Results

By type

          2022-06-27 04:42:46,210 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-06-27 04:42:47,840 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-06-27 04:42:49.133  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jun 27, 2022 4:42:52 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jun 27, 2022 4:42:52 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 27, 2022 4:42:52 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jun 27, 2022 4:42:52 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-06-27 04:42:53.295 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-06-27 04:42:53.710  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-06-27 04:42:53.978  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-06-27 04:42:55.014 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-06-27 04:42:55.017 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-06-27 04:42:55.019 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-06-27 04:42:55.027 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-06-27 04:42:55.082 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-06-27 04:42:55.088 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-06-27 04:42:55.283 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-06-27 04:42:56.233 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jun 27, 2022 4:42:57 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-06-27 04:42:57.745  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 12.948 seconds (JVM running for 15.981)
Jun 27, 2022 4:43:12 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-06-27 04:43:44.797  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-27 04:43:44.810 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-27 04:43:44.871 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-27 04:43:44.877 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-27 04:43:44.907  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-27 04:43:44.911  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-27 04:43:44.913  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-27 04:43:44.915 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-27 04:43:44.916 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 04:43:44.922 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-27 04:43:44.930 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-27 04:43:44.934 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-27 04:43:44.994 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-27 04:43:45.001 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 04:43:45.002 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 04:43:45.010 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 04:43:45.807  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-27 04:43:45.811  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-27 04:43:45.812 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-27 04:43:45.814 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 04:43:45.830  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-27 04:43:45.831  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-27 04:43:45.833 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 04:43:45.834 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 04:43:45.835 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 04:43:45.866 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 04:43:45.867 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 04:43:45.868 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 04:43:45.880 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 04:43:45.881 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 04:43:45.881 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 04:43:45.891 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-27 04:43:45.937 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 517788084044124988646161479176244775649986218346
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 27 04:40:10 UTC 2022
           Final Date: Sat Jun 26 04:40:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [71:f7:41:21:ba:9e:28:18:00:d7:c0:c0:b3:0f:6b:14:c7:48:07:e4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: cd1aea153f8c561d6c240efbec685adafd719e84
                       22787506539fd54a26e5e089460286f769b42831
                       c08dda3ac668acd9208f52e5266eddc26ac383a1
                       4fbeb621dd7f83b6ffedaa9bc9aae09af50f6185
                       e24b3c9849ebb34c9e785e1c090ed83524ca5d45
                       dc32468da896d9ecb30e8c913cfd901b2cd46a99
                       d517f51470b00345f0624364085ebf348b683536
                       42b79e8fc995746a96fa1c3fe21aa67cfb0821a4
                       4ca7f1fb229b33757ff0bcbcc0d92f70bfda16cd
                       02dfb4bbcc556ab43420ad7b92e755265bdcd05d
                       aeee35fa6abed3b8ef3505aa35383977f415996b
                       2124f6063e70f509f582a737291a7c49066cbcd0
                       6768a0c805c9006b553593df9d4722a24dd4ea29
                       735c5b4648212db59095210e61fbc37a0a7a6153
                       216a33c860d8abc0e6569720a1a5fb5cee8df029
                       9ff57fca36cfff9b8aab8ddbe6ee0167d46c822b
                       bd23ae57cf0e7e5e96a07900500d495c96f974aa
                       db8f13f6091f4177ce3dc4744750bed8a712d3e2
                       d5d17d470faf02ead54a8ed5ca7edf06952766b5
                       aa0978dc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [73:70:44:3a:28:c6:c9:05:0e:e8:c9:ac:25:bc:d3:a1:83:c9:ae:4c]
            modulus: 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
    public exponent: 10001

] 
2022-06-27 06:07:57.533  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-27 06:07:57.536 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-27 06:07:57.544 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-27 06:07:57.549 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-27 06:07:57.550  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-27 06:07:57.551  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-27 06:07:57.552  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-27 06:07:57.553 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-27 06:07:57.554 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-27 06:07:57.556 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-27 06:07:57.568 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-27 06:07:57.571 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 06:07:57.572 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 06:07:57.573 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 06:07:57.779  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-27 06:07:57.780  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-27 06:07:57.780 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-27 06:07:57.781 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 06:07:57.786  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-27 06:07:57.787  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-27 06:07:57.787 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:07:57.788 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:07:57.788 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:07:57.790 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:07:57.791 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:07:57.796 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:07:57.798 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:07:57.799 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:07:57.800 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:07:57.802 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-27 06:07:57.832 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 517788084044124988646161479176244775649986218346
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 27 04:40:10 UTC 2022
           Final Date: Sat Jun 26 04:40:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [71:f7:41:21:ba:9e:28:18:00:d7:c0:c0:b3:0f:6b:14:c7:48:07:e4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: cd1aea153f8c561d6c240efbec685adafd719e84
                       22787506539fd54a26e5e089460286f769b42831
                       c08dda3ac668acd9208f52e5266eddc26ac383a1
                       4fbeb621dd7f83b6ffedaa9bc9aae09af50f6185
                       e24b3c9849ebb34c9e785e1c090ed83524ca5d45
                       dc32468da896d9ecb30e8c913cfd901b2cd46a99
                       d517f51470b00345f0624364085ebf348b683536
                       42b79e8fc995746a96fa1c3fe21aa67cfb0821a4
                       4ca7f1fb229b33757ff0bcbcc0d92f70bfda16cd
                       02dfb4bbcc556ab43420ad7b92e755265bdcd05d
                       aeee35fa6abed3b8ef3505aa35383977f415996b
                       2124f6063e70f509f582a737291a7c49066cbcd0
                       6768a0c805c9006b553593df9d4722a24dd4ea29
                       735c5b4648212db59095210e61fbc37a0a7a6153
                       216a33c860d8abc0e6569720a1a5fb5cee8df029
                       9ff57fca36cfff9b8aab8ddbe6ee0167d46c822b
                       bd23ae57cf0e7e5e96a07900500d495c96f974aa
                       db8f13f6091f4177ce3dc4744750bed8a712d3e2
                       d5d17d470faf02ead54a8ed5ca7edf06952766b5
                       aa0978dc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [14:25:13:74:ac:de:66:c4:f8:ae:80:c4:54:61:ba:54:6d:7e:dd:a8]
            modulus: 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
    public exponent: 10001

