:e6:1a:7e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 30f9f7c59da380f83c6222bc65d29489f13b964c
                       b2b652655a665f56d702698d974073bdb23e63c0
                       cd8179b5e933b2a907d73367bb9e4720f61c84b5
                       5bc1323e761da563dcbdea6e95d543944dcc053c
                       03437a57dde80fe3205dc3eb7dc4d609d472742e
                       8b32c6aa42945a1c1688970e1ed3183eb22ceb8b
                       3baa62a82c0e3dfc221a821683192978576920b1
                       4fca96f2f809fb2e2584d56b28f631849df53081
                       81343f930a48eaac19a229715833fc7df0db36b1
                       d3f1f60cc930992c979fc2f7f0971cbefbf80ee2
                       f6415831e23ab897123c2a198c0deac2ed4abc12
                       7a460ecd5dbde1d88f733dfb06fd998113fc0496
                       f241b978e15606a93e365c19af178f37d729cb5e
                       7533cc99348c4964eb5a95cd04ab1dc29061105e
                       9c8d0f03b617fca3c2528b29394cd21ef459c43c
                       dfc795d4b04cc5fc7b22e6acabbeaffea70d6c95
                       e8a2c74ec0ae847b17fda668f593be538b5e3570
                       0e591cab3df15a1a61a3a71e7ab3d0c50fb4a591
                       641128227290294b799fea5558e82e0c85b4aa02
                       524c08f4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fc:a0:65:8c:64:60:7f:b7:10:a8:33:55:72:ca:00:e4:84:0d:d9:76]
            modulus: d4203b93510a81fb94bb895efc06d29f63e020eee36b1be89c148a03f69da4e43d2ad3620a5b97e0f3494d36fac8268689f289d16db3d220c68555a83530bde0ea701163f87df223faf0d9cf2124c5b8955d80cb082f4fbc797620b676996d14b128107025bcb2feddba493e68ceb47ef5b2820734051aa55d221ac2da32c0a899a63e4a42f32078576f2071dd855f8d887db19097464a4bc740af53cb6bb1b9119d67146022a07dd0a290d057ec4ce5d97850efc355165019377f1c43d175e5ee1ade5f806053462d177be7dab11adb540b393a454285a428555a3ac3b046bfec6be6dfa7fb3acd8f9adfddabbc369cf6bc8e4c5b539f773e9504ca54a59c83
    public exponent: 10001

]