] 
2022-06-27 06:09:45.701  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-27 06:09:45.705 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-27 06:09:45.710 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-27 06:09:45.712 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-27 06:09:45.713  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-27 06:09:45.714  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-27 06:09:45.715  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-27 06:09:45.716 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-27 06:09:45.717 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-27 06:09:45.718 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-27 06:09:45.730 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-27 06:09:45.731 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 06:09:45.732 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 06:09:45.732 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 06:09:45.926  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-27 06:09:45.928  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-27 06:09:45.929 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-27 06:09:45.929 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 06:09:45.937  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-27 06:09:45.938  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-27 06:09:45.939 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:09:45.940 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:09:45.941 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:09:45.943 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:09:45.944 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:09:45.946 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:09:45.948 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:09:45.949 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:09:45.949 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:09:45.951 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-27 06:09:45.959 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 517788084044124988646161479176244775649986218346
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 27 04:40:10 UTC 2022
           Final Date: Sat Jun 26 04:40:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [71:f7:41:21:ba:9e:28:18:00:d7:c0:c0:b3:0f:6b:14:c7:48:07:e4]
            modulus: d5865913ecf416c1bfdede5a1684cd676e22b847479c80ccc540af0e78d1a767eebba02d3c8d568072a0958bf5ecbc6f39cbdee7d1598e4546196898760d728b415a3a4cb6e785fed8ddb7c4be99b2fb1bb99e4352c3992483df934ac3fb0347a991d0f11b1da7a6aed734d969243b4b638a974f09872b48203b90fee01d1f55da82f26f2d4c442761cecf5065f06ff7ae2a6d4222200928dac0eeae941d15ff6cd24091ba35718f4010a0a23e4f9a350116d9660cea58cacf15a91b41040442c0300d75dfd24c4e52ec51a69852b6983dd49dbfe8ebf0b4863d0e7d4ddd0ae421e10457e0837ef7d9be328e3412efec09df62f589f2889737a7284d094ff54dc2782dc75686741f2d6cee9438c059c0c18568e4bdbbc73a4827db52d5cd0541e0fb3a590c18711c57b476140fc6ce2e3949e3df46e6475147587adc25b2241ef012a531c467e047b973064058f030fe87b49c746378524b7e9cfb8ec5a03888f57287a44f08f658141eb323e29f11e3d8ab84c388f9b5a730597bd90582d4eb
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: cd1aea153f8c561d6c240efbec685adafd719e84
                       22787506539fd54a26e5e089460286f769b42831
                       c08dda3ac668acd9208f52e5266eddc26ac383a1
                       4fbeb621dd7f83b6ffedaa9bc9aae09af50f6185
                       e24b3c9849ebb34c9e785e1c090ed83524ca5d45
                       dc32468da896d9ecb30e8c913cfd901b2cd46a99
                       d517f51470b00345f0624364085ebf348b683536
                       42b79e8fc995746a96fa1c3fe21aa67cfb0821a4
                       4ca7f1fb229b33757ff0bcbcc0d92f70bfda16cd
                       02dfb4bbcc556ab43420ad7b92e755265bdcd05d
                       aeee35fa6abed3b8ef3505aa35383977f415996b
                       2124f6063e70f509f582a737291a7c49066cbcd0
                       6768a0c805c9006b553593df9d4722a24dd4ea29
                       735c5b4648212db59095210e61fbc37a0a7a6153
                       216a33c860d8abc0e6569720a1a5fb5cee8df029
                       9ff57fca36cfff9b8aab8ddbe6ee0167d46c822b
                       bd23ae57cf0e7e5e96a07900500d495c96f974aa
                       db8f13f6091f4177ce3dc4744750bed8a712d3e2
                       d5d17d470faf02ead54a8ed5ca7edf06952766b5
                       aa0978dc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c4:e2:48:f5:4b:3e:6a:12:27:7e:2f:69:30:1d:26:35:a0:d0:c0:7d]
            modulus: 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
    public exponent: 10001

] 
2022-06-27 06:10:59.855  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-27 06:10:59.858 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-27 06:10:59.861 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-27 06:10:59.862 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-27 06:10:59.863  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-27 06:10:59.865  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-27 06:10:59.865  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-27 06:10:59.866 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-27 06:10:59.867 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-27 06:10:59.867 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-27 06:10:59.877 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-27 06:10:59.878 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 06:10:59.879 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 06:10:59.880 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 06:11:00.005  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-27 06:11:00.006  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-27 06:11:00.006 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-27 06:11:00.007 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 06:11:00.009  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-27 06:11:00.010  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-27 06:11:00.010 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:11:00.011 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:11:00.011 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:11:00.013 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:11:00.013 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:11:00.014 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:11:00.015 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:11:00.016 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:11:00.017 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:11:00.019 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-27 06:11:00.025 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 517788084044124988646161479176244775649986218346
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 27 04:40:10 UTC 2022
           Final Date: Sat Jun 26 04:40:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [71:f7:41:21:ba:9e:28:18:00:d7:c0:c0:b3:0f:6b:14:c7:48:07:e4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: cd1aea153f8c561d6c240efbec685adafd719e84
                       22787506539fd54a26e5e089460286f769b42831
                       c08dda3ac668acd9208f52e5266eddc26ac383a1
                       4fbeb621dd7f83b6ffedaa9bc9aae09af50f6185
                       e24b3c9849ebb34c9e785e1c090ed83524ca5d45
                       dc32468da896d9ecb30e8c913cfd901b2cd46a99
                       d517f51470b00345f0624364085ebf348b683536
                       42b79e8fc995746a96fa1c3fe21aa67cfb0821a4
                       4ca7f1fb229b33757ff0bcbcc0d92f70bfda16cd
                       02dfb4bbcc556ab43420ad7b92e755265bdcd05d
                       aeee35fa6abed3b8ef3505aa35383977f415996b
                       2124f6063e70f509f582a737291a7c49066cbcd0
                       6768a0c805c9006b553593df9d4722a24dd4ea29
                       735c5b4648212db59095210e61fbc37a0a7a6153
                       216a33c860d8abc0e6569720a1a5fb5cee8df029
                       9ff57fca36cfff9b8aab8ddbe6ee0167d46c822b
                       bd23ae57cf0e7e5e96a07900500d495c96f974aa
                       db8f13f6091f4177ce3dc4744750bed8a712d3e2
                       d5d17d470faf02ead54a8ed5ca7edf06952766b5
                       aa0978dc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8d:3f:67:3f:9a:0f:52:55:33:9b:94:c6:c1:82:89:12:c4:bf:ad:b2]
            modulus: 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
    public exponent: 10001

] 
2022-06-27 06:12:59.428  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-27 06:12:59.429 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-27 06:12:59.431 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-27 06:12:59.434 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-27 06:12:59.435  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-27 06:12:59.438  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-27 06:12:59.441  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-27 06:12:59.443 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-27 06:12:59.444 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-27 06:12:59.444 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-27 06:12:59.459 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-27 06:12:59.461 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 06:12:59.461 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 06:12:59.462 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 06:12:59.679  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-27 06:12:59.681  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-27 06:12:59.681 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-27 06:12:59.682 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 06:12:59.690  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-27 06:12:59.693  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-27 06:12:59.694 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:12:59.695 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:12:59.696 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:12:59.697 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:12:59.697 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:12:59.701 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:12:59.713 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:12:59.714 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:12:59.715 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:12:59.717 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-27 06:12:59.727 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 517788084044124988646161479176244775649986218346
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 27 04:40:10 UTC 2022
           Final Date: Sat Jun 26 04:40:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [71:f7:41:21:ba:9e:28:18:00:d7:c0:c0:b3:0f:6b:14:c7:48:07:e4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: cd1aea153f8c561d6c240efbec685adafd719e84
                       22787506539fd54a26e5e089460286f769b42831
                       c08dda3ac668acd9208f52e5266eddc26ac383a1
                       4fbeb621dd7f83b6ffedaa9bc9aae09af50f6185
                       e24b3c9849ebb34c9e785e1c090ed83524ca5d45
                       dc32468da896d9ecb30e8c913cfd901b2cd46a99
                       d517f51470b00345f0624364085ebf348b683536
                       42b79e8fc995746a96fa1c3fe21aa67cfb0821a4
                       4ca7f1fb229b33757ff0bcbcc0d92f70bfda16cd
                       02dfb4bbcc556ab43420ad7b92e755265bdcd05d
                       aeee35fa6abed3b8ef3505aa35383977f415996b
                       2124f6063e70f509f582a737291a7c49066cbcd0
                       6768a0c805c9006b553593df9d4722a24dd4ea29
                       735c5b4648212db59095210e61fbc37a0a7a6153
                       216a33c860d8abc0e6569720a1a5fb5cee8df029
                       9ff57fca36cfff9b8aab8ddbe6ee0167d46c822b
                       bd23ae57cf0e7e5e96a07900500d495c96f974aa
                       db8f13f6091f4177ce3dc4744750bed8a712d3e2
                       d5d17d470faf02ead54a8ed5ca7edf06952766b5
                       aa0978dc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [97:6d:95:54:f1:30:53:35:aa:11:29:83:bf:18:9a:80:9c:fe:8a:4c]
            modulus: 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
    public exponent: 10001

] 
2022-06-27 06:17:02.301  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-27 06:17:02.303 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-27 06:17:02.304 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-27 06:17:02.305 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-27 06:17:02.306  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-27 06:17:02.307  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-27 06:17:02.307  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-27 06:17:02.308 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-27 06:17:02.308 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-27 06:17:02.309 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-27 06:17:02.316 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-27 06:17:02.317 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 06:17:02.318 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 06:17:02.318 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 06:17:02.453  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-27 06:17:02.454  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-27 06:17:02.454 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-27 06:17:02.455 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 06:17:02.457  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-27 06:17:02.457  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-27 06:17:02.458 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:17:02.458 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:17:02.459 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:17:02.460 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:17:02.460 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:17:02.461 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:17:02.465 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:17:02.467 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:17:02.467 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:17:02.469 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-27 06:17:02.484 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 517788084044124988646161479176244775649986218346
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 27 04:40:10 UTC 2022
           Final Date: Sat Jun 26 04:40:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [71:f7:41:21:ba:9e:28:18:00:d7:c0:c0:b3:0f:6b:14:c7:48:07:e4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: cd1aea153f8c561d6c240efbec685adafd719e84
                       22787506539fd54a26e5e089460286f769b42831
                       c08dda3ac668acd9208f52e5266eddc26ac383a1
                       4fbeb621dd7f83b6ffedaa9bc9aae09af50f6185
                       e24b3c9849ebb34c9e785e1c090ed83524ca5d45
                       dc32468da896d9ecb30e8c913cfd901b2cd46a99
                       d517f51470b00345f0624364085ebf348b683536
                       42b79e8fc995746a96fa1c3fe21aa67cfb0821a4
                       4ca7f1fb229b33757ff0bcbcc0d92f70bfda16cd
                       02dfb4bbcc556ab43420ad7b92e755265bdcd05d
                       aeee35fa6abed3b8ef3505aa35383977f415996b
                       2124f6063e70f509f582a737291a7c49066cbcd0
                       6768a0c805c9006b553593df9d4722a24dd4ea29
                       735c5b4648212db59095210e61fbc37a0a7a6153
                       216a33c860d8abc0e6569720a1a5fb5cee8df029
                       9ff57fca36cfff9b8aab8ddbe6ee0167d46c822b
                       bd23ae57cf0e7e5e96a07900500d495c96f974aa
                       db8f13f6091f4177ce3dc4744750bed8a712d3e2
                       d5d17d470faf02ead54a8ed5ca7edf06952766b5
                       aa0978dc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ad:84:52:46:de:51:b1:0b:5e:1d:cf:48:0e:6a:0a:1b:d5:7e:a9:9e]
            modulus: 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
    public exponent: 10001

] 
2022-06-27 06:20:54.869  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-27 06:20:54.872 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-27 06:20:54.874 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-27 06:20:54.875 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-27 06:20:54.876  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-27 06:20:54.877  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-27 06:20:54.877  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-27 06:20:54.878 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-27 06:20:54.878 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-27 06:20:54.879 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-27 06:20:54.885 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-27 06:20:54.887 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 06:20:54.887 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 06:20:54.887 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 06:20:55.052  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-27 06:20:55.054  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-27 06:20:55.055 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-27 06:20:55.056 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 06:20:55.062  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-27 06:20:55.065  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-27 06:20:55.067 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:20:55.068 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:20:55.068 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:20:55.071 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:20:55.071 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:20:55.072 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:20:55.073 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:20:55.073 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:20:55.074 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:20:55.075 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-27 06:20:55.080 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 517788084044124988646161479176244775649986218346
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 27 04:40:10 UTC 2022
           Final Date: Sat Jun 26 04:40:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [71:f7:41:21:ba:9e:28:18:00:d7:c0:c0:b3:0f:6b:14:c7:48:07:e4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: cd1aea153f8c561d6c240efbec685adafd719e84
                       22787506539fd54a26e5e089460286f769b42831
                       c08dda3ac668acd9208f52e5266eddc26ac383a1
                       4fbeb621dd7f83b6ffedaa9bc9aae09af50f6185
                       e24b3c9849ebb34c9e785e1c090ed83524ca5d45
                       dc32468da896d9ecb30e8c913cfd901b2cd46a99
                       d517f51470b00345f0624364085ebf348b683536
                       42b79e8fc995746a96fa1c3fe21aa67cfb0821a4
                       4ca7f1fb229b33757ff0bcbcc0d92f70bfda16cd
                       02dfb4bbcc556ab43420ad7b92e755265bdcd05d
                       aeee35fa6abed3b8ef3505aa35383977f415996b
                       2124f6063e70f509f582a737291a7c49066cbcd0
                       6768a0c805c9006b553593df9d4722a24dd4ea29
                       735c5b4648212db59095210e61fbc37a0a7a6153
                       216a33c860d8abc0e6569720a1a5fb5cee8df029
                       9ff57fca36cfff9b8aab8ddbe6ee0167d46c822b
                       bd23ae57cf0e7e5e96a07900500d495c96f974aa
                       db8f13f6091f4177ce3dc4744750bed8a712d3e2
                       d5d17d470faf02ead54a8ed5ca7edf06952766b5
                       aa0978dc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7d:ea:56:a4:45:55:dd:81:ff:68:ed:3a:3b:af:56:93:2d:c4:ea:3f]
            modulus: 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
    public exponent: 10001

] 
2022-06-27 06:24:22.702  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-27 06:24:22.703 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-27 06:24:22.705 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-27 06:24:22.706 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-27 06:24:22.707  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-27 06:24:22.707  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-27 06:24:22.708  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-27 06:24:22.708 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-27 06:24:22.709 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-27 06:24:22.709 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-27 06:24:22.716 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-27 06:24:22.717 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 06:24:22.718 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 06:24:22.718 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 06:24:22.901  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-27 06:24:22.902  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-27 06:24:22.902 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-27 06:24:22.902 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 06:24:22.904  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-27 06:24:22.905  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-27 06:24:22.905 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:24:22.905 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:24:22.906 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:24:22.907 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:24:22.907 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:24:22.907 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:24:22.908 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:24:22.909 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:24:22.909 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:24:22.910 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-27 06:24:22.914 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 517788084044124988646161479176244775649986218346
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 27 04:40:10 UTC 2022
           Final Date: Sat Jun 26 04:40:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [71:f7:41:21:ba:9e:28:18:00:d7:c0:c0:b3:0f:6b:14:c7:48:07:e4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: cd1aea153f8c561d6c240efbec685adafd719e84
                       22787506539fd54a26e5e089460286f769b42831
                       c08dda3ac668acd9208f52e5266eddc26ac383a1
                       4fbeb621dd7f83b6ffedaa9bc9aae09af50f6185
                       e24b3c9849ebb34c9e785e1c090ed83524ca5d45
                       dc32468da896d9ecb30e8c913cfd901b2cd46a99
                       d517f51470b00345f0624364085ebf348b683536
                       42b79e8fc995746a96fa1c3fe21aa67cfb0821a4
                       4ca7f1fb229b33757ff0bcbcc0d92f70bfda16cd
                       02dfb4bbcc556ab43420ad7b92e755265bdcd05d
                       aeee35fa6abed3b8ef3505aa35383977f415996b
                       2124f6063e70f509f582a737291a7c49066cbcd0
                       6768a0c805c9006b553593df9d4722a24dd4ea29
                       735c5b4648212db59095210e61fbc37a0a7a6153
                       216a33c860d8abc0e6569720a1a5fb5cee8df029
                       9ff57fca36cfff9b8aab8ddbe6ee0167d46c822b
                       bd23ae57cf0e7e5e96a07900500d495c96f974aa
                       db8f13f6091f4177ce3dc4744750bed8a712d3e2
                       d5d17d470faf02ead54a8ed5ca7edf06952766b5
                       aa0978dc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [89:22:4c:ca:cc:dd:26:cf:08:4f:a3:53:a5:8f:64:20:bf:ab:08:13]
            modulus: d5810e6497d673db3689cf658e91dc4abb9172509bb8b0ce6efee607dc58164c9cc101bd78f758a48bc993ae1a2668d04b967af01fb4f929be9ddf3b565f31b003a76bd58f56ce52a2a5ba03626ea49c6b47f70999aa550fe92c923e485be9024ff3c399fd3d505fe383f7e43dfaa19a4077863847e48fc82c9e3ae1cc2c6e07153296c16c9bc43994315e1922819807232484e5c0941efcac2c974c9af354509be89902a1923b7bcd1ac3c05ad9d4a6e7017bf55f75b5381beb4c879f523b3024a18e1a18bd7d6c1fee20e49e0b8136a60f3bddf6ca22a76d42f593df961feafb0bce4f12f7db59ce5b68a9f80545ce9b74f55cd9573a874d1918f6f642855b
    public exponent: 10001

] 
2022-06-27 06:28:02.712  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-27 06:28:02.713 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-27 06:28:02.715 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-27 06:28:02.716 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-27 06:28:02.717  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-27 06:28:02.718  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-27 06:28:02.719  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-27 06:28:02.719 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-27 06:28:02.719 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-27 06:28:02.720 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-27 06:28:02.726 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-27 06:28:02.727 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 06:28:02.728 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 06:28:02.728 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 06:28:02.904  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-27 06:28:02.905  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-27 06:28:02.905 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-27 06:28:02.905 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 06:28:02.908  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-27 06:28:02.908  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-27 06:28:02.909 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:28:02.909 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:28:02.910 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:28:02.911 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:28:02.911 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:28:02.913 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:28:02.914 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:28:02.915 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:28:02.915 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:28:02.917 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-27 06:28:02.923 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 517788084044124988646161479176244775649986218346
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 27 04:40:10 UTC 2022
           Final Date: Sat Jun 26 04:40:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [71:f7:41:21:ba:9e:28:18:00:d7:c0:c0:b3:0f:6b:14:c7:48:07:e4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: cd1aea153f8c561d6c240efbec685adafd719e84
                       22787506539fd54a26e5e089460286f769b42831
                       c08dda3ac668acd9208f52e5266eddc26ac383a1
                       4fbeb621dd7f83b6ffedaa9bc9aae09af50f6185
                       e24b3c9849ebb34c9e785e1c090ed83524ca5d45
                       dc32468da896d9ecb30e8c913cfd901b2cd46a99
                       d517f51470b00345f0624364085ebf348b683536
                       42b79e8fc995746a96fa1c3fe21aa67cfb0821a4
                       4ca7f1fb229b33757ff0bcbcc0d92f70bfda16cd
                       02dfb4bbcc556ab43420ad7b92e755265bdcd05d
                       aeee35fa6abed3b8ef3505aa35383977f415996b
                       2124f6063e70f509f582a737291a7c49066cbcd0
                       6768a0c805c9006b553593df9d4722a24dd4ea29
                       735c5b4648212db59095210e61fbc37a0a7a6153
                       216a33c860d8abc0e6569720a1a5fb5cee8df029
                       9ff57fca36cfff9b8aab8ddbe6ee0167d46c822b
                       bd23ae57cf0e7e5e96a07900500d495c96f974aa
                       db8f13f6091f4177ce3dc4744750bed8a712d3e2
                       d5d17d470faf02ead54a8ed5ca7edf06952766b5
                       aa0978dc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4f:3c:d9:a1:67:34:a3:9a:ed:f0:ae:3b:98:f3:5d:83:a1:74:1e:34]
            modulus: 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
    public exponent: 10001

] 
2022-06-27 06:28:28.788  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-27 06:28:28.789 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-27 06:28:28.792 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-27 06:28:28.801 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-27 06:28:28.803  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-27 06:28:28.813  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-27 06:28:28.815  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-27 06:28:28.816 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-27 06:28:28.816 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-27 06:28:28.817 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-27 06:28:28.826 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-27 06:28:28.828 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 06:28:28.828 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 06:28:28.828 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 06:28:28.996  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-27 06:28:28.997  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-27 06:28:28.997 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-27 06:28:28.998 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 06:28:29.000  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-27 06:28:29.000  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-27 06:28:29.001 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:28:29.001 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:28:29.002 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:28:29.003 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:28:29.004 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:28:29.004 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:28:29.005 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:28:29.006 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:28:29.006 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:28:29.008 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-27 06:28:29.013 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 517788084044124988646161479176244775649986218346
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 27 04:40:10 UTC 2022
           Final Date: Sat Jun 26 04:40:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [71:f7:41:21:ba:9e:28:18:00:d7:c0:c0:b3:0f:6b:14:c7:48:07:e4]
            modulus: d5865913ecf416c1bfdede5a1684cd676e22b847479c80ccc540af0e78d1a767eebba02d3c8d568072a0958bf5ecbc6f39cbdee7d1598e4546196898760d728b415a3a4cb6e785fed8ddb7c4be99b2fb1bb99e4352c3992483df934ac3fb0347a991d0f11b1da7a6aed734d969243b4b638a974f09872b48203b90fee01d1f55da82f26f2d4c442761cecf5065f06ff7ae2a6d4222200928dac0eeae941d15ff6cd24091ba35718f4010a0a23e4f9a350116d9660cea58cacf15a91b41040442c0300d75dfd24c4e52ec51a69852b6983dd49dbfe8ebf0b4863d0e7d4ddd0ae421e10457e0837ef7d9be328e3412efec09df62f589f2889737a7284d094ff54dc2782dc75686741f2d6cee9438c059c0c18568e4bdbbc73a4827db52d5cd0541e0fb3a590c18711c57b476140fc6ce2e3949e3df46e6475147587adc25b2241ef012a531c467e047b973064058f030fe87b49c746378524b7e9cfb8ec5a03888f57287a44f08f658141eb323e29f11e3d8ab84c388f9b5a730597bd90582d4eb
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: cd1aea153f8c561d6c240efbec685adafd719e84
                       22787506539fd54a26e5e089460286f769b42831
                       c08dda3ac668acd9208f52e5266eddc26ac383a1
                       4fbeb621dd7f83b6ffedaa9bc9aae09af50f6185
                       e24b3c9849ebb34c9e785e1c090ed83524ca5d45
                       dc32468da896d9ecb30e8c913cfd901b2cd46a99
                       d517f51470b00345f0624364085ebf348b683536
                       42b79e8fc995746a96fa1c3fe21aa67cfb0821a4
                       4ca7f1fb229b33757ff0bcbcc0d92f70bfda16cd
                       02dfb4bbcc556ab43420ad7b92e755265bdcd05d
                       aeee35fa6abed3b8ef3505aa35383977f415996b
                       2124f6063e70f509f582a737291a7c49066cbcd0
                       6768a0c805c9006b553593df9d4722a24dd4ea29
                       735c5b4648212db59095210e61fbc37a0a7a6153
                       216a33c860d8abc0e6569720a1a5fb5cee8df029
                       9ff57fca36cfff9b8aab8ddbe6ee0167d46c822b
                       bd23ae57cf0e7e5e96a07900500d495c96f974aa
                       db8f13f6091f4177ce3dc4744750bed8a712d3e2
                       d5d17d470faf02ead54a8ed5ca7edf06952766b5
                       aa0978dc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3c:a2:3d:de:76:03:91:60:4f:19:56:8c:a4:81:0d:6f:88:15:e4:96]
            modulus: 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
    public exponent: 10001

] 
2022-06-27 06:32:48.169  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-27 06:32:48.171 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-27 06:32:48.173 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-27 06:32:48.174 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-27 06:32:48.175  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-27 06:32:48.175  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-27 06:32:48.176  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-27 06:32:48.176 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-27 06:32:48.177 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-27 06:32:48.177 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-27 06:32:48.184 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-27 06:32:48.185 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 06:32:48.185 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 06:32:48.186 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 06:32:48.353  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-27 06:32:48.354  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-27 06:32:48.355 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-27 06:32:48.355 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 06:32:48.358  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-27 06:32:48.358  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-27 06:32:48.359 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:32:48.360 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:32:48.361 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:32:48.362 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:32:48.362 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:32:48.363 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:32:48.364 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:32:48.365 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:32:48.365 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:32:48.366 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-27 06:32:48.373 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 517788084044124988646161479176244775649986218346
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 27 04:40:10 UTC 2022
           Final Date: Sat Jun 26 04:40:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [71:f7:41:21:ba:9e:28:18:00:d7:c0:c0:b3:0f:6b:14:c7:48:07:e4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: cd1aea153f8c561d6c240efbec685adafd719e84
                       22787506539fd54a26e5e089460286f769b42831
                       c08dda3ac668acd9208f52e5266eddc26ac383a1
                       4fbeb621dd7f83b6ffedaa9bc9aae09af50f6185
                       e24b3c9849ebb34c9e785e1c090ed83524ca5d45
                       dc32468da896d9ecb30e8c913cfd901b2cd46a99
                       d517f51470b00345f0624364085ebf348b683536
                       42b79e8fc995746a96fa1c3fe21aa67cfb0821a4
                       4ca7f1fb229b33757ff0bcbcc0d92f70bfda16cd
                       02dfb4bbcc556ab43420ad7b92e755265bdcd05d
                       aeee35fa6abed3b8ef3505aa35383977f415996b
                       2124f6063e70f509f582a737291a7c49066cbcd0
                       6768a0c805c9006b553593df9d4722a24dd4ea29
                       735c5b4648212db59095210e61fbc37a0a7a6153
                       216a33c860d8abc0e6569720a1a5fb5cee8df029
                       9ff57fca36cfff9b8aab8ddbe6ee0167d46c822b
                       bd23ae57cf0e7e5e96a07900500d495c96f974aa
                       db8f13f6091f4177ce3dc4744750bed8a712d3e2
                       d5d17d470faf02ead54a8ed5ca7edf06952766b5
                       aa0978dc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [64:59:32:38:c9:3a:42:30:f5:e5:5c:bd:d8:b5:0d:ce:77:7b:75:60]
            modulus: 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
    public exponent: 10001

] 
2022-06-27 06:34:19.291  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-27 06:34:19.292 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-27 06:34:19.295 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-27 06:34:19.296 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-27 06:34:19.296  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-27 06:34:19.297  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-27 06:34:19.297  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-27 06:34:19.298 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-27 06:34:19.298 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-27 06:34:19.298 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-27 06:34:19.307 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-27 06:34:19.308 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 06:34:19.309 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 06:34:19.309 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 06:34:19.487  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-27 06:34:19.488  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-27 06:34:19.489 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-27 06:34:19.489 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 06:34:19.491  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-27 06:34:19.492  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-27 06:34:19.492 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:34:19.492 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:34:19.493 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:34:19.495 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:34:19.495 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:34:19.495 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:34:19.496 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:34:19.497 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:34:19.497 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:34:19.498 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-27 06:34:19.502 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 517788084044124988646161479176244775649986218346
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 27 04:40:10 UTC 2022
           Final Date: Sat Jun 26 04:40:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [71:f7:41:21:ba:9e:28:18:00:d7:c0:c0:b3:0f:6b:14:c7:48:07:e4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: cd1aea153f8c561d6c240efbec685adafd719e84
                       22787506539fd54a26e5e089460286f769b42831
                       c08dda3ac668acd9208f52e5266eddc26ac383a1
                       4fbeb621dd7f83b6ffedaa9bc9aae09af50f6185
                       e24b3c9849ebb34c9e785e1c090ed83524ca5d45
                       dc32468da896d9ecb30e8c913cfd901b2cd46a99
                       d517f51470b00345f0624364085ebf348b683536
                       42b79e8fc995746a96fa1c3fe21aa67cfb0821a4
                       4ca7f1fb229b33757ff0bcbcc0d92f70bfda16cd
                       02dfb4bbcc556ab43420ad7b92e755265bdcd05d
                       aeee35fa6abed3b8ef3505aa35383977f415996b
                       2124f6063e70f509f582a737291a7c49066cbcd0
                       6768a0c805c9006b553593df9d4722a24dd4ea29
                       735c5b4648212db59095210e61fbc37a0a7a6153
                       216a33c860d8abc0e6569720a1a5fb5cee8df029
                       9ff57fca36cfff9b8aab8ddbe6ee0167d46c822b
                       bd23ae57cf0e7e5e96a07900500d495c96f974aa
                       db8f13f6091f4177ce3dc4744750bed8a712d3e2
                       d5d17d470faf02ead54a8ed5ca7edf06952766b5
                       aa0978dc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1d:1f:02:25:b0:6e:aa:e3:ba:76:78:4c:55:08:53:21:07:e7:f5:af]
            modulus: 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
    public exponent: 10001

] 
2022-06-27 06:34:38.530  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-27 06:34:38.533 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-27 06:34:38.536 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-27 06:34:38.538 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-27 06:34:38.539  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-27 06:34:38.541  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-27 06:34:38.542  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-27 06:34:38.542 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-27 06:34:38.543 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-27 06:34:38.544 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-27 06:34:38.552 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-27 06:34:38.553 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 06:34:38.553 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 06:34:38.554 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 06:34:38.694  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-27 06:34:38.695  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-27 06:34:38.695 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-27 06:34:38.696 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 06:34:38.698  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-27 06:34:38.698  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-27 06:34:38.699 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:34:38.700 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:34:38.700 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:34:38.701 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:34:38.701 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:34:38.702 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:34:38.702 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:34:38.703 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:34:38.703 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:34:38.705 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-27 06:34:38.709 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 517788084044124988646161479176244775649986218346
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 27 04:40:10 UTC 2022
           Final Date: Sat Jun 26 04:40:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [71:f7:41:21:ba:9e:28:18:00:d7:c0:c0:b3:0f:6b:14:c7:48:07:e4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: cd1aea153f8c561d6c240efbec685adafd719e84
                       22787506539fd54a26e5e089460286f769b42831
                       c08dda3ac668acd9208f52e5266eddc26ac383a1
                       4fbeb621dd7f83b6ffedaa9bc9aae09af50f6185
                       e24b3c9849ebb34c9e785e1c090ed83524ca5d45
                       dc32468da896d9ecb30e8c913cfd901b2cd46a99
                       d517f51470b00345f0624364085ebf348b683536
                       42b79e8fc995746a96fa1c3fe21aa67cfb0821a4
                       4ca7f1fb229b33757ff0bcbcc0d92f70bfda16cd
                       02dfb4bbcc556ab43420ad7b92e755265bdcd05d
                       aeee35fa6abed3b8ef3505aa35383977f415996b
                       2124f6063e70f509f582a737291a7c49066cbcd0
                       6768a0c805c9006b553593df9d4722a24dd4ea29
                       735c5b4648212db59095210e61fbc37a0a7a6153
                       216a33c860d8abc0e6569720a1a5fb5cee8df029
                       9ff57fca36cfff9b8aab8ddbe6ee0167d46c822b
                       bd23ae57cf0e7e5e96a07900500d495c96f974aa
                       db8f13f6091f4177ce3dc4744750bed8a712d3e2
                       d5d17d470faf02ead54a8ed5ca7edf06952766b5
                       aa0978dc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6d:7f:6f:0d:53:cd:98:95:9e:ff:63:a2:12:7c:44:73:4e:df:62:40]
            modulus: cd921642bc86af33500d86be94cc12f6ee91184fe943ef9aebfa393ac815bd5ab250333c76337d9045a47e14cfc4f109e4c70dc2b2b82c6b36401bb84c0f7b09d4d65884aac9c1a5422aa919deb1365de7c49824ae873ee427db6eee79a317822f1d414a7fd3048947b041317582f3fc06d9a3ac67cdbe63548257c66c5e6f430c206a01c89f3e809da9edd2bffee5857365556adb5f3a420b419f48928812eb9ad12a77c6881ba70161d934cfaf1d3ed3cae9347d18799b79c0f1a0234e3e79de02ebcceda0f3f497d6901ee61aae11d90eeb6dc323635ede48fe8f561c8dac3760aeefa42b9d70ba697dcdbe9a4cf267e959c930be6ea9e9767769374574db
    public exponent: 10001

] 
2022-06-27 06:36:44.923  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-27 06:36:44.924 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-27 06:36:44.926 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-27 06:36:44.927 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-27 06:36:44.928  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-27 06:36:44.929  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-27 06:36:44.929  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-27 06:36:44.930 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-27 06:36:44.930 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-27 06:36:44.934 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-27 06:36:44.942 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-27 06:36:44.951 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 06:36:44.952 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 06:36:44.955 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 06:36:45.159  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-27 06:36:45.160  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-27 06:36:45.160 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-27 06:36:45.160 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 06:36:45.162  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-27 06:36:45.162  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-27 06:36:45.163 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:36:45.163 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:36:45.164 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:36:45.164 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:36:45.165 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:36:45.165 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:36:45.166 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:36:45.166 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:36:45.166 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:36:45.168 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-27 06:36:45.173 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 517788084044124988646161479176244775649986218346
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 27 04:40:10 UTC 2022
           Final Date: Sat Jun 26 04:40:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [71:f7:41:21:ba:9e:28:18:00:d7:c0:c0:b3:0f:6b:14:c7:48:07:e4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: cd1aea153f8c561d6c240efbec685adafd719e84
                       22787506539fd54a26e5e089460286f769b42831
                       c08dda3ac668acd9208f52e5266eddc26ac383a1
                       4fbeb621dd7f83b6ffedaa9bc9aae09af50f6185
                       e24b3c9849ebb34c9e785e1c090ed83524ca5d45
                       dc32468da896d9ecb30e8c913cfd901b2cd46a99
                       d517f51470b00345f0624364085ebf348b683536
                       42b79e8fc995746a96fa1c3fe21aa67cfb0821a4
                       4ca7f1fb229b33757ff0bcbcc0d92f70bfda16cd
                       02dfb4bbcc556ab43420ad7b92e755265bdcd05d
                       aeee35fa6abed3b8ef3505aa35383977f415996b
                       2124f6063e70f509f582a737291a7c49066cbcd0
                       6768a0c805c9006b553593df9d4722a24dd4ea29
                       735c5b4648212db59095210e61fbc37a0a7a6153
                       216a33c860d8abc0e6569720a1a5fb5cee8df029
                       9ff57fca36cfff9b8aab8ddbe6ee0167d46c822b
                       bd23ae57cf0e7e5e96a07900500d495c96f974aa
                       db8f13f6091f4177ce3dc4744750bed8a712d3e2
                       d5d17d470faf02ead54a8ed5ca7edf06952766b5
                       aa0978dc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [58:42:58:20:11:29:54:89:49:c1:cb:b6:95:3b:9f:a2:a3:17:d0:4d]
            modulus: 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
    public exponent: 10001

] 
2022-06-27 06:40:38.672  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-27 06:40:38.675 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-27 06:40:38.679 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-27 06:40:38.680 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-27 06:40:38.681  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-27 06:40:38.686  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-27 06:40:38.688  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-27 06:40:38.688 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-27 06:40:38.689 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-27 06:40:38.690 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-27 06:40:38.702 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-27 06:40:38.704 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 06:40:38.704 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 06:40:38.704 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 06:40:38.900  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-27 06:40:38.912  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-27 06:40:38.913 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-27 06:40:38.913 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 06:40:38.916  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-27 06:40:38.916  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-27 06:40:38.917 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:40:38.917 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:40:38.917 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:40:38.918 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:40:38.919 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:40:38.919 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:40:38.920 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:40:38.920 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:40:38.921 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:40:38.922 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-27 06:40:38.939 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 517788084044124988646161479176244775649986218346
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 27 04:40:10 UTC 2022
           Final Date: Sat Jun 26 04:40:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [71:f7:41:21:ba:9e:28:18:00:d7:c0:c0:b3:0f:6b:14:c7:48:07:e4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: cd1aea153f8c561d6c240efbec685adafd719e84
                       22787506539fd54a26e5e089460286f769b42831
                       c08dda3ac668acd9208f52e5266eddc26ac383a1
                       4fbeb621dd7f83b6ffedaa9bc9aae09af50f6185
                       e24b3c9849ebb34c9e785e1c090ed83524ca5d45
                       dc32468da896d9ecb30e8c913cfd901b2cd46a99
                       d517f51470b00345f0624364085ebf348b683536
                       42b79e8fc995746a96fa1c3fe21aa67cfb0821a4
                       4ca7f1fb229b33757ff0bcbcc0d92f70bfda16cd
                       02dfb4bbcc556ab43420ad7b92e755265bdcd05d
                       aeee35fa6abed3b8ef3505aa35383977f415996b
                       2124f6063e70f509f582a737291a7c49066cbcd0
                       6768a0c805c9006b553593df9d4722a24dd4ea29
                       735c5b4648212db59095210e61fbc37a0a7a6153
                       216a33c860d8abc0e6569720a1a5fb5cee8df029
                       9ff57fca36cfff9b8aab8ddbe6ee0167d46c822b
                       bd23ae57cf0e7e5e96a07900500d495c96f974aa
                       db8f13f6091f4177ce3dc4744750bed8a712d3e2
                       d5d17d470faf02ead54a8ed5ca7edf06952766b5
                       aa0978dc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [40:77:fb:24:c5:32:7c:c6:12:e6:bd:e2:0e:c4:e5:00:74:30:5a:3f]
            modulus: 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
    public exponent: 10001

] 
2022-06-27 06:44:46.950  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-27 06:44:46.952 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-27 06:44:46.954 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-27 06:44:46.954 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-27 06:44:46.955  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-27 06:44:46.956  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-27 06:44:46.956  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-27 06:44:46.957 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-27 06:44:46.957 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-27 06:44:46.958 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-27 06:44:46.976 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-27 06:44:46.977 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 06:44:46.977 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 06:44:46.977 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 06:44:47.302  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-27 06:44:47.303  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-27 06:44:47.303 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-27 06:44:47.304 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 06:44:47.305  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-27 06:44:47.306  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-27 06:44:47.306 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:44:47.306 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:44:47.307 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:44:47.308 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:44:47.309 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:44:47.309 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:44:47.310 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:44:47.311 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:44:47.311 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:44:47.312 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-27 06:44:47.316 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 517788084044124988646161479176244775649986218346
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 27 04:40:10 UTC 2022
           Final Date: Sat Jun 26 04:40:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [71:f7:41:21:ba:9e:28:18:00:d7:c0:c0:b3:0f:6b:14:c7:48:07:e4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: cd1aea153f8c561d6c240efbec685adafd719e84
                       22787506539fd54a26e5e089460286f769b42831
                       c08dda3ac668acd9208f52e5266eddc26ac383a1
                       4fbeb621dd7f83b6ffedaa9bc9aae09af50f6185
                       e24b3c9849ebb34c9e785e1c090ed83524ca5d45
                       dc32468da896d9ecb30e8c913cfd901b2cd46a99
                       d517f51470b00345f0624364085ebf348b683536
                       42b79e8fc995746a96fa1c3fe21aa67cfb0821a4
                       4ca7f1fb229b33757ff0bcbcc0d92f70bfda16cd
                       02dfb4bbcc556ab43420ad7b92e755265bdcd05d
                       aeee35fa6abed3b8ef3505aa35383977f415996b
                       2124f6063e70f509f582a737291a7c49066cbcd0
                       6768a0c805c9006b553593df9d4722a24dd4ea29
                       735c5b4648212db59095210e61fbc37a0a7a6153
                       216a33c860d8abc0e6569720a1a5fb5cee8df029
                       9ff57fca36cfff9b8aab8ddbe6ee0167d46c822b
                       bd23ae57cf0e7e5e96a07900500d495c96f974aa
                       db8f13f6091f4177ce3dc4744750bed8a712d3e2
                       d5d17d470faf02ead54a8ed5ca7edf06952766b5
                       aa0978dc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [51:0a:b1:c5:22:be:14:4d:1b:f5:3e:40:fd:c3:50:3e:98:b1:d2:86]
            modulus: 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
    public exponent: 10001

] 
2022-06-27 06:50:03.478  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-27 06:50:03.488 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-27 06:50:03.491 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-27 06:50:03.493 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-27 06:50:03.494  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-27 06:50:03.494  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-27 06:50:03.495  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-27 06:50:03.495 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-27 06:50:03.496 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-27 06:50:03.496 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-27 06:50:03.505 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-27 06:50:03.506 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 06:50:03.507 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 06:50:03.507 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 06:50:03.684  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-27 06:50:03.685  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-27 06:50:03.686 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-27 06:50:03.686 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 06:50:03.689  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-27 06:50:03.689  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-27 06:50:03.690 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:50:03.690 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:50:03.690 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:50:03.691 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:50:03.692 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:50:03.692 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:50:03.693 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:50:03.693 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:50:03.694 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:50:03.695 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-27 06:50:03.699 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 517788084044124988646161479176244775649986218346
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 27 04:40:10 UTC 2022
           Final Date: Sat Jun 26 04:40:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [71:f7:41:21:ba:9e:28:18:00:d7:c0:c0:b3:0f:6b:14:c7:48:07:e4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: cd1aea153f8c561d6c240efbec685adafd719e84
                       22787506539fd54a26e5e089460286f769b42831
                       c08dda3ac668acd9208f52e5266eddc26ac383a1
                       4fbeb621dd7f83b6ffedaa9bc9aae09af50f6185
                       e24b3c9849ebb34c9e785e1c090ed83524ca5d45
                       dc32468da896d9ecb30e8c913cfd901b2cd46a99
                       d517f51470b00345f0624364085ebf348b683536
                       42b79e8fc995746a96fa1c3fe21aa67cfb0821a4
                       4ca7f1fb229b33757ff0bcbcc0d92f70bfda16cd
                       02dfb4bbcc556ab43420ad7b92e755265bdcd05d
                       aeee35fa6abed3b8ef3505aa35383977f415996b
                       2124f6063e70f509f582a737291a7c49066cbcd0
                       6768a0c805c9006b553593df9d4722a24dd4ea29
                       735c5b4648212db59095210e61fbc37a0a7a6153
                       216a33c860d8abc0e6569720a1a5fb5cee8df029
                       9ff57fca36cfff9b8aab8ddbe6ee0167d46c822b
                       bd23ae57cf0e7e5e96a07900500d495c96f974aa
                       db8f13f6091f4177ce3dc4744750bed8a712d3e2
                       d5d17d470faf02ead54a8ed5ca7edf06952766b5
                       aa0978dc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ff:63:2e:3b:26:95:79:0f:3e:4b:40:12:f0:0f:52:20:b0:2f:11:48]
            modulus: d4c8d0114d094de1f47eaebf25563b86737c9214cc8bf0921c42feb05b037867e73460172d6593f7301e158ec943dcc4e58bf02abbde27362ae205c004e8c85f4d199eb75d599b74f219bdcfc7ce25fa6f364a47b3b3c65ee95be3804af9b5d285855cd1d3fd68b2a8c005ff1675a68f39374cd3c54899a4cb5bb59c04a41b40e342fb32acd9c9b1c730a32a519f4b9cc1aeffae0f92fe64fd05734d21707c1b9f79f94ff9acef2ec128ef6e84c9f6652c69ee89eb981cb0b7cd37b77a61785a988a6b95bd34bb798f4bdfa2b5021c5b325212c5379cbd24fb978f91535eb89bd67330f3c94e61c8cc9f6a38cb61c62c627e9b9335a3cb0050007438b2c481b1
    public exponent: 10001

] 
2022-06-27 06:53:51.760  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-27 06:53:51.762 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-27 06:53:51.764 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-27 06:53:51.765 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-27 06:53:51.765  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-27 06:53:51.765  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-27 06:53:51.769  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-27 06:53:51.769 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-27 06:53:51.770 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-27 06:53:51.770 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-27 06:53:51.777 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-27 06:53:51.778 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 06:53:51.779 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 06:53:51.779 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 06:53:51.985  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-27 06:53:51.986  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-27 06:53:51.986 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-27 06:53:51.987 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 06:53:51.988  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-27 06:53:51.989  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-27 06:53:51.989 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:53:51.990 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:53:51.990 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:53:51.995 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:53:51.999 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:53:52.000 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:53:52.001 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 06:53:52.003 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 06:53:52.003 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 06:53:52.004 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-27 06:53:52.047 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 517788084044124988646161479176244775649986218346
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 27 04:40:10 UTC 2022
           Final Date: Sat Jun 26 04:40:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [71:f7:41:21:ba:9e:28:18:00:d7:c0:c0:b3:0f:6b:14:c7:48:07:e4]
            modulus: d5865913ecf416c1bfdede5a1684cd676e22b847479c80ccc540af0e78d1a767eebba02d3c8d568072a0958bf5ecbc6f39cbdee7d1598e4546196898760d728b415a3a4cb6e785fed8ddb7c4be99b2fb1bb99e4352c3992483df934ac3fb0347a991d0f11b1da7a6aed734d969243b4b638a974f09872b48203b90fee01d1f55da82f26f2d4c442761cecf5065f06ff7ae2a6d4222200928dac0eeae941d15ff6cd24091ba35718f4010a0a23e4f9a350116d9660cea58cacf15a91b41040442c0300d75dfd24c4e52ec51a69852b6983dd49dbfe8ebf0b4863d0e7d4ddd0ae421e10457e0837ef7d9be328e3412efec09df62f589f2889737a7284d094ff54dc2782dc75686741f2d6cee9438c059c0c18568e4bdbbc73a4827db52d5cd0541e0fb3a590c18711c57b476140fc6ce2e3949e3df46e6475147587adc25b2241ef012a531c467e047b973064058f030fe87b49c746378524b7e9cfb8ec5a03888f57287a44f08f658141eb323e29f11e3d8ab84c388f9b5a730597bd90582d4eb
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: cd1aea153f8c561d6c240efbec685adafd719e84
                       22787506539fd54a26e5e089460286f769b42831
                       c08dda3ac668acd9208f52e5266eddc26ac383a1
                       4fbeb621dd7f83b6ffedaa9bc9aae09af50f6185
                       e24b3c9849ebb34c9e785e1c090ed83524ca5d45
                       dc32468da896d9ecb30e8c913cfd901b2cd46a99
                       d517f51470b00345f0624364085ebf348b683536
                       42b79e8fc995746a96fa1c3fe21aa67cfb0821a4
                       4ca7f1fb229b33757ff0bcbcc0d92f70bfda16cd
                       02dfb4bbcc556ab43420ad7b92e755265bdcd05d
                       aeee35fa6abed3b8ef3505aa35383977f415996b
                       2124f6063e70f509f582a737291a7c49066cbcd0
                       6768a0c805c9006b553593df9d4722a24dd4ea29
                       735c5b4648212db59095210e61fbc37a0a7a6153
                       216a33c860d8abc0e6569720a1a5fb5cee8df029
                       9ff57fca36cfff9b8aab8ddbe6ee0167d46c822b
                       bd23ae57cf0e7e5e96a07900500d495c96f974aa
                       db8f13f6091f4177ce3dc4744750bed8a712d3e2
                       d5d17d470faf02ead54a8ed5ca7edf06952766b5
                       aa0978dc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2b:4b:30:51:ba:7b:1b:66:c6:3f:42:f3:95:fb:aa:33:5e:07:d9:5d]
            modulus: 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
    public exponent: 10001

] 
2022-06-27 07:02:29.145  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-27 07:02:29.149 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-27 07:02:29.152 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-27 07:02:29.154 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-27 07:02:29.155  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-27 07:02:29.156  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-27 07:02:29.157  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-27 07:02:29.157 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-27 07:02:29.158 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-27 07:02:29.159 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-27 07:02:29.168 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-27 07:02:29.170 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 07:02:29.171 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-27 07:02:29.171 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 07:02:29.333  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-27 07:02:29.335  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-27 07:02:29.335 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-27 07:02:29.336 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-27 07:02:29.338  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-27 07:02:29.342  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-27 07:02:29.343 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 07:02:29.343 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 07:02:29.344 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 07:02:29.345 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 07:02:29.345 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 07:02:29.346 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 07:02:29.347 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-27 07:02:29.347 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-27 07:02:29.348 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-27 07:02:29.351 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-27 07:02:29.355 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 517788084044124988646161479176244775649986218346
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 27 04:40:10 UTC 2022
           Final Date: Sat Jun 26 04:40:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [71:f7:41:21:ba:9e:28:18:00:d7:c0:c0:b3:0f:6b:14:c7:48:07:e4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: cd1aea153f8c561d6c240efbec685adafd719e84
                       22787506539fd54a26e5e089460286f769b42831
                       c08dda3ac668acd9208f52e5266eddc26ac383a1
                       4fbeb621dd7f83b6ffedaa9bc9aae09af50f6185
                       e24b3c9849ebb34c9e785e1c090ed83524ca5d45
                       dc32468da896d9ecb30e8c913cfd901b2cd46a99
                       d517f51470b00345f0624364085ebf348b683536
                       42b79e8fc995746a96fa1c3fe21aa67cfb0821a4
                       4ca7f1fb229b33757ff0bcbcc0d92f70bfda16cd
                       02dfb4bbcc556ab43420ad7b92e755265bdcd05d
                       aeee35fa6abed3b8ef3505aa35383977f415996b
                       2124f6063e70f509f582a737291a7c49066cbcd0
                       6768a0c805c9006b553593df9d4722a24dd4ea29
                       735c5b4648212db59095210e61fbc37a0a7a6153
                       216a33c860d8abc0e6569720a1a5fb5cee8df029
                       9ff57fca36cfff9b8aab8ddbe6ee0167d46c822b
                       bd23ae57cf0e7e5e96a07900500d495c96f974aa
                       db8f13f6091f4177ce3dc4744750bed8a712d3e2
                       d5d17d470faf02ead54a8ed5ca7edf06952766b5
                       aa0978dc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [82:8b:0c:04:35:0e:91:c1:27:af:6e:8b:5a:63:ce:56:da:03:87:80]
            modulus: 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
    public exponent: 10001

]